Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Food Control 105 (2019) 233–241

Contents lists available at ScienceDirect

Food Control
journal homepage: www.elsevier.com/locate/foodcont

Introducing the Food Fraud Prevention Cycle (FFPC): A dynamic T


information management and strategic roadmap
John Spinka,∗, Weina Chenb, Guangtao Zhangc, Cheri Speier-Perod
a
Michigan State University, College of Veterinary Medicines, Food Fraud Initiative, 1129 Farm Lane, B51, East Lansing, MI, 48864, USA
b
Global Food Safety Center Mars Incorporated, Yanqi Economic Development Zone, Huairou District, Beijing, 101407, China
c
Global Food Safety Center, Mars Incorporated, Yanqi Economic Development Zone, Huairou District, Beijing, 101407, China
d
Michigan State University, Broad Business School, Department of Supply Chain Management,, 632 Bogue St. N520, East Lansing, MI, 48824, USA

A R T I C LE I N FO A B S T R A C T

Keywords: Food fraud – intentional deception for economic gain using food – is an emerging research field due to increased
Food fraud awareness of the health hazard, increased regulatory scrutiny, increased awareness of the costs, a seemingly
Vulnerability endless stream of identified incidents, and new compliance requirements. Beyond the laws and regulations that
Assessment are being more routinely applied, commercial standards have expanded to address food fraud. Specifically, since
Crime
January 2018 the Global Food Safety Initiative (GFSI) has required that Food Safety Management Systems
Prevention
Food fraud prevention cycle
include a Food Fraud Vulnerability Assessment (FFVA) and a Food Fraud Prevention Strategy (FFPS). When an
entity begins to address the topic, the first consideration is what is food fraud and includes is food fraud really a
problem, the focus then shifts to how to detect food fraud including the development of test methods. At that point,
there are more fundamental and practical implementation questions such as how to start, what to do, and how
much is enough, and how to measure success. The review of these questions has resulted in one unmet need for a
method to manage the information and activities in the FFPS. Consideration of these concepts provided the
realization that there was a need to connect the steps into an interconnected and dynamic system. The objective
was to connect everything to everything. The Food Fraud Prevention Cycle (FFPC) was developed to meet this
unmet need. This research paper includes four illustrative examples including a response to: new public policy
priorities, a new food fraud incident, and a review of a new countermeasure or control system. The adoption of a
holistic and all-encompassing information management cycle will enable a harmonized approach and the
sharing of best practices.

1. Introduction & Luning, 2017; van Ruth, Luning, Silvis, Yang, & Huisman, 2018).
As stakeholders, including companies and countries, begin to sys-
Food fraud is an emerging food industry challenge that has started temize their approach to the food fraud problem there is an increasing
to be a peer-review publication research topic. As the focus on food focus on management systems and methods. This article builds upon
fraud has shifted from defining the topic to assessing incidents, a stream hazard identification and risk assessment research components of the
of research has provided a more comprehensive review of the under- risk analysis cycle, and shifts focus to the importance of building a
lying concepts (Everstine, Spink, & Kennedy, 2013; Moore, Spink, & foundation for risk management and risk communication. There is an
Lipp, 2012; Spink & Moyer, 2011; Spink, Moyer et al., 2015), and the evaluation of the acceptable/unacceptable level of risk or what is referred
development of new methodologies for managing food fraud (among to as risk tolerance or risk appetite during the Risk Management step in
others, see SSAFE 2015, USP 2015, Spink, Moyer et al., 2016a,b; Reilly, the process of Risk Analysis (COSO 2012a, 2012b; ISO 2009; ISO 2017).
2018, pp. I–21). The underlying concepts of risk versus vulnerability and This project builds upon previous related Food Control Journal
prevention versus mitigation were recently reviewed (Bréchon, Hanner, & articles including “Introducing the Food Fraud Initial Screening Model
Mariani, 2016; DEFRA 2014; Lord, Flores Elizondo et al., 2017; Lord, (FFIS)” (Spink, Moyer, & Speier-Pero, 2016a), “The Economics of a
Spencer et al., 2017; Manning & Soon, 2016; Primrose, Woolfe, & Food Fraud Incident Case Studies and Examples Including Melamine in
Rollinson, 2010; Spink, Ortega, Chen, & Wu, 2017; van Ruth, Huisman, Wheat Gluten” (Moyer, DeVries, & John Spink, 2017). In addition to


Corresponding author.
E-mail addresses: spinkj@msu.edu (J. Spink), Weina.Chen@effem.com (W. Chen), Guangtao.Zhang@effem.com (G. Zhang),
cspero@broad.msu.edu (C. Speier-Pero).

https://doi.org/10.1016/j.foodcont.2019.06.002
Received 6 April 2019; Received in revised form 31 May 2019; Accepted 1 June 2019
Available online 03 June 2019
0956-7135/ © 2019 Elsevier Ltd. All rights reserved.
J. Spink, et al. Food Control 105 (2019) 233–241

those articles, this new Food Fraud Prevention Cycle concept builds activities, there is usually no single law that directly addresses food
upon many other related works such as “Defining the Public Health fraud in isolation. Thus, it is possible that some aspects of food fraud (as
Threat of Food Fraud” and “The role of the public private partnership in defined), are not holistically covered from a regulatory standpoint, and
Food Fraud prevention — includes implementing the strategy” (Spink it is important to delineate that all types of food fraud are clearly illegal.
and Moyer, 2011, Spink et al., 2016b).
a. The Food Risk Matrix and Compliance Requirements
2. The Food Fraud Prevention Strategy development
To understand the scope of food fraud it is useful to review the topic
Food fraud is an intentional deception for economic gain using in relation to all food risks including (and see glossary for other related
food1 (CFSA 2015a, 2015b; CODEX 2017; DEFRA 2014; European terms) (Fig. 1) (Spink & Moyer, 2011):
Parliament 2013; GFSI 2014; ISO 2005; ISO 2011a; Spink & Moyer,
2011). This definition is correlated with the broader August 2018 ISO • food safety: unintentional acts that cause public health harm;
definition of: • food quality: unintentional act that does not cause public health
“Product Fraud: wrongful or criminal deception that utilizes ma- harm;
terial goods for financial or personal gain; Note 1 to entry: Fraud means • food defense: intentional act with the intent of causing public health,
wrongful or criminal deception intended to result in a financial or terror, or economic harm.
personal gain that creates social or economic harm” (ISO 2018).
The types of food fraud include: adulterant-substance2 (e.g., adul- The focus of the Food Risk Matrix is on the root cause motivation for
terant, adulteration: including dilution, substitution, concealment, un- why the human adversary identified and acted upon a fraud opportu-
approved enhancements), mislabelling or misbranding, tampering, grey nity. The focus on the intricate detail is a primary Criminology re-
market or diversion, smuggling, stolen goods such as cargo theft and quirement for Situational Crime Prevention which seeks to reduce that
organized retail theft, and counterfeiting (Intellectual Property Rights - fraud opportunity. A food safety or food quality risk is unintentional
IPR) (GFSI 2018; Spink, 2019d). Food fraud can occur across all types of and the adversary did not try to create this problem. The root cause is a
products that include: raw materials, incoming goods, goods in manu- lack of awareness or an unknown system problem. A food fraud risk is
facturing, goods in storage, products at retailers, and also through to intentional and the adversary is tryng to NOT get caught while ex-
destruction or disposal. There are different industry stakeholders that ploiting a perceived system weakness. Similarly, a food defense risk is
include: those within the immediate supply chain including brand intentional and the adversary is trying to create harm that is economic,
owners such as producers, manufacturers, food distributors, and re- public health, or terror. Food fraud prevention requires a fundamen-
tailers; support and secondary stakeholders including research or gui- tally different approach that for food safety since there is an intelligent
dance service providers such as academics or management consultants; adversary who actively seeks to avoid detection.
and then contract research and testing services including technology Food fraud prevention has become a management requirement for
suppliers and including authenticity affirmation (e.g., test of the pro- food standards such as those organized by the Global Food Safety
duct, transaction analysis, or external component), data management, Initiative (GFSI) (GFSI 2017). GFSI was created in 2002 by a group of
investigations, audits, market monitoring, and others (Spink, 2018; global companies under the Consumer Goods Forum and now is a re-
Spink et al., 2019c). There are also different government stakeholders quirement for their members which reportedly equate to approximately
such as the regulators and law enforcement who are required to im- 65% of the world food trade. GFSI initially focused on large multi-na-
plement the laws and regulations, the prosecutors who decide which tional companies, whilst also expanding to smaller enterprises through
cases are brought to the court, the criminal justice system which in- organizations such as Codex Alimentarius (Codex), World Health Or-
cludes judges and prosecutors assigning penalties including incarcera- ganization (WHO) and the United Nations Food and Agricultural Or-
tion, and finally, the entire process starts with the creation of new laws ganization (FAO). GFSI published their Guidance Document stating the
and allocation of funds by legislative branches such as a parliament or expected requirements of a Food Safety Management System (FSMS).
congress. As of January 2018, there is a GFSI requirement for a written Food
There are a breadth of laws and regulations that arbitrate food fraud Fraud Vulnerability Assessment and a written Food Fraud Prevention
including food, public health, consumer protection, commercial trans- Strategy (or also referred to as a Food Fraud Mitigation Plan) – this is
actions, customs and smuggling. Given this breadth of agencies and NOT an optional component of a GFSI-endorsed food safety certifica-
tion (GFSI 2017) [for more on prevention versus mitigation see Spink
et al., 2017]. The GFSI definition and scope include all types of fraud
1
Note: The current, but not final, public draft of the Codex Alimentarius (see list above) and all products (see list above) (GFSI 2014; GFSI 2017;
Electronic Work Group on Food Integrity and Food Authentication definition of
GFSI 2018). The GFSI types of fraud are consistent with other global
food fraud is “Any deliberate action of organizations or individuals to deceive
activities such as CODEX, who in their food fraud related electronic
others for economic gain or avoidance of an economic loss in regards to the
integrity of food to gain undue advantage. Types of food fraud include but are
working group state “Types of food fraud include but not limited to:
not limited to: adulteration, substitution, dilution, tampering, simulation, adulteration, substitution, dilution, tampering, simulation, counter-
counterfeiting, and misrepresentation” (Codex, 2017). At this time Codex is also feiting, and misrepresentation” (CODEX 2017).
defining food integrity but does not have a definition of adulterant or adul-
teration. 2.1. New research perspectives
2
From Spink, Hegarty, Fortin, and Elliott (2019a), “The term “adulterant-
substance” is used here to be clear that this is referring to a “substance” not the There are four new perspectives when considering how to address
broader class of “adulteration” or “adulterated foods” which often does not food fraud prevention holistically which differ from a traditional
necessarily require an “adulterant.” There is often confusion since the US Food HACCP (Hazard Analysis and Critical Control Point plan) and food
Drug & Cosmetics Act “Adulterated Food” section applies to concepts such as
safety or TACCP (Threat Analysis and Critical Control Point plan) and
spoiled products or stolen goods. Spoiled products and stolen goods are gen-
food defence approach. These new perspectives include: (1) when fo-
uine, authentic products and do not include an “adulterant.” In 2017, the US
Pharmacopeia defined “adulterant” as “any undeclared biological or chemical cusing on the diagnosis or root-cause, food fraud is a fundamentally
agent, foreign matter, or other substance in food that may (though not ne- different problem than food safety, food quality, or food defense; (2) the
cessarily) compromise food safety or suitability” (USP 2017). Codex Ali- need to shift focus from incident risk mitigation to strategic vulnerability
mentarius does not have a definition of adulterant, adulterated, or adulteration prevention (Spink et al., 2017); (3) shifting the mindset from only Food
(CODEX, 2018). Science to an interdisciplinary approach; and finally (4) applying

234
J. Spink, et al. Food Control 105 (2019) 233–241

Food Food (4)

Food Fraud
Quality Fraud (1) Gain: Economic Food Fraud
Screening/
Food Fraud Vulnerability
Harm: Strategy
Food Food Public Health,

Safety Defense (2)


Economic, or Terror
Fig. 3. The Food Fraud Vulnerability Assessment (and the simpler Food Fraud
Initial Screening tool) is a vital part of the Food Fraud Prevention Cycle (FFPC),
which is the management method for the Food Fraud Prevention Strategy.

(3)
are evidenced in the call for projects including: Standardisation and
harmonisation of untargeted food integrity methods, Innovative ap-
proaches to assure the integrity of complex foods, A feasibility study of
Fig. 1. The Food Risk Matrix (Spink & Moyer, 2011) [Notes: (1) Among others,
includes the subcategories of economically motivated adulteration (EMA) and how information can be shared along the supply chain to identify risks
food counterfeiting; (2) Among others, includes the subcategory of terrorism; to the integrity of food, and Rapid, on-site, cost-effective methods for
(3) the act of a stakeholder whether an accidental act by a legitimate stake- feed/food fraud detection (ref fip fera).
holder or an intentional deception by a fraudster or an intentional harm by an
attacker, and (4) the objective of the intentional action].
2.2. First: addressing food fraud is Fundamentally Different from addressing
food safety
decision analysis and business risk assessment to examine food fraud in
the same way as all enterprise-wide issues (Fig. 2). It is important to As research in food fraud continues to develop, it is increasingly
identify the range of disciplines that contribute to an improved un- clear that food fraud and food safety are very different issues. Relative
derstanding of food fraud and hence capability to address it but ela- to food safety, one identified gap when investigating food fraud relates
boration of each is beyond the scope of this paper. To address the to the processes of managing information and making decisions. One
complex nature of food fraud prevention, the interdisciplinary ap- capability that has been developed to address this gap is the Food Fraud
proach includes, but is not limited to: Food Science/Food Authenticity, Vulnerability Assessment, which provides a basic overview of the pro-
Criminology, Managerial Accounting, Financial Accounting, Public blem and facilitates decision-making on the scope and depth of the
Policy, Law, Supply Chain Management, Packaging Science, Informa- Food Fraud Prevention Strategy. The information and activities in the
tional Technology, Social Anthropology. Food Fraud Prevention Strategy are managed by the Food Fraud
It is important to note that the importance of food science and food Prevention Cycle (FFPC) (Fig. 3).
authenticity may seem under-represented here but it is because they are
considered a constant and thoroughly established resource. Once the
specific problem is identified, and the type of fraud defined, there are 2.3. Second: the shift from incident risk mitigation to strategic vulnerability
resources and capabilities to address the problems. An example is the prevention
Euro 13 million that was allocated by the European Commission to the
Food Integrity Project (food authenticity) in 2014 shortly after the 2013 The second new perspective was the realization that incident re-
Europe-wide horsemeat incident. The resources and focus on detection sponse methods are not usually efficient or effective to support the goal
of overall strategic prevention. A current food fraud event requires an

Risk to Vulnerability
• Diagnosis: Monitor the system weaknesses not probability of
occurence.

• Treatment: There is a range of weaknesses that required a


unique countermeasures and control systems beyond

Focus on the Final Decision to Act


• Prognosis: The final breakthrough was considering the

Fig. 2. Hierarchy of theoretical new perspectives.

235
J. Spink, et al. Food Control 105 (2019) 233–241

immediate incident response. These actions focus on finding and then is human then it is natural to apply Social Science and Criminology”
removing the illicit product that is in the marketplace. Detecting frau- (IUFoST 2016). In retrospect, this Social Science view is entirely logical,
dulent product is critical – however, it is neither prevention nor is it a but when food fraud was considered only a food safety problem, it was a
firm strategy to address food fraud. The focus on strategic prevention is novel concept. When extending food safety to food fraud, one must
a longer-term perspective that shifts the focus from catching bad pro- consider an intelligent human adversary is purposely engaging in crime
duct to preventing the incident from occurring in the first place. in order to generate economic gain, thus Criminology becomes the most
To provide richness to these new perspectives, consider a food fraud applicable science.
incident when pets became sick in the United States. The first step was to Criminology involves two primary perspectives: traditional crimin-
determine the root cause. The overall adulterant-substance motivation ology that focuses on the criminal, and environmental criminology that
was to deceive protein tests. The tests were deceived by reducing the focuses on the physical space where the crime occurs. Regardless of the
amount of authentic protein with the melamine molecule. Once illeg- perspective, both types of Criminology emphasize reducing the oppor-
ally added melamine was identified as the problem3 which is more di- tunity for crime to occur (Felson, 2013, pp. 92–99; Felson & Clarke,
rectly referred to as the “fraud opportunity,” the key next step was to 1998). The specific environmental criminology concepts that were
detect the adulterant-substance for the products in the marketplace. The presented in seminal works such as “Crime in Everyday Life” are Si-
continuing melamine detection tests would deter melamine from con- tuational Crime Prevention which, itself, is a combination of Routine
tinuing to get into the marketplace. The incident response was specific Activities Theory and Rational Choice Theory (Felson, 1998; Felson &
for detecting melamine that was in product. The response is not pre- Boba, 2010). These concepts were developed in the 1970s, and a 2017
vention and the countermeasures were not specifically focused on re- scholarly literature database keyword search for situational crime pre-
ducing the overall fraud opportunity of perpetrators even considering vention resulted in over 10,000 peer-review journal articles since 2000.
attacking the pet food and high-value ingredients. The fundamentally Situational Crime Prevention is most efficient for companies or
different approach is to first consider the root cause of the entire fraud countries because target hardening can lead to a direct and immediate
opportunity using criminology theories. This is followed by a review of impact. For example, to reduce the concern of being pick-pocketed
the resource-allocation decision-making process, which might include someone can hold their wallet in their hand. In this example, the
understanding a firm's supply chain and cost accounting as well as countermeasure or control system can be immediate, can be initiated by
regulatory/public policy issues within and across countries. This step the user, has very limited if any financial cost, and has an immediate
includes a vulnerability assessment identifying which problems are reduction in the potential for a crime to occur.
above a pre-defined risk tolerance. After those three steps, an optimal, Situational Crime Prevention is often presented visually in the form
efficient, and effective set of countermeasures and control systems can of the Crime Triangle which consists of three major components which
be proposed, approved, implemented, and managed. The FFPC com- are: victim, fraudster, and guardian and hurdle gaps (Fig. 4) (Spink &
prises each of these steps, including the ongoing management and re- Moyer, 2011).
calibration up or down of the risk treatments. Situational Crime Prevention is based on other criminology theories
The new insight from the FFPC starts in the intervention step after a that help to explain the fraud opportunity and identify crime-reducing
food fraud event. Building upon the United States Food and Drug activities. These include understanding the type of criminals and of-
Administration (FDA) Food Protection plan (FPP), an intervention step is fender organizations (Spink, Moyer, Park, & Heinonen, 2013), applying
a response to a problem. For example, in the case of melamine in infant victimology theories (Lanier & Henry, 2004), and more applied problem-
formula, the intervention step was to identify the root cause of the public oriented policing such as is presented in “Crime Analysis for Problem
health threat and then establish detection methods to identify the Solvers In 60 Small Steps text”) (Clarke & Eck, 2005). This concept of
adulterant-substance. After the problem is defined, then the next stage identifying the types of criminal and offender organizations is being
is the response step. For example, for the melamine incident, the re- codified in works such as the International Organization for Standar-
sponse was recalling a product from the market and treating the public disation (ISO) Technical Committee 292 on Security Management and
health incident. Finally, to reduce or mitigate the root-cause, there is a Resilience (ISO 2017). Specifically, this is introduced in ISO 22380
need to shift from being reactive to proactive, implementing counter- Security and Resilience – “Authenticity, Integrity, and Trust for Pro-
measures and control systems that support the prevention step (Spink & ducts and Documents – General Principles for Product Fraud Risk” and
Moyer, 2011). After the intervention and response, a prevention strategy ISO 12931 “Performance criteria for authentication solutions used to
to address the problem is needed. For example, in the melamine ex- combat counterfeiting of material goods” (ISO 2018).
ample, prevention might include: conducting routine adulterant testing,
researching for new or different types of food fraud, assessing system 2.5. Fourth: correlating the food fraud risks with all enterprise-wide risks
weaknesses that enabled the fraud, finally, a more general considera-
tion of the root-cause that could apply to other adulterant-substances or The fourth new perspective was the realization that there was a lack
to other types of products. of a methodological and standardized approach to the resource-allo-
cation decision-making for addressing food fraud. While there are often
acceptable/unacceptable thresholds defined in laws or regulations for
2.4. Third: expanding to include social sciences and criminology food safety and public health incidents (e.g., a 5-log kill step is required
for FDA Juice HACCP compliance), the same type of specifications do
The third new perspective was to develop an inter-disciplinary not always apply to or exist for food fraud. Just as the prior perspective
mindset shift extending beyond Food Science and food authenticity discussed incorporating an interdisciplinary perspective when looking
testing to include Social Science and Criminology. This shifts the focus at food fraud, there is similar value in drawing on guidance from other
from microbes and microbiology to humans and social science. It has disciplines when guiding resource allocation decisions. More specifi-
been said, “if the biological organism in question is a microbe then it is cally, food safety and food fraud decisions can be more broadly ex-
natural to apply Microbiology; since the biological organism in question amined and informed by drawing on enterprise risk management
(ERM), a rich research stream drawn from different business fields (e.g.,
3
The term “problem” is used in Criminology. Problem: “… the basic units of accounting, management, strategy, etc.). Enterprise risk management
police work rather than a crime, a case, calls, or incidents. A problem is has been widely adopted by firms. One widely used approach for op-
something that concerns or causes harm to citizens, not just the police. […] erationalizing ERM emerged out of firm compliance to the U.S.
Addressing problems means more than quick fixes: it means dealing with Sarbanes-Oxley Act in 2002 that increased firm financial regulatory
conditions that create problems” (Clarke et al., 2005). requirements in response to Enron and other financial improprieties

236
J. Spink, et al. Food Control 105 (2019) 233–241

Environmental Criminology

ps
Ga
le
rd
ST
Hu

AR
nd

T
na

The Fraud
dia
ar
Gu

Opportunity

Fraudster

Fig. 4. The Fraud Opportunity is presented here as defined in the Crime


Triangle with a differentiation between Environmental and Traditional
Criminology ((Spink & Mace, 2007) and (Spink & Moyer, 2011) Adapted from
(Felson, 1998)). Fig. 5. The “COSO Cube” which presents the Enterprise Risk Management
concepts (COSO 2014a,b).

(COSO, 2014). It is especially efficient to apply ERM concepts because


the formal systems are already defined, harmonized, implemented, The new event enters the ERM system at the location of “Event
supported with officially recognized training, and provide decision- Identification” and at the “Strategic” category and initially only at the
making support in the Internal Control–Integrated Framework (COSO “Entity-Level” of the business functions. The new event now has a
2013). formal and systematic place to enter the overall decision-making
Enterprise Risk Management is implemented by all companies in system. The preliminary or initial screening is usually conducted at a
one way or another, however, the ERM process and ways of oper- very high level, but the ERM team may expand their focus from
ationalizing the process (e.g., COSO) are not widely known by food “Strategic” into the “Operations” or “Reporting” and “Compliance.”
experts. As ERM has grown into a regulatory requirement for all public Also, the ERM team could expand their considerations from the Entity-
companies, it is an increasing useful framework for food experts to be Level down into the business such as to division, business unit, sub-
aware of and to understand. While a requirement for companies, ERM is sidiary, or others. An ERM risk assessor could now review the in-
also widely adopted by Governments, for example, in 2014 the U.S. formation needed to conduct the next step (one step down) of a “Risk
Government Accountability Office first expanded the “Standards for Assessment.” Later, as an assessment of the acceptable/unacceptable
Internal Control in the Federal Government” guidance to include COSO level, the “Risk Response,” “Monitoring” and other formalized re-
principles of Internal Control – Integrated Framework adapted to the sponses are determined.
federal government environment (GAO 2014). An important facet of ERM is to map each corporate risk to the
The “COSO Cube” provides a simple visual for how and where to magnitude of the vulnerability (COSO, 2012a). To accomplish this, each
apply food fraud vulnerability assessment in “Risk Assessment” and risk is evaluated to determine the potential likelihood of occurrence and
then enter at any level of the organization, but usually from a “Business the consequences to the firm if an event were to occur (COSO, 2012b).
Unit” such as a Quality Assurance group working to meet GFSI com- An enterprise must assess all risks and either disclose or reduce those
pliance or “Entity-Level” such as a Chief Risk Officer or Chief Financial risks above a specified risk tolerance for compliance with ERM and
Officer considering brand equity vulnerability (Fig. 5). Any risk that regulations such as the Sarbanes-Oxley Act. An example is included of
rises to the level of “enterprise risk” is then documented, monitored and food fraud vulnerabilities that are plotted on a Corporate Risk Map
managed. These risks are managed by an ERM committee, shared with (Fig. 6) (COSO 2013, Spink, Moyer et al., 2016a,b; MSU-FFI 2017a,
the Board of Directors to ensure that management is making decisions 2017b).
to minimize negative consequences from each risk, and increasingly key While this approach to the management and control of food fraud
ERM risks are included in annual reports so that all stakeholders un- may be a novel concept for Quality Assurance or Food Safety groups,
derstand threats to the company. the ERM process identifies key enterprise risks across the entire firm.
In addition to the enterprise-level approach to managing food fraud This process is widely used and has increasingly well-defined methods
risk (elevating food fraud to the level of other risks in the firm), the for implementation by organizations.
COSO cube can all be applied at a more operational level to review a These four new perspectives can be integrated to create a theoretical
food fraud incident or suspicious activity. For example, when a new foundation for managing and preventing food fraud in a much more
food fraud incident or suspicious activity is first identified, the new strategic manner incorporating top leadership throughout the organi-
event should be shared with the group that is assigned to manage food zation. At the same time, these integrated perspectives provide a
fraud incidents. In addition, this incident should also be shared with the stronger method for proactively identifying potential risks and taking
ERM committee and other key organizational stakeholders (e.g., top necessary actions (prevention, detection, incident response) as needed.
leadership, Board of Directors, etc.) as appropriate based on the severity When considering these concepts, it was recognized that there was a
of the incident. By addressing the event (food fraud committee) and realization that there was a need to connect these steps into an inter-
more fully incorporating lessons learned from the event at the ERM connected and dynamic system. The objective was to “connect every-
committee, the firm is better able to identify and prepare for new, odd, thing to everything” (IUFoST 2016). This series of new perspectives
complex, or novel risks of any kind. Over time and repeated engage- built upon a range of other basic project and resulted here in the de-
ments, the formal reporting and response process should become more velopment of the FFPC.
refined and methodical.

237
J. Spink, et al. Food Control 105 (2019) 233–241

Science/Food Authenticity, Criminology, Managerial Accounting,


Financial Accounting, Public Policy, Law, Supply Chain Management,
Packaging Science, Informational Technology, Social Anthropology.
There are “Fundamental Concepts” (Principle B) that integrates a multi-
disciplinary insight and other business activities into food fraud pre-
vention processes. As an aside, the multi-disciplinary perspectives and
activities involve combining and integrating these disciplines into one
over-arching project (Gray, 2011; Pain, 2003; Sharp et al., 2011). A
multi-disciplinary team would include a group where each member has
expertise in all the key disciplines – together they have many holistic
perspectives on the same problem. The inter-disciplinary approaches
focus on applying fundamental concepts from these diverse disciplines
separately or in sequence. An inter-disciplinary team would include a
group where each member has expertise in one of the key disciplines –
together they have perspective on the entire problem.
While the scope of this paper is on organizing the initial and most
basic concepts, regarding food fraud prevention, an initial listing of
multi-disciplinary concepts for future further application might include:

Fig. 6. An example of a Corporate Risk Map that is populated with risks (Threat • Criminology of Situational Crime Prevention for the fraud oppor-
levels are represented as red/very high, orange/high, yellow/medium, green/ tunity
low and blue/very low. The color-coding is presented in each cell, but in reality • Criminology to understand the nature of the criminals
would be bands or striations. The letters identify specific case study problems • Intelligence analysis for new information
that are referenced in the text.).
• Management, decision sciences, and psychology to understand de-
cision processes
3. Food Fraud Prevention Cycle (FFPC) • Strategy, risk analysis, and finance for the process of assessing risks
• Strategy and managerial accounting to more fully incorporate en-
The Food Fraud Prevention Cycle (FFPC) connects the new per- terprise risk management
spectives into an interconnected system that expands across all other • Food science including authenticity testing
business functions (Fig. 7). The content in the FFPC is presented as • Public policy for how laws and regulations are developed and im-
overall principles which are general concepts (e.g., A, B, & C) and steps plemented
that are the activities that are conducted (e.g., 1, 2, 3, 4, 5 & 6). The • Law enforcement challenges and priorities
FFPC is expanded on and adapted from previous works from basic ISO • Judicial and prosecution limited resources and priorities
31000 Risk Management principles, the applied total quality manage- • Supply chain management including traceability
ment principle such as in Six Sigma, the food fraud Chemistry of the
Crime foundation, and also previously unpublished teaching materials Other business functions that apply include:
(ISO 2009; ISO 2011b; MSU-FFI 2017a; Spink, 2014).
The FFPC is the map of how the activities integrate and connect. The • Key account management or sales management
FFPC is a systematic way to consider new insights or information and • Crisis management or continuity planning
connect it to understanding the fraud opportunity, re-evaluating the • Corporate communications including messaging to the fraudsters
vulnerability, and then the final assessment of acceptable/unacceptable • Procurement review of fluctuating market prices or economic
within the enterprise-wide assessment. anomalies
This entire cycle is based on several concepts including “Academic • Corporate quality and food safety review of incidents and material
Disciplines” (Principle A) that are specific fields of study such as Food goods risk assessments
• Human resources including background checks on purchasing and
corporate security employees
• Corporate security to investigate criminal activity
• Corporate compliance with laws and regulations, but also with
standards and certification
• Horizon scanning and intelligence gathering
The FFPC is coordinated for the overall objective of reducing the
fraud opportunities, linking to the Criminology concepts of guardians
and guardianship and is identified as “Application – The Guardian”
(Principle C).
The functions in the FFPC are connected and identified by numbers
and letters. An important function is the consideration of new
“Information” (Step 1) which is divided into several categories in-
cluding “Review Incidents” (Step 1A, specific food fraud incidents in-
ternally or externally), “Scanning” (Step 1B, considering broad changes
such as fluctuating market prices), and then “Public Policy” (Step 1C,
which includes new laws, regulations or priority setting such as in-
vestigations).
The core of the FFPC is the Crime Triangle which defines the factors
Fig. 7. Food Fraud Prevention Cycle (FFPC) (expanded on and adapted from that influence the “Fraud Opportunity” (Step 2) and the “Enterprise
previous works by (ISO 2009; MSU-FFI 2017a; Spink, 2014). Risk Rank” (Step 4). The connection between the two is the

238
J. Spink, et al. Food Control 105 (2019) 233–241

“Vulnerability Assessment” (Step 3) presented along with a continuum Risk Map” (Step 5).
from an “Initial Screening” (Step 3A) and more detailed “Detailed iii. FFPC Decision: If the current North Atlantic Cod Fish vulner-
Vulnerability Assessment” (Step 3B) and then assessed in “Enterprise ability is currently above the risk tolerance (point “C”) and the
Risk Management” (Step 5). After considering those steps, there is a new test reduces the vulnerability to the green zone (point “F”)
resulting “Rank” (Step 5). The “Countermeasures and Control Systems” then this new countermeasure DOES shift the vulnerability to an
(Step 6) influence the “Fraud Opportunity” to connect back into that acceptable risk tolerance. If the current position is the green zone
point (Step 2). (point “F”) and the new countermeasure reduces the vulner-
ability to the blue zone (point “H”), while this is an improvement
4. Illustrative examples: a review of new information it is not a high priority. In this scenario, this new counter-
measure does NOT address an unacceptable risk, so there is NOT
This section will provide a few application examples of the FFPC. an ERM-based justification for implementing the risk treatment.
d. Illustrative example 4: “(6) Countermeasures” – New
a. Illustrative example 1: “(1) Information” – “(1C) Public Policy”: One Countermeasure and Control System (Countermeasure): A more
example is the Negative List of the Chinese National Center for Food secure enhanced traceability system, such as reducing the oppor-
Safety Risk Assessment (CFSA). The Negative List address the food tunity for documents to be altered or forged, is considered.
fraud adulterant-substances that result in the most significant health i. FFPC Entry Point: The new information applied to the
concerns and therefore are a high priority for the Chinese govern- “Countermeasure” (Step 6).
ment to test in the marketplace. A new chemical added to the ii. FFPC Activity: The new test is considered in the “Fraud
Negative List can impact the fraud opportunity and thus, the en- Opportunity” (Step 2) and the value is judged in the
terprise-wide risk as government increases the testing of specific “Vulnerability Assessment” (Step 3) and again on the “Corporate
food products. Risk Map” (Step 5).
i. FFPC Entry Point: Step 1C – New Information/Public Policy iii. FFPC Decision: If the current traceability document security is
(Fig. 7). under the risk tolerance (point “F”,”G,” or “H”) then this new
ii. FFPC Activity: The new information is applied to the under- countermeasure addresses a vulnerability that is already accep-
standing of the Fraud Opportunity (Step 2). table. As, above, in this scenario, this new countermeasure does
iii. FFPC Decision: If this chemical is already included in substance NOT address an unacceptable risk, so there is NOT an ERM-based
testing in an early warning system, then the new information justification for implementing the risk treatment. Of course, it
does NOT fundamentally change the way we understand the fraud would be valuable to add the risk treatment if it was free in
opportunity. If the chemical is not included in the testing then it terms of financial and human resource costs.
DOES change the fraud opportunity, and the “Vulnerability
Assessment” (Step 3) is updated and plotted on the Corporate These illustrative examples demonstrate how the FFPC creates a
Risk Map. If the result is in the yellow, green or blue zone (e.g., systematic way to understand new information and supports resource-
medium, low, or very low which is presented as letter “E” allocation decision-making.
through “H”), then the new vulnerability is still within the risk
tolerance. A company may still decide to implement a new or 5. Conclusion
adjusted “Countermeasure or Control System,” but that would
further reduce a problem that is already within the acceptable The primary food protection trend related to food fraud has shifted
risk tolerance. For example, the new information may shift the from what is food fraud and is it really a problem to defining an efficient
vulnerability from blue (point “G”) to yellow (point “E”). and effective system to reduce the fraud opportunity. Following general
b. Illustrative example 2: “(1) Information” – “(1A)” Review risk analysis concepts such as ISO31000 – including the applied total
Incidents”: A new food fraud incident is found, and details are quality management principle such as in Six Sigma, or others – the steps
gathered by the risk assessor. An example could be peanut filler used to address Food Fraud include (Spink, 2019b):
in ground cumin that includes a peanut allergen.
i. FFPC Entry Point: The new information is applied to Step 1A – 1) What is Food Fraud?
New Information/Review Incidents (Fig. 7). 2) Is it a problem?
ii. FFPC Activity: The new information is applied to the under- 3) How to detect specific fraud acts? Are new tests needed? And then
standing of the Fraud Opportunity (Step 2). validate the test methods.
iii. FFPC Decision: The presence of the peanut allergen raised the 4) Do I need to act?
likelihood of detection and the consequence of an incident. The 5) How to start addressing food fraud?
vulnerability could rise to an unacceptable risk tolerance in the a) What to do (such as countermeasures or control systems in-
orange (point “E”) or red zones (e.g., high, or very high which is cluding food authenticity testing)?
presented as letter “E” to “B”). Now a very specific assessment b) How to measure success?
can be conducted to consider “Countermeasures and Control c) How much is enough?
Systems.” To note, the red and orange zones are within the un- 6) Ongoing review and process improvement.
acceptable risk tolerance range. The resource-allocation decision-
makers must take action to reduce the resulting vulnerability or It is logical that many of the early scholarly publications focus on
they would need to disclose this hazard to regulators. the basics of “what is food fraud?” and “is food fraud a problem?” The
c. Illustrative example 3: “(6) Countermeasures” – New next step is to explore how to respond to and detect the known in-
Countermeasure and Control System (Countermeasure): A new cidents including a review of test methods, publishing results and va-
countermeasure, such as more advanced species test for North lidation. Once the foundation is constructed and the countermeasures
Atlantic Cod fish, is considered. and control systems developed, it is natural that the research focus
i. FFPC Entry Point: The new information applied to the further evolves to better understand more fully managing these risks
“Countermeasure” (Step 6) (Fig. 7). proactively and shift focus to prevention strategies.
ii. FFPC Activity: The new test is considered in the “Fraud The compliance requirements of new regulations and standards
Opportunity” (Step 2) and the value is judged in the address the question “Do I need to act?”. Before defining “How to start?”
“Vulnerability Assessment” (Step 3) and again on the “Corporate there is a need to at least understand the methods to establish “How

239
J. Spink, et al. Food Control 105 (2019) 233–241

much is enough?” and “How to measure success?”. These questions are COSO, Committee of Sponsoring Organizations of the Treadway Commission (2013).
all addressed by building upon a Food Fraud Vulnerability Assessment Internal controls – integrated framework. http://www.coso.org/documents/
990025P_Executive_Summary_final_may20_e.pdf.
within the FFPC and within the overall Food Fraud Prevention Strategy COSO, Committee of Sponsoring Organizations of the Treadway Commission (2014a).
(FFPS). As more companies fully meet GFSI and Sarbanes-Oxley type COSO enterprise risk management-integrated framework update. http://www.coso.
food fraud related compliance, there will be further development of org/ermupdate.html.
COSO, Committee of Sponsoring Organizations of the Treadway Commission (2014b).
harmonized methods and opportunities to benchmark activities. These Home page. Retrieved http://coso.org/, Accessed date: 5 September 2014.
concepts will continue to evolve and be refined. The FFPC is the first COSO, Committee of Sponsoring Organizations of the Treadway Commission (2012b).
step in this evolution. Understanding and communicating risk appetiteJanuary: Larry Rittenberg and Frank
Martens 2012.
There are several key areas for further research including more DEFRA, United Kingdom Department for the Environent, Food, & Rural Affaris (2014).
detailed application of the range of disciplines (noted as “A – Academic Elliott review into the integrity and assurance of food supply networks, independent report,
Disciplines”), the refinement of the applied learnings (noted as “B – ref: PB14089, PDF, 539KB. 84 pages https://www.gov.uk/government/uploads/
system/uploads/attachment_data/file/350726/elliot-review-final-report-july2014.
Fundamental Concepts”), and further case study research which will
pdf.
provide refinement and process development of the FFPC use-case. EP, European Parliament (2013). Report on the food crisis, fraud in the food chain and the
control thereof, (2013/2091(INI). R. E. d. Lang. Committee on the Environment, Public
Funding sources Health and Food Safety, European Parliament.
Everstine, K., Spink, J., & Kennedy, S. (2013). Economically motivated adulteration
(EMA) of food: Common characteristics of EMA incidents. Journal of Food Protection,
This work was conducted under the key job responsibilities of the 76(4), 723–735.
authors. No outside funding was provided. FDA, U.S. Food and Drug Administration (2007). Food protection plan. .
FDA, U.S. Food and Drug Administration (2009). Public meeting: Economically motivated
adulteration. http://www.fda.gov/NewsEvents/MeetingsConferencesWorkshops/
Glossary ucm163619.htm.
Felson, M. (1998). Crime and Everyday life. Thousand Oaks, Calif: Pine Forge Press.
Felson, M. (2013). Routine activity approach (Chapter). Willan: Environmental criminology
Other important related terms include: and crime analysis.
Felson, M., & Boba, R. (2010). Crime and Everyday life (4th ed.). Sage Publications.
• Food security which is the consistent, safe, continuous, supply of food Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief: Practical theory for crime
prevention " police research series paper 98. London: Home Office.
(WHO 2009),
• Economically motivated adulteration which is defined by FDA as a
GAO, US Government Accountabilty Office (2014). Standards for internal control in the
federal government. GAO-14-704G: Published: Sep 10, 2014. Publicly Released: Sep
“substance” for “economic gain” (FDA 2009), 10, 2014 https://www.gao.gov/products/GAO-14-704G.

• Food authenticity which is a confirmation that the “product is what it GFSI, Global Food Safety Initiative (2014). GFSI position on mitigating the public health risk
of food fraud, global food safety initiative. Consumer Goods Forum.
says it is” (DEFRA 2014), GFSI, Global Food Safety Initiative (2017). Guidance document, benchmarking document,
• Food protection which is a combination of food safety and food de- version 7. http://www.theconsumergoodsforum.com/files/Publications/GFSI_
Guidance_Document_Intro.pdf.
fense activities (FDA 2007),
• Food integrity which is a combination of many terms and includes
GFSI, Global Food Safety Initiative (2018). Food fraud technical document. Tackling Food
Fraud through Food Safety Management Systems. May 9, 2018 http://www.mygfsi.
statements about ethical production and ecological practices com/files/Technical_Documents/201805‐food‐fraud‐technical‐document‐final.pdf.
(DEFRA 2014), Gray, J. I. (2011). Multidisciplinary research: Opportunities and challenges,November 8, 2011.


MSU Office of Graduate Research Seminar Series, East Lansing.
Food crime for which there are two definitions, one being the vio- ISO, International Organization for Standardization (2011b). ISO 13053-1:2011 quanti-
lation of a criminal statute using food, and the other a serious food tative methods in process improvement – Six Sigma – Part 1: DMAIC methodology. https://
fraud incident (NFCU 2017; van Ruth et al., 2017). www.iso.org/standard/52901.html.
ISO, International Standards Organization (2005). ISO 22000 Food safety management
systems – Requirements for any organization in the food chain. 2012 http://www.iso.
Conflicts of interest org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=35466.
ISO, International Standards Organization (2009). ISO 31000:2009 risk management -
principles and guidelines.
We declare no conflict of interest.
ISO, International Standards Organization (2011a). ISO 12931 - performance criteria for
authentication solutions for anti-counterfeiting in the field of material goods. 2012 http://
Acknowledgment www.iso.org/iso/catalogue_detail.htm?csnumber=52210.
ISO, International Standards Organization (2017). Technical committee 292 security man-
agement and resilience, work group 04 product fraud countermeasures and controls. Home
The authors alone are responsible for the views expressed in this Page https://www.iso.org/committee/5259148.html.
article, and they do not necessarily represent the views, decisions or ISO, International Standards Organization (2018). ISO 22380:2018 Security and resilience
policies of the institutions with which they are affiliated. – Authenticity, integrity and trust for products and documents – General principles for
product fraud risk and countermeasures. Status: Published, Publication date: 2018-08-
22 https://www.iso.org/standard/73857.html.
References IUFoST, International Union of Food Science and Technology (2016). Food fraud pre-
vention, scientific information bulletin (SIB). By John Spink. November 2016 http://
iufost.org/iufost-scientific-information-bulletins-sib.
Bréchon, A. L., Hanner, R., & Mariani, S. (2016). A systematic analysis across North Lanier, M., & Henry, S. (2004). Essential criminology. Philadelphia: Westview.
Atlantic countries unveils subtleties in cod product labelling. Marine Policy, 69, Lord, N., Flores Elizondo, C. J., & Spencer, J. (2017). x-The dynamics of food fraud: The
124–133. interactions between criminal opportunity and market (dys) functionality in legit-
CFSA, Chinese National Center for Food Safety Risk Assessment (2015a). China regulation imate business. Criminology and Criminal Justice, 17(5), 605–623.
and perspectives to address food fraud and non-food ingredient adulterant. Baltimore, Lord, N., Spencer, J., Albanese, J., & Elizondo, C. F. (2017). In pursuit of food system
Maryland, USA: Food Safety Summit 2015, Presented by Dr. Yongning Wu. integrity: The situational prevention of food fraud enterprise. European Journal on
CFSA, Chinese National Center for Food Safety Risk Assessment (2015b). Strategies for Criminal Policy and Research, 23(4), 483–501.
ensuring food safety of Chinese products – fight against food fraud. Presentation at the Manning, L., & Soon, J. M. (2016). X-food safety, food fraud, and food defense: A fast
institute for food technologists (IFT) annual conference 2015. Chicago, Illinois, USA: evolving literature. Journal of Food Science, 81(4), R823–R834.
Presented by Dr. Junshi Chen. Moore, J. C., Spink, J., & Lipp, M. (2012). Development and application of a database on
Clarke, R. V., & Eck, J. E. (2005). Crime analysis for problem solvers in 60 Small Steps. food ingredient fraud and economically motivated adulteration from 1980 – 2010.
Washington, DC: Center for Problem Oriented Policing. Journal of Food Science, 77(4), R118–R126.
CODEX (2018). Codex Alimentarius, home page. http://www.fao.org/fao-who- Moyer, D. C., DeVries, J. W., & John Spink (2017). “The economics of a food fraud
codexalimentarius/en/. incident–Case studies and examples including Melamine in Wheat Gluten. Food
CODEX, Codex Alimentarius (2017). Invitation to participate in the CCFICS EWG on food Control, 71, 358–364.
integrity and food authenticity, home page for WG on food integrity and food authenticity - MSU-FFI, Michigan State Univerisity Food Fraud Initiative (2017a). The role of enterprise
CCFICS 23, August 7, 2017. http://www.fao.org/fileadmin/user_upload/ risk management in food fraud prevention, MSU food fraud initiative report (FFIR), funded
codexalimentarius/invitations/EWG%20Kick%20off%20message%20fraud.pdf. by an anonymous donorhttp://foodfraud.msu.edu/wp-content/uploads/2017/03/FFI-
COSO, Committee of Sponsoring Organizations of the Treadway Commission (2012a). Backgrounder-the-role-of-ERM-in-Food-Fraud-prevention-v50.pdfhttps://youtu.be/
Risk assessment in practice - enterprise risk management. Cg8T9C8nURs.

240
J. Spink, et al. Food Control 105 (2019) 233–241

MSU-FFI, Michigan State Univerisity Food Fraud Initiative (2017b). Applying enterprise Spink, J., Bedard, B., Bruner, L., Keogh, J., Scimeca, Joseph, G., et al. (2019c).
risk management to food fraud prevention – workings of ROI vs. Vulnerability, risk to International survey of food fraud and related terminology: Preliminary results and
vulnerability, and then a case study example of a complex food fraud management system discussion. Journal of Food Science 00(00), 00-00.
(ERM2), MSU food fraud initiative report (FFIR), funded by the Kerry group's global Spink, J., Hegarty, P. V., Fortin, N. D., Elliott, C. T., & Moyer, D. C. (2019a). The appli-
supply quality team's program. August 2017 http://foodfraud.msu.edu/wp-content/ cation of public policy theory to the emerging food fraud risk: Next steps. Trends in
uploads/2017/09/BKGFF17-FFI-Backgrounder-ERM-ERM2-v46.pdfhttps://youtu. Food Science & Technology, 85, 116–128 March 2019.
be/DVl_k-7_NEw. Spink, J., & Mace, R. (2007). The business case analysis for strategic anti-counterfeit food
NFCU, United Kingdom National Food Crime Unit (2017). What is food crime and how research. Internal grants. E. C. Todd. East lansing, MI, food safety policy center (FSPC).
does it differ from food fraud? Web-page. https://www.food.gov.uk/enforcement/ Michigan State University.
the-national-food-crime-unit/what-is-food-crime-and-food-fraud. Spink, J., & Moyer, D. C. (2011). Defining the public health threat of food fraud. Journal
Pain, E. (2003). Multidisciplinary research: today's hottest buzzword. Science Career of Food Science, 76(9), R157–R162.
Magazine. Spink, J., Moyer, D., Park, H., & Heinonen, J. (2013). Defining the types of counterfeiting,
Primrose, S., Woolfe, M., & Rollinson, S. (2010). Food forensics: Methods for determining counterfeiters, and offender organizations. Crime Science, 2(8), 1–9.
the authenticity of foodstuffs. Trends in Food Science & Technology, 21(12), 582–590. Spink, J., Moyer, D. C., Park, H., Wu, Y., Fersht, V., Shao, B., et al. (2015). Introducing
Reilly, A. (2018). Overview of food fraud in the fisheries sector. FAO Fisheries and Food Fraud including translation and interpretation to Russian, Korean, and Chinese
Aquaculture Circular(C1165)I. languages. Food Chemistry, 0.
van Ruth, S. M., Huisman, W., & Luning, P. A. (2017). Food fraud vulnerability and its key Spink, J., Moyer, D. C., & Speier-Pero, C. (2016a). Introducing the food fraud initial
factors. Trends in Food Science & Technology, 67, 70–75. screening model (FFIS). Food Control, 69, 306–314.
van Ruth, S., Luning, P., Silvis, I., Yang, Y., & Huisman, W. (2018). Differences in fraud Spink, J., Moyer, D. C., & Whelan, P. (2016b). The role of the public private partnership in
vulnerability in various food supply chains and their tiers. Food Control, 84, 375–381. Food Fraud prevention—includes implementing the strategy. Current Opinion in Food
Sharp, P. A., Cooney, C. L., Kastner, M. A., Lees, J., Ram, S., Yaffe, M. B., et al. (2011). The Science (COFS), 10, 68–75 March 2016.
third revolution: The convergence of the life sciences, physical sciences, and engineering. Spink, J., Ortega, D., Chen, C., & Wu, F. (2017). Food fraud prevention shifts food risk
Massachusetts Institute of Technology. focus to vulnerability. Trends in Food Science & Technology, 62(November 2017),
Spink, J. (2014). Food fraud prevention overview, introducing the food fraud prevention cycle 215–220.
(FFPC)/food fraud prevention system. Beijing: GFSI China Focus Day 2014. SSAFE Organization (2015). Food fraud vulnerability assessment tool - FFVAT, (formerly :
Spink, J. (2018). Food fraud - a global perspective. 12th international dubai food safety Safe secure and affordable food for everyone organization). December 16 2015
conference, october 30, 2018, Dubai. http://www.ssafe-food.org/.
Spink, J. (2019b). Food fraud prevention. Publisher Springer-Verlag New York Edition USP, United States Pharmacopeia (2015). Appendix XVII: Food fraud mitigation guidance.
Number 1,Number of Pages XIX, 591, (in press) May 22, 2019; Publication Date: Food Chemicals Codex (FCC)http://www.usp.org/food-safety-integrity.
September 3, 2019]. USP, US Pharmacopeia (2017). Guidance on developing and validating non-targeted methods
Spink, J. (2019d). Chapter: Food fraud and adulteration: Where we stand today. In V. for adulteration detection.
Peter, M. Laurence, & S. Fereidoon (Eds.). Encyclopedia of food Chemistry(1st ed.). WHO, World Health Organization (2009). Food security. Retrieved http://www.who.int/
Elsevier ISBN 0128140453. trade/glossary/story028/en/, Accessed date: 29 January 2009.

241

You might also like