You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/317946008

Food fraud vulnerability and its key factors

Article  in  Trends in Food Science & Technology · June 2017


DOI: 10.1016/j.tifs.2017.06.017

CITATIONS READS

6 1,109

3 authors, including:

Saskia van Ruth Pieternel A Luning


Wageningen University & Research Wageningen University & Research
190 PUBLICATIONS   3,634 CITATIONS    150 PUBLICATIONS   3,599 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Assessing risk of acrylamide in French fries production in Malaysian food service establishments from a techno-managerial approach
View project

Risk-based auditing in the food chain View project

All content following this page was uploaded by Pieternel A Luning on 02 October 2017.

The user has requested enhancement of the downloaded file.


Trends in Food Science & Technology 67 (2017) 70e75

Contents lists available at ScienceDirect

Trends in Food Science & Technology


journal homepage: http://www.journals.elsevier.com/trends-in-food-science-
and-technology

Commentary

Food fraud vulnerability and its key factors


Saskia M. van Ruth a, b, *, Wim Huisman c, Pieternel A. Luning a
a
Food Quality and Design Group, Wageningen University and Research, P.O. Box 8129, 6700 EV Wageningen, The Netherlands
b
RIKILT Wageningen University and Research, P.O. Box 230, 6700 AE Wageningen, The Netherlands
c
Faculty of Law, VU University Amsterdam, De Boelelaan 1105, 1081 HV Amsterdam, The Netherlands

a r t i c l e i n f o a b s t r a c t

Article history: Background: Food fraud prevention and fraud vulnerability reduction are the first steps to combat food
Received 6 April 2017 fraud and require a recurrent effort throughout the food supply chain. Due to the intentional nature of
Received in revised form fraud, it requires different tactics than the common food safety approaches. However, knowledge on
13 June 2017
what determines food fraud vulnerability is limited.
Accepted 15 June 2017
Available online 26 June 2017
Scope and approach: In the current study a new food fraud vulnerability concept is explored. The concept
is based on the criminological routine activity theory and key food fraud vulnerability factors are sub-
sequently extracted and identified.
Keywords:
Counterfeiting
Key findings and conclusions: Opportunities, motivations and control measures are defined in this
Criminology concept as the three main elements of food fraud vulnerability. They can be subdivided into technical
Food adulteration opportunities, opportunities in time and place, economic drivers, culture and behavior, as well as
Fraud risk technical and managerial control measures. They are further detailed in 31 fraud vulnerability factors.
Vulnerability assessment Food fraud vulnerability threats may originate from both the external and the internal environment of a
business which means that several vulnerability factors need to be considered at multiple environmental
levels, i.e. the level of the business itself, its suppliers, its customers, the wider chain and at the (inter)
national level. The concept was further developed into a practical food fraud vulnerability self-
assessment tool with 50 questions and answering grids. This will be a valuable first step towards
fraud prevention and will assist in the global combat on food fraud.
© 2017 Elsevier Ltd. All rights reserved.

1. Food fraud commonly used working definitions of food fraud in the EU (EU,
2014).
Food fraud, food adulteration, counterfeiting and food crime are Recent food fraud scandals have further increased the need to
terms that resurface in the press frequently. Most organizations in combat fraud across supply chains (Manning & Soon, 2014). How-
this area, such as the Global Food Safety Initiative (GFSI), the Gro- ever, current food safety management systems are not specifically
cery Manufacturers Association (GMA) in the United States (US), designed for fraud control or mitigation. Due to the intentional
the US Pharmacopia (USP)and reports of the European Parliament nature of fraud, it requires an approach that differs from the
consider food fraud as an intentional, deceptive misrepresentation common safety ploys (Spink et al., 2017). In the usual current food
of foods for financial gain (Spink, Ortega, Chen, & Wu, 2017). Food management approaches honesty is presumed. This presumption
fraud is broader than (economically motivated) adulteration only. makes us generally vulnerable to deception (Levine, 2014), but in
Food fraud usually comprises misrepresentation (e.g. counter- addition we have to consider that food fraudsters will put all efforts
feiting) as well as adulteration and in some definitions also theft, on disguising their illegal activities. Therefore, in order to tackle
tampering, diversion, tax evasion, grey market and overrun. In the food fraud we need to shift from the safety-based approach to the
current study we will focus on the food fraud aspects related to fraud prevention and vulnerability reduction approach and take
adulteration and misrepresentation only, which is in line with the into account these deliberate and disguising aspects. Fraud
vulnerability can be defined as a weakness or flaw that creates
opportunities for undesirable events related to the system (Spink
* Corresponding author. Food Quality and Design Group, Wageningen University
et al., 2017). However, so far little has been reported on which as-
and Research, P.O. Box 8129, 6700 EV Wageningen, The Netherlands.
E-mail addresses: saskia.vanruth@wur.nl (S.M. van Ruth), w.huisman@vu.nl pects impact on food fraud vulnerability. In the current study, we
(W. Huisman), pieternel.luning@wur.nl (P.A. Luning). aim to unravel these aspects by framing food fraud vulnerability

http://dx.doi.org/10.1016/j.tifs.2017.06.017
0924-2244/© 2017 Elsevier Ltd. All rights reserved.
S.M. van Ruth et al. / Trends in Food Science & Technology 67 (2017) 70e75 71

with a criminological theory and by identifying key factors that add victimized by fraud (Holtfreter, 2014). Therefore, food fraud
to the vulnerability (susceptibility) to fraud. Since knowledge on vulnerability threats from both the external and the internal
what is driving potential food fraudsters is merely lacking, some environment of a business should be considered, which means that
factors are extrapolated from research on other (corporate) crimes. one needs to be receptive to external threats as well as to the dark
side of the own organization. The external environmental dimen-
2. The routine activity theory and main food fraud sion consists of different layers, i.e. (A) the direct suppliers and
vulnerability concept customers, (B) the wider chain/industry network and (C) the (inter)
national environment. Along this dimension of environmental
Fraud is a form of criminal behavior in any definition of crime. layers, the span of control of a company decreases as well as its
Two types of definitions of crime exist: the legal (acts forbidden by ability to obtain reliable data.
law) and the non-legal definition. Although these two do not fully
overlap, they share crucial defining elements: i.e. criminal behavior 3.1. Opportunities
is harmful and morally reprehensible (Passas, 2005). Food fraud
will qualify for both. 3.1.1. Technical opportunities
A criminological theory that has integrated the relevant vari- The ease of adulteration/counterfeiting of certain types of
ables for explaining crime and that has gained great popularity in products and the general availability of knowledge and technology
criminology and received much validation is the routine activity to adulterate in a particular chain will increase the vulnerability to
theory of Cohen and Felson (1979). The routine activity theory sees fraud. For instance products in a specific physical state, e.g. liquids,
crime as the outcome of the convergence in time and place of (1) are more susceptible to fraud than others (Jack, 2015). The avail-
motivated offenders and (2) suitable targets in (3) the absence of ability or absence of detection methods affects the general fraud
capable guardians. A routine activity approach seems particularly vulnerability as well. Fraudulent products may not be visually
appropriate for the study of corporate crime, as it is committed at recognizable or detected with simple methods (T€ ahka
€pa a, Maijala,
€€
the workplace and thus directly arises out of the routines of Korkeala, & Nevas, 2015). With more advanced analytical charac-
everyday life. Furthermore, because of their job and position many terization being needed for certain aspects and product groups, the
white-collar offenders have a specialized access to their targets susceptibility to fraud increases. Complexity of the foods or raw
(Felson & Boba, 2010). Corporate crime involves illegal acts material and natural variability of the composition of products adds
committed by or on behalf of corporations, which operate in to the analytical testing complexity (Moyer, DeVries, & Spink, 2017;
legitimate branches of industry (Clinard & Yeager, 1980). For them Pustjens, Weesepoel, & van Ruth, 2015).
this is, so to say, criminal business on the side. Since the majority of
food fraud occurs in the regular supply chain, food fraud shows 3.1.2. Opportunities in time and place
similarities with other corporate crimes (Lord, Flores Elizondo, & Fraud opportunities increase when potential fraudsters have
Spencer, 2017). Therefore, the routine activity theory principles legitimate access to the location in which the fraud can be
are fairly suitable to describe the concept of food fraud vulnerability committed, i.e. access to the product, processing lines, etc. (Benson
in order to get insights into the ‘what’ and the ‘who’, but also & Simpson, 2009). Similar to food defense, access of unauthorized
especially the ‘why’ of food fraud. personnel and lack of physical safeguards will increase opportunity
In accordance with the routine activity theory, food fraud (Buckhoff, 2002). Furthermore, opportunities increase when the
vulnerability can be defined by the three elements: opportunities offender is spatially separated from the victim (Benson & Simpson,
(suitable target), motivations (motivated offender)and control 2009). Thus increase of the complexity and of a supply chain
measures (guardianship) as presented in Fig. 1. The opportunities network will enhance fraud vulnerability, since it usually decreases
point out why offenders are able to commit fraud and motivations the transparency of the network (Sarpong, 2014).
detail why offenders would want to commit fraud (Coleman, 1987).
The control measures in place may counteract the vulnerability 3.2. Motivations
resulting from opportunities and motivations.
3.2.1. Economic drivers
3. Food fraud vulnerability elements and detailed factors Supply and pricing, product attributes resulting in added value,
differences in pricing due to regulatory diversity in countries,
The three elements opportunities, motivations and control economic health of businesses, level of competition and financial
measures can be subdivided into six groups. These six groups strains imposed on suppliers are economic aspects that affect fraud
comprise (1) technical opportunities, (2) opportunities in time and vulnerability.
place; (3) economic drivers, (4) culture and behavior, (5) technical
control measures and (6) managerial control measures. Each group 3.2.1.1. Supply and pricing. Since food fraud always involves the
is composed of a number of fraud factors and will be described and substitution of a higher value product with one or more of less
explained in the following paragraphs (Fig. 2). expensive or lower quality alternative(s), a high value per kilogram
Research has established that people have the psychological product will add temptation to fraudsters (Johnson, 2014). When
tendency to place threats of crime outside the social group or the gaps exist between physical product availability and market de-
organization they belong to (‘the alien conspiracy’). However, of- mand (Manning & Soon, 2014)and prices shift due to regional or
fenders are employees in most cases in which companies are global supply shortages (Moyer et al., 2017) fraud vulnerability will

Fig. 1. Schematic presentation of the food fraud vulnerability concept based on the routine activity theory.
72 S.M. van Ruth et al. / Trends in Food Science & Technology 67 (2017) 70e75

Fig. 2. Overview of the food fraud vulnerability main elements and detailed factors.

also increase. Shortages may not only lead to increase of pricing but company may seek for manners to cut costs and become creative in
can also lead to a failure of fulfilling contracts with customers with regard to meeting product specifications. Examples of ways to cut
fraud becoming a last resort for economic survival (Manning & costs are the removal of the traceability system, elimination of
Soon, 2014). controls and buying ingredients or products from cheaper or un-
known suppliers (Ryan, 2015). This will all add to the vulnerability
3.2.1.2. Value adding product attributes. Attributes adding value to to fraud.
products involve products from defined provenance or production
systems (e.g. organic), or particular processing (e.g. artisanal 3.2.1.4. Financial strains. Powerful customers may also impose
products). Food quality labels, such as PDO (protected designation considerable financial strains on their suppliers. At individual
of origin), PGI (protected geographical indication) and TSG (tradi- company scale, the demand may exceed the supply of the supplier
tional specialties guaranteed) have been introduced in the EU in at a certain stage. For instance, there is limited availability of
order to protect producers of food with special qualities (Grunert & organic eggs on the market in the periods before Easter and
Aachmann, 2016). Since they retail at higher prices than their Christmas but a customer may demand large volumes of organic
counterparts, these special attributes may also increase fraud eggs and has put severe punishments in place if demands are not
vulnerability. Moreover, in some cases particular constituents add met. If the supplier is fairly dependent on the customer, the sup-
value to products, since they are used in payment schemes. For plier may feel the need to fill the gap with alternative (fraudulent)
instance, payment in the milk supply chain is based on the protein products to meet the customer's demand for its own economic
and fat contents of milk (Bijl, Kooistra, & Hogeveen, 2007). This may survival (Waters, 2011).
invite certain people to artificially increase the (apparent) content
of these payment markers and thus increase fraud vulnerability. 3.2.2. Culture and behavior
The business strategy as well as the ethical business culture of
3.2.1.3. Economic health and level of competition. Research shows organizations, former offences, corruption levels in countries in
that economic aspects influence the vulnerability to fraud in gen- which organizations operate and victimization are factors that in-
eral (Simpson & Rorie, 2016). Depending on both the person and fluence cultural and behavioral aspects of fraud vulnerability.
the situation, economic motivation can take two very different
forms: profit maximization or loss minimization, in other words 3.2.2.1. Business strategy. Individual potential fraudsters may be
the drive for more material gain versus the fear of losing what was influenced by the business strategy of their organization, as has
already gained (Benson & Simpson, 2009; Coleman, 1987). The been shown for other corporate crimes (Huisman, 2016). Em-
motivation for committing white-collar crime e greed or need e ployees may perceive business strategies that involve hard-to-
strongly depends on the situation: e.g. situations in which criminal reach (short term) financial goals that are being put forward by
opportunities that are too strong to resist and situations in which their organizations as a threat. For the sake of saving themselves
law breaking is perceived as unavoidable for economic survival from being fired, the employees may decide to reside to unethical
(Huisman, 2016). With regard to the latter, the economic health of a behavior, especially if there are no specific requirements given in
business and level of competition are important factors in fraud regard to how the goals should be achieved (Nyaga, Whipple, &
vulnerability. Under economically severe weather conditions, a Lynch, 2010).
S.M. van Ruth et al. / Trends in Food Science & Technology 67 (2017) 70e75 73

3.2.2.2. Ethical business culture. Companies with a stronger ethical 3.3.1. Technical measures
corporate environment have employees who are more willing and Technical measures (hard controls) refer to those aimed at
are more strongly committed to adhere to the organizations’ rules detection of fraud by generating data and actual information on the
and regulations (Rae & Subramaniam, 2008). This in turn limits the prevalence of adulterated products. Fraud monitoring systems are
risk of unethical behavior. On the contrary, a culture characterized essential tools for organizations and should be in place in order to
by demotivation, mistrust and dissatisfaction can be a breeding evaluate, remedy and improve organization's fraud prevention and
ground for unethical behavior (Kaptein, 2011a). Furthermore, un- detections techniques (Crain, Hopwood, Pacini, & Young, 2016). The
ethical business cultures generate processes of the normalization of effectiveness of such systems depends on the use of scientific
fraud, which again reinforces longer-term fraudulent activity knowledge, specific information, being structured and procedural
(Coleman, 1987). driven and on independency (Luning et al., 2009). For fraud con-
trols this means that the monitoring systems for incoming material
3.2.2.3. Former offences. Criminal offences that have occurred control that include systematic sampling plans, accurate and spe-
previously have a higher risk of reoccurring. The history of prior cific fraud detection methods, clear fraud monitoring produces and
violations of the law indicates firm engagement in a pattern of strict documentation will enhance the odds of detecting fraudulent
wrongdoing, such as illegal activities, which can result in repeated products. Advancing towards effective fraud monitoring systems
violations. Event history analysis on illegal corporate behavior has require the development of specific and effective analytical
elucidated that a history of prior violations implies a 19 times methods and widespread access to screening methods (Everstine,
higher likelihood of illicit behavior in the future (Baucus & Near, Spink, & Kennedy, 2013). Furthermore, the use of indirect data,
1991). The relationship between prior violations and illegal such as those from mass balance control and tracking and tracing
behavior appears to indicate that some companies have a culture systems (Everstine et al., 2013; Manning & Soon, 2014) can
that reinforces illegal activities (Baucus & Near, 1991). Moreover, contribute to fraud control. Because of the ability to find informa-
companies which are in certain industries rife with wrong-doing tion on the history, process as well as the location of a product or
behaviors are more likely to commit crime or are being influ- ingredient, traceability tools can be used to prevent or eliminate
enced (Simpson, 2011). Therefore, former criminal offences of or- illegal, unreported and unregulated products (Charlebois &
ganizations and individuals potentially increase the vulnerability to Haratifar, 2015) which will help to reduce fraud vulnerability.
fraud.
3.3.2. Managerial measures
The managerial measures (soft controls) are more preventive in
3.2.2.4. (Inter)national corruption level. The risk of food fraud de-
nature and aim at reducing opportunities and or motivations in the
pends not only on company practices, but also on general global
management system and the chain environment. Typical mana-
practices. A factor, which can influence food fraud risk is the cor-
gerial measures that can be implemented at company level include
ruption level in a given country (Spink & Moyer, 2011); which is
ethical codes of conducts, integrity screening and whistle blowing
affected by the geopolitical situation (Food Chemical Codex, 2014).
systems. At supply chain level, measures such as contractual re-
In countries with a high level of corruption, firms have been shown
quirements with suppliers addressing specifically fraud prevention,
to choose more often illegal or immoral means to gain profits
extensive self-regulation and social control across the supply chain
(Martin, Cullen, Johnson, & Parboteeah, 2007).
with transparent feedback/actions on criminal behavior and sector/
branch guidelines to enhance fraud awareness and support fraud
3.2.2.5. Victimization. Although companies may not be directly mitigation measures can contribute to the reduction of fraud
involved in food fraud, they may be victimized by activities of vulnerability. At the wider environmental level, national food laws
others in the chain or sector of industry. Those victimized are more and their enforcement are pivotal in fraud control (Spink, Fortin,
likely to become (in)directly involved in future frauds again. Repeat Moyer, Miao, & Wu, 2016).
victimization is often the result of factors that were already present
and which were not mitigated after the first victimization. 3.3.2.1. Code of conduct. A code of conduct is a written, distinct,
Frequently it is impossible to change these factors by the victimized formal document, which consists of moral standards and which
company since they are out of its span of control. If it has become a help guide employees or corporate behavior. Codes of conduct are
certain culture to commit fraud in a particular supply chain generally favorable toward the creation of a stronger ethical
network, law-abiding businesses in the same chain are affected as corporate climate and relate to positive ethical behavior (Kaptein,
well. When major competitors of a company perform well, in part 2011b) and thus will reduce fraud vulnerability.
as a result of illegal methods, it becomes difficult for other com-
panies to choose only legal actions (Baucus & Near, 1991). In some 3.3.2.2. Employee integrity screening. Effective and extensive
cases these businesses are affected to the extent that they have to screening of prospective employees generally reduce the rate of
choose between ‘being driven out of business’ or ‘swim with the employee theft and other illegal behavior (Anderton & Kiely, 1988).
tide’ to survive the severe and unfair competition (Callmann, 1940). Similarly, a proper screening method adopted by companies in the
This will influence the odds of repeated victimization and thus process of employee recruitment is assumed to be effective in
affect fraud vulnerability. reducing the rate of committing fraud by employees and therefore
helps to control fraud in the own organization.
3.3. Control measures
3.3.2.3. Whistle-blowing. Whistle-blowing has been shown a
Fraud control measures can counteract the vulnerability arising powerful tool in the uncovering of fraudulent practices in the food
from opportunities and motivations. Food safety management sector (De Lange, 2013). Often fraud has been reported by whistle-
systems commonly involve preventive, intervention and moni- blowers. Whistle blowing requires a safe environment for reporting
toring strategies together with assurance activities such as valida- frauds that otherwise may go undetected.
tion and verification to ensure food safety (Luning et al., 2009).
Fraud controls require a similar generic approach but need to be 3.3.2.4. Social control/self-regulation/guidance. In food businesses,
focused on fraud issues taking into account its intentional nature. formal, informal contacts play an important role in preventing or
74 S.M. van Ruth et al. / Trends in Food Science & Technology 67 (2017) 70e75

Opportunities Motivations Control measures


1 12 32
3 31 3 13 50 3 33
11 2 30 14 49 34
2 29 2 15 2
48 35
10 3
1 28 1 16 47 1 36
0 27 0 17 46 0
37
9 4
26 18 45 38
8 5 25 19 44 39
24 20 43 40
7 6 23 21 42 41
22

Fig. 3. Example spider web diagrams for opportunities, motivations and control measures from the SSAFE food fraud vulnerability self-assessment tool for an olive oil procuring
food manufacturer. Numbers in black refer to the 50 questions of the tool and numbers in grey refer to low, medium and high vulnerability situations. For opportunities and
motivations a score of 1, 2, 3 refers to low, medium and high vulnerability, respectively. For control measures the order is reversed.

condoning of illegal behavior (May 2004). Social control is usually presented in spider web diagrams for a first impression of the re-
taking place in the form of joint problem solving, participatory sults of the assessment (Luning et al., 2011). Spider web diagrams
decision making, thorough information exchange and fulfillment of for an olive oil procuring food manufacturer from a preliminary
promises (Li, Xie Teo, & Peng, 2010). However, when the complexity study are shown in Fig. 3 as an example. Larger red areas for op-
of food supply chains grows, social control in the supply chain di- portunities and motivations indicate increased vulnerability,
minishes, which add to the vulnerability to fraud. Since food whereas the larger green area is associated with a higher number or
authenticity has hardly any priority in legislation, the authenticity more adequate control measures. For further details and practical
of food heavily depends on self-regulation and social control across use of the tool we refer to the SSAFE website (SSAFE, 2017).
supply chains (Elliot, 2014). Communication of industry-wide best
practices and guidelines are also valuable to ensure the food 5. Conclusions
quality/authenticity within the whole supply chain (Lummus &
Vokurka, 1999). Food fraud vulnerability is arising from the elements opportu-
nities, motivations and control measures which can be subdivided
3.3.2.5. Laws and enforcement. Food fraud has never been a key into technical opportunities, opportunities in time and place, eco-
priority for legislation and enforcement in the EU and on national nomic drivers, culture and behavior, technical control measures
level (De Lange, 2013). Food fraud laws, regulations, standards and and managerial control measures. Various factors contributing to
certifications are underdeveloped but the topic is beginning to be food fraud have been identified and were collated in a practical
addressed (Spink et al., 2017). Ambiguous, vague laws and little food fraud vulnerability assessment, which adds to fraud preven-
enforcement create opportunities for fraudsters to commit fraud tion. Due to the dynamic nature of food fraud and widespread
(Gussow & Kuiper, 2014). More legislation or increasing sanctions occurrence, fraud prevention is not a once-off activity by a single
can help reducing fraud vulnerability (De Lange, 2013). player but will need to become a recurrent effort at multiple levels
in the food supply chain. The approach will help businesses to
3.3.2.6. Contingency plans. Contingency plans are plans devised for control food fraud, but it will also assist to develop knowledge on
dealing with emergencies and focus on the development of effec- what is driving food fraud. With the approach the prime fraud
tive policies and procedures. Although risk is unavoidable, contin- drivers, enhancers and relevant control measures across chains and
gency plans are formulated to ensure that incidents do not escalate actors can be identified and compared in future research.
and are investigated in a consistent and uniform manner across an
organization (Iyer & Samociuk, 2006). Therefore, contingency plans Acknowledgements
may also play an important role in the protection of businesses
from fraud threats and associated avoidable damage, as a last Authors acknowledge financial support from SSAFE for the
resort. development of the practical tool from the fraud vulnerability
concept and thank SSAFE and industry/authorities/scientists
involved for the fruitful collaboration.
4. From concept to practical tool

Appendix A. Supplementary data


From the food fraud vulnerability concept and key factors
described above a tool was developed by the organization SSAFE
Supplementary data related to this article can be found at http://
and the authors of this publication. SSAFE is a global non-profit
dx.doi.org/10.1016/j.tifs.2017.06.017.
membership organization to help integrate food safety, animal
health and plant health across food supply chains to improve public
health and wellbeing (SSAFE, 2017). Through an interactive and References
iterative process with representatives from the global food in- Anderton, B., & Kiely, J. (1988). Employee theft. Personnel Review, 17(5), 37e43.
dustry, retail, authorities and scientific community a food fraud Baucus, M. S., & Near, J. P. (1991). Can illegal corporate behavior be predicted? An
vulnerability self-assessment comprising 50 questions and associ- event history analysis. Academy of Management Journal, 34(1), 9e36.
Benson, M. L., & Simpson, S. S. (2009). White collar crime: An opportunity perspective
ated answering grids was developed and globally tested. The 50
(criminology and justice studies). New York: Routledge.
questions have arisen from the fraud vulnerability factors described Bijl, R., Kooistra, S. R., & Hogeveen, H. (2007). The profitability of automatic milking
in this publication, 9 of which relate to opportunities, 20 to moti- on Dutch dairy farms. Journal of Dairy Science, 90(1), 239e248.
vations and 21 to control measures. The answering grids present Buckhoff, T. A. (2002). Preventing employee fraud by minimizing opportunity. The
CPA Journal, 72, 64e66.
descriptions of low, medium and high vulnerability situations for Callmann, R. (1940). What is unfair competition. The Georgetown Law Journal, 28(5),
each question and link to a score system. The scores (1,2,3) can be 585e607.
S.M. van Ruth et al. / Trends in Food Science & Technology 67 (2017) 70e75 75

Charlebois, S., & Haratifar, S. (2015). The perceived value of dairy product trace- historical perspective and practical guidelines. Industrial Management & Data
ability in modern society: An exploratory study. Journal of Dairy Science, 98(5), Systems, 99(1), 11e17.
3514e3525. Luning, P. A., Jacxsens, L., Rovira, J., Ose "s, S. M., Uyttendaele, M., & Marcelis, W. J.
Clinard, M. B., & Yeager, P. C. (1980). Corporate crime. New York: Free Press. (2011). A concurrent diagnosis of microbiological food safety output and food
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine safety management system performance: Cases from meat processing in-
activity approach. American Sociological Association, 44, 588e608. dustries. Food Control, 22(3e4), 555e565.
Coleman, J. W. (1987). Toward an integrated theory of white-collar crime. American Luning, P. A., Marcelis, W. J., Rovira, J., Van der Spiegel, M., Uyttendaele, M., &
Journal of Sociology, 93, 406e439. Jacxsens, L. (2009). Systematic assessment of core assurance activities in
Crain, M. A., Hopwood, W. S., Pacini, C., & Young, G. R. (2016). Essentials of forensic company specific food safety management systems. Trends in Food Science &
accounting. New York: Wiley. Technology, 20, 300e312.
De Lange, E. (2013). Food crisis, fraud in the food chain and the control thereof. Eu- Manning, L., & Soon, J. M. (2014). Developing systems to control food adulteration.
ropean Parliament report 2013/2091(INI). Brussels: European Parliament. Food Policy, 49, 23e32.
Elliot, C. (2014). Elliot review into the integrity and assurance of food supply networks Martin, K. D., Cullen, J. B., Johnson, J. L., & Parboteeah, K. P. (2007). Deciding to bribe:
e final report. https://www.gov.uk/government/uploads/system/uploads/ A cross-level analysis of firm and home country influences on bribery activity.
attachment_data/file/350726/elliot-review-final-report-july2014.pdf. Academy of Management Journal, 50(6), 1401e1422.
EU. (2014). European Parliamentary Research Service (EPRS) briefing (16/01/2014) on May, P. J. (2004). Compliance motivations: Affirmative and negative bases. Law and
fighting food fraud. http://www.europarl.europa.eu/RegData/bibliotheque/ Society Review, 38(1), 41e68.
briefing/2014/130679/LDM_BRI(2014)130679_REV1_EN.pdf. Moyer, D. C., DeVries, J. W., & Spink, J. (2017). The economics of a food fraud incident
Everstine, K., Spink, J., & Kennedy, S. (2013). Economically motivated adulteration e case studies and examples including melamine in wheat gluten. Food Control,
(EMA) of food: Common characteristics of EMA incidents. Journal of Food Pro- 71, 358e364.
tection, 4, 560e735. Nyaga, G. N., Whipple, J. M., & Lynch, D. F. (2010). Examining supply chain re-
Felson, M., & Boba, R. (2010). Crime and everyday life. Beverly Hills, CA: Sage. lationships: Do buyer and supplier perspectives on collaborative relationships
Food Chemical Codex. (2014). Appendix XVII: Guidance on food fraud mitigation (Vol differ? Journal of Operations Management, 28(2), 101e114.
2015, pp. 723e735) (December). Passas, N. (2005). Lawful but awful: ‘Legal corporate crimes’. Journal of Socio-eco-
Grunert, K. G., & Aachmann, K. (2016). Consumer reactions to the use of EU quality nomics, 34(6), 771e786.
labels on food products: A review of the literature. Food Control, 59, 178e187. Pustjens, A. M., Weesepoel, Y., & van Ruth, S. M. (2015). Chapter 5: Food fraud and
Gussow, K. E., & Kuiper, L. H. (2014). De bestrijding van voedselfraude in Nederland. authenticity: Emerging issues and future trends. In C. Leadley (Ed.), Innovation
ele Verkenningen, 40(2), 8e27.
Justiti€ and future trends in food manufacturing and supply chain technologies (pp. 3e20).
Holtfreter, K. (2014). Fraud victimization. In G. J. N. Bruinsma, & D. Weisburd (Eds.), Cambridge: Woodhead Publishing.
Encyclopedia of criminology and criminal justice (pp. 1829e1836). New York: Rae, K., & Subramaniam, N. (2008). Quality of internal control procedures: Ante-
Springer. cedents and moderating effect on organisational justice and employee fraud.
Huisman, W. (2016). Criminogenic organizational properties and dynamics. In Managerial Auditing Journal, 23(2), 104e124.
S. R. Van Slyke, M. L. Benson, & F. T. Cullen (Eds.), The Oxford handbook of white- Ryan, J. M. (2015). Food fraud. London: Academic Press.
collar crime (pp. 435e462). Oxford: Oxford University Press. Sarpong, S. (2014). Traceability and supply chain complexity: Confronting the issues
Iyer, N. K., & Samociuk, M. (2006). Fraud and corruption: Prevention and detection. and concerns. European Business Review, 26(3), 271e284.
Farnham: Gower Publishing. Simpson, S. S. (2011). Making sense of white collar crime: Theory and research. The
Jack, L. (2015). Risk modelling of food fraud motivation: ‘NSF fraud protection model’ Ohio State Journal of Criminal Law, 8, 481e502.
intelligent risk model scoping project FS 246004: Final report. London: Food Simpson, S. S., & Rorie, M. (2016). Economic fluctuations and crises. In S. R. Van
Standards Agency. Slyke, M. L. Benson, & F. T. Cullen (Eds.), Oxford handbook of white- collar crime
Johnson, R. (2014). Food fraud and ‘economically motivated adulteration’ of food and (pp. 326e344). Oxford: Oxford University Press.
food ingredients. Congressional Research Report R43358 https://fas.org/sgp/crs/ Spink, J., Fortin, N. D., Moyer, D. C., Miao, H., & Wu, Y. (2016). Food fraud prevention:
misc/R43358.pdf. Policy, strategy, and decision-making e implementation steps for a government
Kaptein, M. (2011a). Understanding unethical behavior by unraveling ethical cul- agency or industry. CHIMIA International Journal for Chemistry, 70(5), 320e339.
ture. Human Relations, 64(6), 843e869. Spink, J., & Moyer, D. C. (2011). Defining the public health threat of food fraud.
Kaptein, S. P. (2011b). Towards effective codes: Testing the relationship with un- Journal of Food Science, 76(9), R157eR163.
ethical behavior. Journal of Business Ethics, 99(2), 233e251. Spink, J., Ortega, D. L., Chen, C., & Wu, F. (2017). Food fraud prevention shifts the
Levine, T. R. (2014). Truth-Default Theory (TDT). A theory of human deception and food risk focus to vulnerability. Trends in Food Science & Technology, 62,
deception detection. Journal of Language and Social Psychology, 33(4), 378e392. 215e220.
Li, Y., Xie, E., Teo, H.-H., & Peng, M. W. (2010). Formal control and social control in SSAFE (2017). http://www.ssafe-food.org/. Last accessed 13-06-2017.
domestic and international buyer-supplier relationships. Journal of Operations Ta
€hka€pa€€a, S., Maijala, R., Korkeala, H., & Nevas, M. (2015). Patterns of food frauds
Management, 28(4), 333e344. and adulterations reported in the EU rapid alarm system for food and feed and
Lord, N., Flores Elizondo, C. J., & Spencer, J. (2017). The dynamics of food fraud: The in Finland. Food Control, 47, 175e184.
interactions between criminal opportunity and market (dys)functionality in Waters, D. (2011). Supply chain risk management: Vulnerability and resilience in lo-
legitimate business. Criminology & Criminal Justice, 1e19. gistics. London: Kogan Page Publishers.
Lummus, R. R., & Vokurka, R. J. (1999). Defining supply chain management: A

View publication stats

You might also like