You are on page 1of 6

Trends in Food Science & Technology 62 (2017) 215e220

Contents lists available at ScienceDirect

Trends in Food Science & Technology


journal homepage: http://www.journals.elsevier.com/trends-in-food-science-
and-technology

Food fraud prevention shifts the food risk focus to vulnerability


John Spink a, *, David L. Ortega b, Chen Chen c, Felicia Wu c
a
1129 Farm Lane, B51, East Lansing, MI 48864, USA
b
446 W. Circle, East Lansing, MI 48824, USA
c
469 Wilson Rd, East Lansing, MI 48824, USA

a r t i c l e i n f o a b s t r a c t

Article history: Background: Food fraud e including the sub-category of economically motivated adulteration e is illegal
Received 28 October 2016 intentional deception for economic gain using food. The types of food fraud include adulterant-
Received in revised form substances (adulteration), substitution, dilution, stolen goods, tampering, diversion and gray market
19 January 2017
product, smuggling, unauthorized product or unauthorized re-filling, misrepresentation or mislabeling,
Accepted 13 February 2017
Available online 27 February 2017
and intellectual property rights counterfeiting. Key events include Sudan Red colorant, melamine in
infant formula and pet foods, species swapping of fish, counterfeit branded chocolate, and horsemeat in
packages labeled as beef. While most food fraud events do not have an immediate hazard, the food
Keywords:
Food fraud
supply is vulnerable. The issue involves intelligent human adversaries, so the response is uniquely
Economically motivated adulteration complex regarding mitigation and prevention.
Vulnerability Scope and approach: This commentary provides insight on the unpredictability and potential economic
Assessment gain to fraudsters; and presents food fraud as an emerging, unique and autonomous food research area.
Crime The need to assess a food fraud event shifts the focus from the traditional internal process controls and
Food safety human health risk assessment to prevention and vulnerability reduction. The goal is not to catch food
fraud but to prevent the event from ever occurring e food fraud prevention.
Key Findings and Conclusions: Often, traditional food safety or food defense countermeasures and
assessment methods are ill-fitting tools for the unique food fraud prevention goals. To address the root
cause of fraud, food science and technology research should expand to include social science, crimi-
nology, and business decision-making. This commentary provides insight that a shift from “risk”
“mitigation” to “vulnerability” “prevention” is necessary for food fraud prevention. We provide clarity on
important terms, which include event, incident, hazard, crisis, and threat.
© 2017 Elsevier Ltd. All rights reserved.

1. Introduction illegally added “adulterant-substance,” there was no identified


public health hazard. Yet this event had a massive economic
Food fraud events e illegal intentional deception for economic impact: widespread product recalls and costly authenticity
gain using food - can occur in all stages of the supply chain and testing, and the effective halting of almost all ground beef sales
often cross international borders (Everstine, Spink, & Kennedy, in the United Kingdom and across Europe.
2013; Moore, Spink, & Lipp, 2012). Under certain circum- In another food fraud event,1 several multinational food service
stances, food fraud can have significant health and economic companies were victims of an alleged date-code tampering scheme
implications, but not always. In recent years, illegally added that led to the distribution and sale of illegal expired meat
horsemeat to beef products created economic and consumer (Premanandh, 2013; EC, 2015). There was technically no “adul-
confidence crises across Europe (EC, 2015). Prior to detection, no terant-substance” in this event, and numerous tests confirmed that
one except the fraudsters knew that the less expensive horse- there was no public health hazard. Nonetheless, this event had a
meat was in the beef product. While the horsemeat is clearly an

1
This study uses the term ISO 31000 Risk Management term “event.” Later the
terms will be reviewed in more detail including “incident,” “threat,” and “hazard.”
* Corresponding author. This is not in conflict with other laws, regulations, standards and certifications. For
E-mail addresses: spinkj@msu.edu (J. Spink), dlortega@msu.edu (D.L. Ortega), additional comments about following ISO 31000 see Leitch (2010) and Purdy
chenc115@msu.edu (C. Chen), fwu@msu.edu (F. Wu). (2010).

http://dx.doi.org/10.1016/j.tifs.2017.02.012
0924-2244/© 2017 Elsevier Ltd. All rights reserved.
216 J. Spink et al. / Trends in Food Science & Technology 62 (2017) 215e220

massive economic impact; as after the discovery of the false expi- Table 1
ration dates, several multi-national restaurants had no meat Summary of Terms with a statement of occurrence, harm and intentional.

product to sell in several countries. Due to this event, one of the Term Occurred Hazard or Crisis Intentional
victims of fraud, McDonald's Corporation, was estimated to have Event Yes Maybe Maybe
had a stock price drop of more than $500 million on the day the Incident Yes Yes Maybe
event was reported, and a monthly global sales loss of over $40 Hazard No Yes Not usually for Food
million2 (Forbes, 2014; Jargon, 2014). Crisis Yes Yes Maybe
Threat No Yes Usually for Food
Both events highlight the failure of traditional food safety and
Vulnerability No Maybe No
food defense systems and processes to address food fraud vulner- Risk Maybe Maybe Maybe
ability. The deception in food fraud cases can be adulterant-
substances (adulteration), substitution, dilution, stolen goods,
tampering (including date-code tampering), diversion and gray
There are many instances where e even in laws or regulations e
market product (e.g. product sold outside its intended supply chain
the most basic and fundamental terms are not defined explicitly or
or market), smuggling, unauthorized product or unauthorized re-
included in a glossary. Where there were discrepancies in termi-
filling, misrepresentation or mislabeling, and intellectual property
nology, this study follows the International Standards Organization
rights counterfeiting (Spink & Moyer, 2011; DEFRA, 2014; EC, 2014;
(ISO) practices (ISO, 2007; 2007a, 2007b). Usually discrepancies are
GFSI, 2014). To successfully commit these acts, the fraudsters are
variations of common terms applied to a specific product or
clandestine, stealthy, diligent in seeking opportunities, often well-
application such as the US FDA food laws defining a “hazard” as
funded, and patient in waiting for fraud opportunities. A great
“any biological, chemical (including radiological), or physical agent
challenge is that food fraud acts occur outside the authorized
that has the potential to cause illness or injury.”3
supply chain, and often do not involve adding a monitored sub-
The things that could, are likely to, or have happened are defined
stance (an adulterant or contaminant that is monitored). Addi-
as an event or a crisis. An event is essentially something that occurs
tionally, fraudsters usually demonstrate technological expertise
(Table 1) (ISO, 2002; CNSSI, 2010; Merriam-Webster, 2004). There
and actively seek to avoid detection (Primrose, Woolfe, & Rollinson,
is no evaluation yet of the change in the consequence. A type of
2010).
event is an incident that has occurred and evaluated and that could
Although food fraud prevention is emerging as a unique food
have a negative consequence (DHS, 2008; ANSI, 2009; CNSSI, 2010).
research area due to the unpredictability and potential economic
Also, a hazard is an event that has not occurred and could cause
gain to fraudsters, food fraud events are not new. From thousands
harm if not addressed (ISO, 2007b; PAS 96, 2014, NRC, 1996; 21 CFR,
of years ago, there is evidence of fraudulence involving French wine
Merriam-Webster, 2004) e this includes damaging potential (ISO,
and olive oil deceptively represented as Roman Empire products
2007b). For food this is often applied to unintentional events that
(Fortin, 2009). Many of the earliest food laws in the 1500s were
have potential to harm. A crisis is an event that has occurred e or is
created to address food fraud such as the Reinheitsgebot related
occurring e that has a confirmed harm (ANSI, 2009) e this includes
Food Purity Laws (Fortin, 2009). There are also reports of laws to
imminent hazard (21 CFR), attack, emergency (ISO, 2007b; 21 CFR,
address fraudulent acts during the Chinese Zhou Dynasty, which
FDA. 2016), disaster, etc.
spanned from 1056 to 256 BCE (Wu et al., 2017, p. 1).
The assessment of the thing that happens is expressed as risk or
Along the timeline of history, food fraud events have probably
threat. Risk is an uncertainty of an outcome that is assessed in
not increased per consumer; but globalization and industrialization
terms of likelihood and consequence (ISO, 2007a; NIST, 2002;
have amplified the scope and scale of each event. Due to global-
CNSSI, 2010; DHS, 2013). Often the consequence is sub-divided to
ization of production and distribution, modern food fraud events
other factors such as onset, severity, or other. Risk is a based on
could be massive in scale and have regional or global impact. For
factors of the probability of the threat and the susceptibility from
example, the 2007 melamine events in infant formula and pet food
vulnerability (NRC, 2009). In other applications it is an unwanted
from China had an international scope; whereas in time past, food
outcome (DHS, 2008, Codex Alimentarius, 2014, 21 CFR 50 (A)
products would largely not have been distributed outside their
(.3)(k), Merriam-Webster, 2004). A threat is the cause of an un-
neighborhood, city, valley, province or country.
wanted event that includes generally known variables or attributes
of the source of the negative consequence (“threat source”) (ISO,
2. A new paradigm for managing food fraud risk 2012; ISO 2002; 21 CFR 121, ANSI, 2009; PAS 96, 2014, FSMA,
2016; NIST, 2002; CNSSI, 2010; UNODC, 2010; DHS, 2013) e this
Addressing food fraud has led to a shift in focus from mitigation includes incident, hazard, damaging potential, etc. In crime and
to prevention. Prevention and mitigation try to accomplish the security science this is often a person(s) who have the intent and
control but from different directions. Mitigation assumes the event capability to cause harm. This is often applied to intentional acts
will frequently occur, so we try to mitigate or reduce the negative with the intent to harm. The result of a threat assessment is usually
consequence. Prevention assumes that the root cause of the event a quantitative probability that the event to occur e but not an
could be eliminated or at least greatly reduced in likelihood of assessment of the consequence.
occurrence. Food fraud vulnerabilities may have never occurred Vulnerability is a weakness or flaw that creates opportunities
before, may never occur again, or may be a potential opportunity for undesirable events related to the system (“system design”)
that never leads to an actual food fraud event. For efficient man- (ISO, 2007a; ISO 2002; ISO, 2012; DHS, 2013; NIST, 2011; CNSSI,
agement, this nature of food fraud necessitates a shift of the focus of 2010; NRC, 2009; COSO 2014; Merriam-Webster, 2004). The
countermeasures and control systems from intervention and result of a vulnerability assessment is usually a qualitative state-
response to prevention. ment of the susceptibility of the system e this influence the
likelihood (NRC, 2009). FSMA uses the term vulnerability

2
McDonald's market capitalization is approximately $90 billion and an approx-
imately 0.5e1% one day drop in stock price would be a loss of $450e900 million of
3
value; their annual sales are approximately $27.5 billion so one month loss of 2% is The summary definitions are based on extensive review of a wide-range of
$45 million. sources summarized and referenced in the supplemental materials.
J. Spink et al. / Trends in Food Science & Technology 62 (2017) 215e220 217

specifically as it applies a vulnerability assessment to food defense that carry a public health hazard (WHO, 2016). Risks in food de-
(21CFR 121, 21 USC). fense come from intentional acts with the intent to harm. Risks in
The countermeasures include mitigation and prevention. Miti- food fraud are also intentional, but without an intent to harm hu-
gation is intended to reduce the consequence of the event (ISO, man health; often a novel method or adulterant-substance, yet
2007a; ISO, 2007; ISO, 2007b; DHS, 2013; Merriam-Webster, compromising the integrity of the food products, and may have
2004). This assumes the hazard event will occur so the goal is to unintended health related consequences in some cases.
mitigate or reduce the negative consequence. This focuses on
reducing the risk that cannot be eliminated. Prevention is intended 4. Government challenges
to reduce or eliminate the likelihood of the event occurring (ISO,
2007; ISO, 2007a; ISO, 2007b; ISO, 2008; Merriam-Webster, This prevention and vulnerability-focused approach provides
2004). This focuses on identifying and eliminating or reducing challenges for regulators, as most food governance agencies e and
vulnerability. law enforcement in general e focus on and respond to events and
Therefore, we could consider food fraud vulnerability, food emergencies. The priority for government agencies and law
fraud threat, and food fraud risk differently. Food fraud vulnera- enforcement is first to protect public safety and health, followed by
bility is the susceptibility of a system to food fraud (e.g., milk is economic impacts and technical legal violations. To optimize scarce
not tested for adulterants such as water). Food fraud threat is the resources, food agencies have logically taken a public health risk-
cause of a food fraud event; e.g., a criminal could dilute milk with based approach, but not all food fraud events actually jeopardize
water and then sell to a deceived customer. Finally, food fraud risk public health. By prioritizing public health hazards (food safety) or
is the combined likelihood and consequence e that considers the catastrophic events (food defense), food fraud events would usually
threat and vulnerability e of food fraud. This is a function of the be at the bottom of those two risk-based priority lists.
vulnerability and threat; e.g., an estimate of the likelihood and Another difficulty for regulators to manage food fraud is that
consequence of milk diluted with water, sold to a deceived food laws and inspections usually focus within very defined and
customer. Following these definitions, it is important to note that physical systems, such as a manufacturing plant or an authorized
there could be a vulnerability assessment, separate from a risk supply chain. Food fraud often occurs outside the known and
assessment, for food fraud or for food defense (food safety risk is trusted system. Even if food fraud occurs within a known plant or
traditionally addressed in a Hazard Analysis and Critical Control supply chain, the fraudsters create a fraud opportunity by finding
Point HACCP plan). ways to circumvent and deceive the countermeasures and control
systems.
Yet another reason that food fraud has not been holistically
3. Developing a risk, threat, and vulnerability framework
addressed is that, at first, there were too few recognized events to
detect a pattern. When more and bigger events were identified,
A new paradigm is needed to assess and manage the vulner-
there was a novel application of criminology to understand the root
ability of food fraud events. As mentioned above, if there is an
cause or motivation. This is a focus on reducing the “crime oppor-
adulterant-substance such as melamine, it is often not a tradi-
tunity” or for food fraud, the “fraud opportunity.” Applying
tional food contaminant for which monitoring systems exist. Food
knowledge from criminology may be logical in detecting and
safety early warning systems address common food contaminants
reducing the vulnerability of food fraud events, as the biological
that are known and regularly occur in even well managed food
organism being addressed is not a microbe in this case, but a human
supply chains. The underlying issue is that industries and new
or group of individuals with fraudulent intent.
products are growing or changing faster than regulations, detec-
tion methods, or academic studies can address. The food industry
5. Integrated risk assessment and risk-based inspections: the
is responding, and is making efforts to do even more, to transform
example of melamine
from prescriptive, internally focused process controls to address-
ing food fraud separately from food safety and food defense. The
As previously discussed, usually food fraud events do not have a
Food Risk Matrix (Fig. 1) is provided to help clarify the differences
public health hazard. However, exceptions such as the melamine
in the key terms.
adulterant-substance, which provide evidence that some events
Risks in food safety are typically unintentional, and are a
may develop into an international health panic, do occur. In-
generally known set of common chemicals or pathogens in food
vestigations showed that melamine had been deliberately added to
raise the apparent protein content of pet food and infant formula in
analytical tests (FAO, 2008).
In the 2007 incident of melamine addition to pet food, deaths
Motivation:
were reported from acute kidney failure in cats and dogs in the
Food Food Economic Gain United States (Lancet, 2009). These deaths were caused by vege-
Quality Fraud table proteins imported from China that were contaminated with
melamine and incorporated into pet food (FDA, 2016). Following
the pet food event, several national and regional authorities around
Harm including the world, including the World Health Organization (WHO),4 per-
Food Food health, formed preliminary food safety risk assessments on melamine and
Safety Defense economic, terror established a toxicological reference dose, as a first attempt for
public health and animal pet protection (Chan, Griffiths, & Chan,
2008). Moreover, two Chinese nationals and their businesses, as
Unintentional Intentional well as a US company and its president and chief executive officer,

4
Fig. 1. Food Risk Matrix used to differentiate Food Quality, Food Safety, Food Fraud and Currently the International Food Safety Authorities Network (INFOSAN,
Food Defense (Spink & Moyer, 2011). managed by WHO and FAO) does not address food fraud prevention.
218 J. Spink et al. / Trends in Food Science & Technology 62 (2017) 215e220

were indicted by a federal grand jury for their roles in importing 2015). The FSMA scope includes all “agents” that could lead to a
products falsely labeled as wheat gluten into the US that were “hazard” from acts that are “economically motivated” e so it covers
contaminated with melamine (FDA, 2016). all types of food fraud explicitly including stolen genuine goods that
A separate melamine scheme was uncovered after an outbreak have been mishandled leading to a health hazard from mishandling
of illnesses among babies in multiple Chinese provinces, linked to spoilage (FFI, 2015). The US Government Accountability Office
consumption of contaminated powdered infant formula. Over (GAO) and the US Congressional Research Service (CRS) have
294,000 children experienced adverse renal effects, over 50,000 emphasized an expectation that the US FDA broadly prevent food
were hospitalized for renal complications, and at least six died risks including EMA and food fraud (Gao, 2011; CRS, 2014). With
(Ingelfinger, 2008). It was discovered that the melamine the current exception of the USA, governments are evolving to an
adulterant-substance had been added for many months since inter-agency task force based approach to preventing food fraud
December 2007. Although infant formula companies had received rather than just catching adulterant-substances.
complaints from parents saying their formula-fed children's urine The first step to prevention is developing a common starting
was discolored, these companies did not report these complaints to point and the developing and sharing of best practices for
the local government until August 2008 (Chan et al., 2008). vulnerability assessments. As the proactive food fraud prevention
In response, a new risk assessment statement on melamine in concepts have been defined, industry is responding. Several of
food with updated information of contaminated samples was the industry activities include workshops by the Grocery Man-
carried out by national and regional authorities worldwide. ufactures' Association, the Institute of Food Technologists, Food
Several countries proposed regulatory limits for melamine in food Drug & Law Institute, European Union Food Integrity Project,
and feed, mainly based on traditional chemical risk assessment INTERPOL Operation Opson, and others (FDLI, 2015; GMA, 2010;
methods. The US FDA's risk assessment of melamine in food INTERPOL, 2012; EC, 2015; IFT, 2016). The most comprehensive
intended for humans was published in 2008 following this scandal activity is by the Global Food Safety Initiative's (GFSI) including
(FDA, 2008). Fortunately, there were very few positive test results their position paper on food fraud (GFSI, 2014). GFSI will require
for melamine in infant formula reported by authorities outside of unique compliance requirements for addressing by requiring a
China, which may be attributed to rapid actions such as import Food Fraud Vulnerability Assessment and a Food Fraud Preven-
bans and regulatory limits (Gossner et al., 2009). The Chinese tion Strategy (GFSI, 2016). GFSI has also created a Food Fraud
government has since adopted a new Food Safety Law in 2009 and Technical Working Group to continue to address the issue. Since
then expanded the food protection in the Protection of Consumer's most of the food companies in the world comply with GFSI
Rights and Interests in 2014 (Wu et al., 2017, p. 1). An important guidance in one way or another, this pending requirement is
addition is Article 143 which states “strict liability” for a food already impacting the world. Industry is clearly focusing broadly
safety event allowing a maximum of three year prison sentence on food fraud and prevention.
and up to life imprisonment for “serious harm to human health” Some additional next steps include that Certification and Stan-
(Wu et al., 2017, p. 1). A “negative list” of the most concerning dards bodies are also starting to address food fraud. The US Phar-
substances was also created to prioritize detection of adulterant- macopeia/Food Chemicals Codex has several ongoing Expert
substances. Panels, is creating several guidance documents, has developed a
This event highlights the effectiveness when countries routinely “Food Fraud Database,” and had developed a food fraud vulnerably
monitor food fraud in the market and the growing importance of assessment guidance for food ingredients (USP, 2013). In related
timely responses to take appropriate actions based on risk assess- activities, the International Standards Organization (ISO) is broadly
ment to limit the spreading of tainted product. The response to this addressing food fraud which includes standardized definitions and
food fraud crisis has demonstrated that food safety is enhanced if work processes (ISO, 2010). In 2016, a Codex Alimentarius group is
all the stakeholders across the food supply are sharing information working on a “Proposal for Food Integrity/Food Authenticity
and data in an effective and timely manner. Conversely, if com- Guideline.” Also in 2016, food fraud has been a topic for the Inter-
panies fail to report consumer complaints, as in the case of the national Food Safety Authorities Network (INFOSAN) (a global
contaminated infant formula, many tragic illnesses and even deaths network of national food safety authorities, managed jointly by FAO
may result from food fraud. and WHO with the secretariat in WHO).
Recent food standards and certifications have split intentional
6. Shifting focus to food fraud and prevention events out of the base Food Safety Risk Assessment into a separate
Food Fraud Vulnerability Assessment and a Food Defense Threat
In response to the melamine adulterant-substance and other Assessment (for US FDA this is a Food Defense Vulnerability
fraudulent activities in recent years, food fraud is becoming ever Assessment). Separating the assessments e under an overall Food
more integrated into food laws and industry practices. Academic Safety Risk Assessment e is logical and efficient. For prevention,
journals e including in the fields of food science and criminology Food Safety, Food Fraud and Food Defense are very different root
e are starting to address food fraud. While food fraud has occurred causes. Separating and refining the assessments is efficient and
throughout history, the term was only defined in an academic effective. The application of these assessments leads to a hazard
journal in 2011 in Defining the Public Health Threat of Food Fraud assessment for Food Safety (HACCP), a vulnerability assessment for
(Spink & Moyer, 2011). Building upon that literature, industry food fraud (or Vulnerability Analysis and Critical Control Point plan
groups are defining and now collectively addressing the subject. - VACCP) and then a threat assessment for food defense (Threat
Several of the key government activities include the European Analysis and Critical Control Point plan - TACCP).
Commission adopting a common definition of food fraud and a
focus on prevention, the United Kingdom Elliott Review of Food 7. Conclusion
Crime adopting the broad term and supporting the establishment
of the National Food Crime Unit (NFCU), and other countries like Addressing food fraud can be inefficient and elusive if efforts are
China are beginning to broadly address the topic (DEFRA, 2014; EC, focused on the traditional food safety and food defense systems and
2014; IFT, 2015). The FSMA addressed food fraud and economically programs. The methods for addressing those other hazards are ill-
motivated adulteration within the Preventive Controls Rule (FDA, fitting tools for addressing food fraud.
J. Spink et al. / Trends in Food Science & Technology 62 (2017) 215e220 219

For food fraud prevention, the challenge is simplified once there FDA, US Food and Drug Administration. (2015). Current good manufacturing practice,
hazard Analysis, and risk-based preventive controls for human food. Federal
is a fresh look at the event from the perspective of the fraudster and
Register, Docket NumberFDA-2011-N-0920, Wednesday, November 18, 2015.
the fraud opportunity. The countermeasures become clear when FDLI, Food and Drug Law Institute. (2015). Food week 2015, food fraud regulatory
the focus shifts from the problem outwards to the countermeasure needs, food symposium. Washington, DC, February 23, 2015.
rather that from current technologies or laws inward to the prob- FFI, MSU Food Fraud Initiative. (2015). In J. Spink, & D. C. Moyer (Eds.), Review of the
final Rule for FSMA preventative controls regarding food fraud, food fraud initiative
lem. When looking at it from the problem outward there are report. January 26, 2015.
fundamental concepts and basic attributes that are revealed when Forbes. (2014). McDonald's faces declining sales in asia after China food scandal. Sep
trying to apply inappropriate or ill-fitting tools or models. Since the 11, 2014.
Fortin, N. D. (2009). Food regulation: Law, science, policy, and practice. Hoboken, NJ:
problem is created by an intentional intelligent human adversary Wiley.
the next step is to focus on food fraud as a crime and apply crime FSMA, Food Safety Modernization Act. (2016). Mitigation strategies to protect food
prevention theories. against intentional adulteration (FSMA-IA, food defense). Food and Drug
Administration, Final rule, Federal Register, May 27 2016.
For companies or countries to address the root cause of fraud, Gao, Government Accountability Office. (2011). Food and Drug administration, better
food science and technology research should expand to include coordination could enhance efforts to address economic adulteration and protect
social science, criminology, and business decision-making. The root the public health. Report to Congressional Requesters, October 2011, GAO-
12e46, United States Government Accountability Office, GAO, GAO-12-46. GAO-
cause or motivation involves human decision-making. Criminology 12-46.
provides theories to understand the problem and to evaluate GFSI, Global Food Safety Initiative. (2014). GFSI position on mitigating the public
countermeasures to preserve food integrity. Business decision- health risk of food fraud, global food safety initiative, consumer goods forum.
GFSI, Global Food Safety Initiative. (2016). Issue 7-final draft for comments, GFSI.
making e and decision-science e helps to address the question of
GMA, Grocery Manufacturers Association. (2010). Consumer product fraud, 2012.
“how much is enough?” Gossner, Ce line Marie-Elise, Schlundt, Jørgen, Ben Embarek, Peter, Hird, Susan, Lo-
Researching and understanding the food fraud focus on pre- Fo-Wong, Danilo, Javier Ocampo Beltran, Jose, et al. (2009). The melamine
vention has led to a shift in focus on vulnerability in our food incident: Implications for international food and feed safety. Environmental
health perspectives, 1803e1808.
systems. Addressing food fraud has led to expanding food science to IFT, Institute of Food Technolgists. (2015). China, taiwan strengthen food safety laws.
include criminology and business decision-making. Overall, the IFT Online Newsletter.
complexity of food fraud vulnerabilities will lead to a fresh and IFT, Institute of Food Technolgists. (2016). IFT annual conference 2016, food fraud, food
defense workshop. Chicago: Institute of Food Technologists (IFT).
important focus to food protection: shifting from “risk” “mitiga- Ingelfinger, J. R. (2008). Melamine and the global implications of food contamina-
tion” to “vulnerability” “prevention.” tion. New England Journal of Medicine, 359, 2745e2748.
INTERPOL. (2012). INTERPOL-Europol operation results in global seizures of fake and
illicit food- OPSON II [Media release]. December 14, 2012." 2012.
References ISO, International Organization for Standardization. (2007). ISO 28000-Specification
for security management systems for the supply chain. 2007 [cited December
2012]. Available from. : http://www.iso.org/iso/home/store/catalogue_tc/
21 CFR 121, US Code of Federal Regulations. 21 CFR PART 121. Mitigation Strategies
catalogue_detail.htm?csnumber¼44641.
to Protect Food Against Intentional Adulteration, US Code of Federal Regula-
ISO, International Organization for Standardization. (2007a). Committee draft of ISO/
tions, Chapter 21 Food and Drugs.
IEC guide 73 “risk management - vocabulary”, 2007.
21 CFR 50 (A) (.3)(k), US Code of Federal Regulations. PART 50 e Protection of
ISO, International Organization for Standardization. (2008). ISO homepage.
Human Subjects, Subpart AeGeneral Provisions Sec. 50.3 Definitions, Chapter
ISO, International Organization for Standardization. (2012). ISO/IEC 27000:2012,
21 Food and Drugs.
Information technology e security techniques e information security management
21 CFR, US Code of Federal Regulations. "Chapter 21 Food and Drugs.
systems.
21 USC, US Code. "Federal Food, Drug, and Cosmetic Act (FD&C Act), Chapter 21-
ISO, International Standards Organization. (2007b). ISO/PAS 22399:2007 Societal
Food and Drugs.
security e guidelines for incident preparedness and operational continuity
ANSI, American National Standards Institute. (2009). Organizational Resilience: Se-
management.
curity, preparedness, and continuity management systems e requirements with
ISO, International Standards Organization. (2010). Home page, technical committee
guidance for use. ANSI ASIS SPC.1e2009 https://www.asisonline.org/Standards-
247 (TC 247), fraud countermeasures and controls.” 2012.
Guidelines/Standards/published/Pages/Organizational-Resilience-Security-
Jargon, Julie (2014). Big mac suffers at home. In China. Wall street journal (New York,
Preparedness-and-Continuity-Management-Systems-%28Download%29.aspx.
N.Y).
Chan, E. Y. Y., Griffiths, S. M., & Chan, C. W. (2008). Public-health risks of melamine
Lancet, The. (2009). Melamine and food safety in China. The Lancet, 373(9661), 353.
in milk products. The Lancet, 372(9648), 1444e1445.
Leitch, M. (2010). ISO 31000:2009dthe new international standard on risk manage-
CNSSI, Committee on National Security Systems. (2010). Instruction 4009, CNSSI
ment. Risk Analysis [Online] (p. 30).
4009. https://www.ncsc.gov/nittf/docs/CNSSI-4009_National_Information_
Merriam-Webster. (2004). The merriam-webster dictionary e new edition.
Assurance.pdf.
Moore, Jeffrey C., Spink, John, & Lipp, Markus (2012). Development and application
Codex Alimentarius, CODEX. (2014). Procedural manual, twenty-second edition.
of a Database on food ingredient fraud and economically motivated adultera-
Geneva/Rome: World Health Organization/Food and Agriculture Organization
tion from 1980 e 2010. Journal of Food Science, 77(4), R118eR126.
of the United Nations.
NIST, United States National Institute of Science and Technology. (2011). Managing
CRS, Congressional Research Service. (2014). Food fraud and economically motivated
information security risk - organization, mission, and information system view.
adulteration.
Special Publication 800e39 http://nvlpubs.nist.gov/nistpubs/Legacy/SP/
DEFRA, United Kingdom Department for Environment, Food & Rural Affairs. (2014).
nistspecialpublication800-39.pdf.
Elliott review into the integrity and assurance of food supply networks. Indepen-
NIST, US National Institute of Standards and Technology. (2002). Risk management
dent report, Ref: PB14089, PDF, 539KB (p. 84).
guide for information technology systems e special publication (pp. 800e830).
DHS, Department of Homeland Security. (2013). The risk management process for
NRC, National Research Council. (1996). In Paul C. Stern, & Harvey V. Fineberg (Eds.),
federal facilities - an interagency security committee standard, August 2013 (1st
Understanding risk: Informing decisions in a democratic society, national academy
Edition).
of science NAS. National Academies Press.
DHS, US Department of Homeland Security. (2008). DHS risk lexicon. Risk steering
NRC, National Research Council. (2009). Science and decisions: Advancing risk
committee.
assessment.
EC, European Commission. (2014). On the food crisis, fraud in the food chain and the
PAS 96, Publically Available Standard 96. (2014). Guide to protecting and defending
control thereof.
food and drink from deliberate attack. Available from. British Standards Institu-
EC, European Commission. (2015). Horse meat: One year after - actions announced
tion (BSI). : http://www.food.gov.uk/sites/default/files/pas96-2014-food-drink-
and delivered!, directorate general for health and consumers.
protection-guide.pdf.
Everstine, K., Spink, J., & Kennedy, S. (2013). Economically motivated adulteration
Premanandh, Jagadeesan (2013). Horse meat scandal e a wake-up call for regula-
(EMA) of Food: Common characteristics of EMA incidents. Journal of Food Pro-
tory authorities. Food Control, 34(2), 568e569.
tection, 76(4), 723e735.
Primrose, S., Woolfe, M., & Rollinson, S. (2010). Food forensics: Methods for deter-
FAO, Food and Agriculture Organization of the United Nations. (2008). Over-
mining the authenticity of foodstuffs. Trends in Food Science & Technology,
view: Melamine contamination of dairy products in China Accessed
21(12), 582e590.
September 2016. Available http://www.fao.org/food/food-safety-quality/a-z-
Purdy, G. (2010). ISO 31000:2009dsetting a new standard for risk management. Risk
index/melamine/en/.
Analysis [Online] (p. 30).
FDA, Food and Drug Administration. (2016). Melamine pet food recall of 2007.”.
Spink, John, & Moyer, Douglas C. (2011). Defining the public health threat of food
FDA, U.S. Food and Drug Administration. (2008). Interim safety and risk assessment of
fraud. Journal of Food Science, 76(9), R157eR162.
melamine and its analogues in food for humans [a].
220 J. Spink et al. / Trends in Food Science & Technology 62 (2017) 215e220

UNODC, United National Office on Drugs and Crime. (2010). “Guidance on the Wu, Yongning, Miao, Hong, Shao, Bing, Zhang, Jing, Spink, John, & Moyer, Douglas
preparation and use of serious organized crime assessments (SOCTA), United C. (2017). Chapter 15: Food fraud. In Joseph Jwu-shan Jen, & Junshi Chen
Nations. (Eds.), Food safety in China e Past, present, and future (English): Science,
USP, US Pharmacopeia. (2013). New additions increase number of records in USP technology, management and regulation. New York City: Wiley & Sons, ISBN
food fraud Database by 60 percent, add seafood, clouding agents and lemon 978-1-119-23796-9. Wu, Yongning, Bing, Shao, Hong, Miao, Jing, Zhang, &
juice as foods vulnerable to fraud. Press Release, Rockville, Md., January 23, Spink, John (2016). Chapter: Food Fraud. In J. Chen, & J. J. Jen (Eds.), Food
2013. Safety in China: Past, Present, and Future (Chinese). Beijing: CSP Books. ISBN
WHO, World Health Organization. (2016). Melamine Accessed September 2016. 978-7-5046-7061-8.

You might also like