Which Company Characteristics Make a Food Business at Risk for Food Fraud?
Abstract
:1. Introduction
2. Materials and Methods
2.1. Food Fraud Vulnerability Assessments
2.2. Correspondents: Assessed Businesses
2.3. Data Processing and Analysis
3. Results and Discussion
3.1. General Evaluation of the Characteristics Determining Fraud Vulnerability Levels
3.2. The Industry Segment
3.2.1. Differences across Segments
3.2.2. Variation in the Segment Effect across Continents
3.3. The Business Size
3.3.1. Differences across Business Size Groups
3.3.2. Variation in the Business Size Effect across Continents
3.4. The Location
3.5. Considerations Regarding the Determinants Industry Segment, Business Size, and Location
3.6. Considerations Regarding the Study
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A. The Fifty Questions of the SSAFE Food Fraud Vulnerability Assessment Tool
Nr | Question |
1 | How simple or complex is adulteration of your raw materials? |
2 | How generally available is the technology and knowledge on adulteration of your raw materials? |
3 | How easily would adulteration of your raw materials be detected and with what kind of methods? |
4 | How generally available is the technology and knowledge allowing adulteration of your final products? |
5 | How easily would adulteration of your final products be detected and with what kind of methods? |
6 | How simple or complex is counterfeiting of your final product? |
7 | How easily would counterfeited final product be detected, and with what kind of methods? |
8 | How would you describe the production processing lines of your company? |
9 | How would you describe the chain network that you are part of? |
10 | How many fraud incidences of similar raw materials have been reported? |
11 | How many fraud incidences of similar final products have been reported? |
12 | How would you define supply and pricing of your raw materials? |
13 | Do special attributes or components determine the value of your raw materials? |
14 | How would you describe the economic conditions of your company? |
15 | What are the characteristics of the organizational/business strategy of your company? |
16 | How would you describe the ethical business culture in your company? |
17 | Has your company been involved in criminal offences previously? |
18 | How would you rate the corruption level (according to the Transparency International Corruption Perception Index) in the countries in which your company is active? |
19 | How would you describe the financial strains imposed by your own company on your direct supplier(s) ? |
20 | How would you describe the economic conditions of your direct supplier(s)? |
21 | What are the characteristics of the organizational/business strategy of your direct supplier(s) ? |
22 | How would you describe the ethical business culture of your direct supplier(s) ? |
23 | Has/have your direct supplier(s) been involved in criminal offences previously ? |
24 | Has/have your direct supplier(s) been victimized by food fraud committed by their suppliers, customers or other parties? |
25 | How would you rate the corruption level (according to the Transparency International Corruption Perception Index) in the countries in which your direct supplier(s) and customers are active? |
26 | How would you describe the economic conditions in your branch of industry? |
27 | Has/have your customer(s) been involved in criminal offences previously ? |
28 | How would you describe the ethical business culture in your branch of industry (i.e., other meat processing companies)? |
29 | How common are criminal offences in your branch of industry? |
30 | How would you rate the level of competition in your branch of industry? |
31 | How would you define price asymmetries created by the legal framework? |
32 | How would you describe the fraud related parts of your raw material monitoring control system of your company? |
33 | Are the fraud monitoring tasks of your raw material control system verified in your company? |
34 | How would you describe the fraud related parts of your final product monitoring control system of your company? |
35 | Are the fraud monitoring tasks of your final product control system verified in your company? |
36 | How extensive is the information system for internal control of mass balance flows in your company? |
37 | How extensive is the tracking & tracing system of your company? |
38 | Is integrity screening of employees common procedure in your company? |
39 | Is there an ethical code of conduct or guidelines in place and embedded in your company? |
40 | Is there a whistle blowing system (system for reporting assumed fraud practices) in place in your company? |
41 | What is characteristic for your contractual requirements with your direct suppliers? |
42 | What features the fraud control system of your direct supplier(s)? An alternative for this question is that direct suppliers fill out the tool themselves with respect to the control measures as defined for the company |
43 | How extensive is the information system for control of mass balance flows of your direct supplier(s)? This question can be only asked direct to the supplier(s) |
44 | How extensive is the tracking & tracing system of your direct supplier(s)? An alternative for this question is that direct supplier(s) fill out the tool themselves with respect to the T&T system as defined for the company |
45 | How would you describe the social control and transparency of actions in your supply chain network? |
46 | How well established is the fraud control support by your branch of industry (e.g., branch of oils and fats) |
47 | How would you describe your national food policy? |
48 | How well are fraud related laws enforced in your local supply chain? |
49 | How well are fraud related laws enforced in your international supply chain network? |
50 | Does your company have fraud contingency measures in place? |
References
- Everstine, K. Supply chain complexity and economically motivated adulteration. In Series on Food Science, Technology and Nutrition, Food Protection and Security; Kennedy, S., Ed.; Woodhead Publishing: Cambridge, UK, 2017; pp. 1–14. [Google Scholar]
- Spink, J.; Moyer, D.C. Defining the public health threat of food fraud. J. Food Sci. 2011, 76, R157–R163. [Google Scholar] [CrossRef]
- Van Ruth, S.M.; van der Veeken, P.; Luning, P.A.; Huisman, W. Feeding fiction: Fraud vulnerability in the food service industry. Food Res. Int. 2020, 133, 109158. [Google Scholar] [CrossRef]
- Li, S.; Zhu, C.; Chen, Q.; Liu, Y. Consumer confidence and consumers’ preferences for infant formulas in China. J. Integr. Agric. 2019, 18, 1793–1803. [Google Scholar] [CrossRef]
- Schaefer, K.A.; Scheitrum, D.; Nes, K. International sourcing decisions in the wake of a food scandal. Food Policy 2018, 81, 48–57. [Google Scholar] [CrossRef] [Green Version]
- Cohen, L.E.; Felson, M. Social change and crime rate trends: A routine activity approach. Am. Sociol. Assoc. 1979, 44, 588–608. [Google Scholar] [CrossRef]
- Van Ruth, S.M.; Huisman, W.; Luning, P.A. Food fraud vulnerability and its key factors. Tr. Food Sci. Technol. 2017, 67, 70–75. [Google Scholar] [CrossRef]
- Soon, J.M.; Krzyzaniak, S.C.; Shuttlewood, Z.; Smith, M.; Jack, L. Food fraud vulnerability assessment tools used in food industry. Food Control 2019, 101, 225–232. [Google Scholar] [CrossRef]
- Yang, Y.; Huisman, W.; Hettinga, K.A.; Liu, N.; Heck, J.; Schrijver, G.H.; Gaiardoni, L.; van Ruth, S.M. Fraud vulnerability in the Dutch milk supply chain: Assessments of farmers, processors and retailers. Food Control 2019, 95, 308–317. [Google Scholar] [CrossRef]
- Yang, Y.; Huisman, W.; Hettinga, K.A.; Zhang, L.; van Ruth, S.M. The Chinese milk supply chain: A fraud perspective. Food Control 2020, 113, 107211. [Google Scholar] [CrossRef]
- Yan, J.; Erasmus, S.W.; Aguilera Toro, M.; Huang, H.; van Ruth, S.M. Food fraud: Assessing fraud vulnerability in the extra virgin olive oil supply chain. Food Control 2020, 111, 107081. [Google Scholar] [CrossRef]
- Silvis, I.C.J.; van Ruth, S.M.; van der Fels-Klerx, H.J.; Luning, P.A. Assessment of food fraud vulnerability in the spices chain: An explorative study. Food Res. Int. 2017, 133, 109158. [Google Scholar] [CrossRef]
- Manning, L.; Soon, J.M. Food fraud vulnerability assessment: Reliable data sources and effective assessment approaches. Tr. Food Sci. Technol. 2019, 91, 159–168. [Google Scholar] [CrossRef]
- Van Ruth, S.M.; Pagter-de Witte, L. Integrity of organic foods and their suppliers: Fraud vulnerability across chains. Foods 2020, 9, 188. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yang, Y.; Zhang, L.; Hettinga, K.A.; Erasmus, S.W.; van Ruth, S.M. Prevalence of milk fraud in the Chinese market and its relationship with fraud vulnerabilities in the chain. Foods 2020, 9, 709. [Google Scholar] [CrossRef] [PubMed]
- Van Ruth, S.M.; Luning, P.A.; Silvis, I.C.J.; Yang, Y.; Huisman, W. Differences in fraud vulnerability in various food supply chains and their tiers. Food Control 2018, 84, 375–381. [Google Scholar] [CrossRef]
- Weesepoel, Y.J.A.; van Ruth, S.M. Inventarisatie van Voedselfraude: Mondiaal Kwetsbare Productgroepen en Ontwikkeling van Analytische Methoden in Europees Onderzoek. RIKILT-Report 2015.014; RIKILT Wageningen UR: Wageningen, The Netherlands, 2015; Available online: https://edepot.wur.nl/360164 (accessed on 1 March 2021).
- Tähkäpää, S.; Maijala, R.; Korkeala, H.; Nevas, M. Patterns of food frauds and adulterations reported in the EU rapid alarm system for food and feed and in Finland. Food Control 2015, 47, 175–184. [Google Scholar] [CrossRef]
- Simpson, S. Making Sense of White Collar Crime: Theory and Research. Ohio State J. Crim. Law 2011, 8, 481–502. Available online: http://hdl.handle.net/1811/73214 (accessed on 1 March 2021).
- Guntzburger, Y.; Théolier, J.; Barrere, V.; Peignier, I.; Godefroy, S.; de Marcellis-Warin, N. Food industry perceptions and actions towards food fraud: Insights from a pan-Canadian study. Food Control 2020, 113, 107182. [Google Scholar] [CrossRef]
- IBM. Focus on Food Fraud. 2020. Available online: https://www.ibm.com/downloads/cas/YDKZAB6O (accessed on 19 February 2021).
- Hazen, B.T.; Skipper, J.B.; Ezell, J.D.; Boone, C.A. Big Data and predictive analytics for supply chain sustainability: A theory-driven research agenda. Comp. Ind. Eng. 2016, 101, 592–598. [Google Scholar] [CrossRef]
- Balafoutas, L.; Kerschbamer, R. Credence goods in the literature: What the past fifteen years have taught us about fraud, incentives, and the role of institutions. J. Behav. Exp. Financ. 2020, 26, 100285. [Google Scholar] [CrossRef]
- Lord, N.; Spencer, J.; Albanese, J. In pursuit of food system integrity: The situational prevention of food fraud enterprise. Eur. J. Crim. Policy Res. 2017, 23, 483–501. [Google Scholar] [CrossRef]
- Junger, M.; Wang, V.; Schlömer, M. Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits. Crime Sci. 2020, 19, 13. [Google Scholar] [CrossRef]
- Finnerty, K.; Motha, H.; Shah, J.; White, Y.; Button, M.; Wang, V. Cyber Security Breaches Survey 2018: Statistical Release; Department for Culture and Sport: London, UK, 2018. Available online: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018 (accessed on 1 March 2021).
- PWC. 2014 Information Security Breaches Survey. Technical Report; PriceWaterhouseCoopers: London, UK, 2014; Available online: https://www.pwc.co.uk/assets/pdf/cyber-security-2014-technical-report.pdf (accessed on 1 March 2021).
- Zweighart, D. Business Email Compromise and Executive Impersonation: Are Financial Institutions Exposed? J. Invest. Compl. 2017, 18, 1–7. Available online: https://www.batesgroup.com/publications/joic-02-2017-0001.pdf (accessed on 1 March 2021).
- Forter. Fraud Attack Index. 7th Edition. 2019. Available online: https://l.forter.com/fraud-attack-index-seventh-edition?utm_campaign=2019%20Fraud%20Attack%20Index%207th%20Edition&utm_source=blog&utm_medium=Global%20Fraud%20Trends%3A%20What%20in%20the%20World%20Happened%20in%202019%3F (accessed on 19 February 2021).
Industry Segment | Opportunities + Motivations (Threats) | Controls |
---|---|---|
Animal Conversion | 1 | 3 |
Production of Animals | 2.5 | 1 |
Retail | 2.5 | 4 |
Processing of Animal and Plant Perishable Products (mixed products) | 4 | 10 |
Processing of Animal Perishable Products | 5 | 17 |
Processing of Ambient Stable Products | 6.5 | 13 |
Production of Feed | 6.5 | 14 |
Production of Beverage | 8 | 18 |
Production of Food | 9 | 15.5 |
Production of (bio) Chemicals | 10 | 12 |
Catering | 11 | 2 |
Farming of Grains & Pulses | 12 | 6 |
Food Broker/Agent | 13 | 8 |
Processing of Plant Perishable Products | 14 | 11 |
Production of Fish | 15 | 20 |
Preprocessing handling of plant product | 16 | 15.5 |
Production of Food Packaging | 17 | 19 |
Farming of Plants | 18.5 | 5 |
Storage & Distribution Services | 18.5 | 9 |
Wholesale | 20 | 7 |
A. Differences Due to Industry Segment | B. Differences Due to Business Size | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Key Element | Fraud Factor Category | Question nr | Fraud factor | Africa (n = 452) | Americas (n = 4361) | Asia (n = 1341) | Europe (n = 1458) | Oceania (n = 409) | Africa (n = 452) | Americas (n = 4361) | Asia (n = 1341) | Europe (n = 1458) | Oceania (n = 409) |
Opportunities | Technical opportunities | 1 | Complexity of adulteration of raw materials | <0.0001 | <0.0001 | <0.0001 | <0.0001 | <0.0001 | 0.093 | 0.005 | <0.0001 | 0.522 | 0.000 |
2 | Availability technology and knowledge to adulterate raw materials | <0.0001 | <0.0001 | <0.0001 | <0.0001 | 0.003 | 0.05 | 0.026 | 0.162 | 0.989 | 0.093 | ||
3 | Fraud detectability in raw materials | 0.018 | <0.0001 | 0.000 | <0.0001 | <0.0001 | 0.098 | <0.0001 | 0.078 | 0.321 | 0.061 | ||
4 | Availability technology and knowledge to adulterate final products | 0.000 | <0.0001 | <0.0001 | <0.0001 | 0.005 | 0.001 | 0.84 | <0.0001 | 0.61 | 0.155 | ||
5 | Fraud detectability in final products | 0.002 | <0.0001 | 0.015 | 0.003 | 0.000 | 0.219 | <0.0001 | 0.227 | 0.052 | 0.842 | ||
6 | Complexity of counterfeiting | 0.000 | <0.0001 | <0.0001 | <0.0001 | 0.301 | 0.022 | 0.153 | <0.0001 | 0.662 | 0.17 | ||
7 | Detectability of counterfeiting | 0.002 | <0.0001 | <0.0001 | <0.0001 | 0.023 | 0.01 | <0.0001 | <0.0001 | 0.235 | 0.023 | ||
Opportunities in time and place | 8 | Access to production lines/processing | <0.0001 | <0.0001 | <0.0001 | <0.0001 | 0.004 | 0.276 | 0.572 | 0.006 | 0.15 | 0.804 | |
9 | Transparency in chain network | 0.000 | <0.0001 | <0.0001 | 0.003 | 0.000 | 0.004 | 0.075 | <0.0001 | 0.281 | 0.09 | ||
10 | Historical evidence of fraud in raw materials | <0.0001 | <0.0001 | <0.0001 | <0.0001 | 0.006 | 0.157 | 0.000 | <0.0001 | 0.56 | 0.692 | ||
11 | Historical evidence of fraud in final products | 0.013 | <0.0001 | <0.0001 | <0.0001 | 0.004 | 0.178 | 0.343 | <0.0001 | 0.663 | 0.186 | ||
Motivations | Economic drivers | 12 | Supply and pricing raw materials | 0.03 | 0.008 | <0.0001 | <0.0001 | 0.423 | 0.43 | <0.0001 | 0.001 | 0.196 | 0.848 |
13 | Valuable components or attributes | 0.001 | <0.0001 | <0.0001 | <0.0001 | 0.015 | 0.009 | 0.197 | <0.0001 | 0.632 | 0.746 | ||
14 | Economic health own company | 0.000 | 0.364 | <0.0001 | 0.016 | 0.411 | 0.019 | 0.664 | 0.000 | 0.002 | 0.098 | ||
20 | Economic health supplier | 0.001 | 0.517 | 0.126 | 0.002 | 0.129 | 0.018 | 0.006 | 0.011 | 0.019 | 0.006 | ||
26 | Economic health sector | 0.009 | 0.007 | <0.0001 | <0.0001 | 0.141 | 0.016 | 0.216 | <0.0001 | 0.205 | 0.455 | ||
30 | Level of competition branch of industry | 0.001 | <0.0001 | 0.014 | <0.0001 | 0.426 | 0.007 | 0.115 | 0.002 | 0.184 | 0.088 | ||
31 | Prices asymmetries | 0.001 | 0.025 | <0.0001 | <0.0001 | 0.377 | 0.009 | 0.002 | <0.0001 | 0.407 | 0.689 | ||
Cultural and behavioral drivers | 15 | Organizational strategy own company | 0.004 | 0.152 | 0.002 | 0.107 | 0.034 | 0.004 | 0.813 | 0.036 | 0.647 | 0.059 | |
16 | Ethical business culture own company | <0.0001 | 0.316 | <0.0001 | 0.023 | 0.067 | 0.009 | 0.012 | <0.0001 | 0.13 | 0.045 | ||
17 | Criminal offences own company | 0.007 | 0.191 | 0.026 | 0.004 | 0.871 | 0.000 | 0.026 | 0.000 | 0.007 | 0.008 | ||
18 | Corruption level country own company | 0.004 | <0.0001 | <0.0001 | 0.002 | 0.13 | 0.092 | <0.0001 | 0.013 | 0.183 | 0.059 | ||
19 | Financial strains supplier | 0.463 | 0.049 | <0.0001 | 0.004 | 0.025 | 0.002 | 0.307 | <0.0001 | 0.002 | 0.474 | ||
21 | Organizational strategy supplier | 0.000 | 0.359 | <0.0001 | 0.001 | 0.297 | 0.372 | 0.000 | 0.009 | 0.768 | 0.022 | ||
22 | Ethical business culture supplier | 0.001 | <0.0001 | 0.02 | 0.009 | 0.412 | 0.048 | 0.03 | 0.007 | 0.399 | 0.107 | ||
23 | Criminal offences supplier | 0.003 | 0.021 | <0.0001 | 0.058 | 0.054 | 0.002 | 0.063 | <0.0001 | 0.008 | 0.089 | ||
24 | Victimization supplier | <0.0001 | 0.029 | <0.0001 | 0.000 | 0.017 | 0.496 | 0.361 | <0.0001 | 0.246 | 0.226 | ||
25 | Corruption level country supplier | 0.002 | 0.000 | 0.02 | 0.002 | 0.13 | 0.05 | <0.0001 | 0.005 | 0.001 | 0.004 | ||
27 | Criminal offences customer | 0.034 | 0.326 | <0.0001 | 0.001 | 0.96 | 0.14 | 0.457 | <0.0001 | 0.073 | <0.0001 | ||
28 | Ethical business culture branch of industry | 0.037 | 0.277 | <0.0001 | <0.0001 | 0.003 | 0.201 | 0.72 | <0.0001 | 0.086 | 0.028 | ||
29 | Historical evidence branch of industry | 0.078 | 0.000 | <0.0001 | <0.0001 | 0.333 | 0.04 | 0.308 | <0.0001 | 0.409 | 0.019 | ||
Controls | Technical controls | 32 | Fraud monitoring system raw materials | 0.034 | 0.062 | <0.0001 | 0.005 | 0.05 | 0.000 | 0.283 | <0.0001 | 0.002 | 0.124 |
33 | Verification of fraud monitoring system raw materials | 0.221 | 0.259 | 0.004 | 0.078 | 0.228 | 0.024 | 0.156 | <0.0001 | 0.002 | 0.477 | ||
34 | Fraud monitoring system final products | 0.285 | 0.014 | 0.000 | 0.003 | 0.946 | 0.002 | 0.493 | <0.0001 | 0.204 | 0.106 | ||
35 | Verification of fraud monitoring system final products | 0.48 | 0.061 | 0.002 | 0.000 | 0.799 | 0.119 | 0.068 | <0.0001 | 0.102 | 0.244 | ||
36 | Information system own company | 0.002 | <0.0001 | <0.0001 | <0.0001 | 0.373 | 0.179 | 0.405 | <0.0001 | <0.0001 | 0.106 | ||
37 | Tracking and tracing system own company | 0.000 | 0.143 | 0.149 | <0.0001 | 0.251 | 0.001 | 0.000 | 0.017 | 0.122 | 0.112 | ||
42 | Fraud monitoring system supplier | <0.0001 | 0.003 | <0.0001 | 0.033 | 0.265 | 0.043 | 0.003 | <0.0001 | 0.042 | 0.398 | ||
43 | Information system supplier | 0.003 | 0.002 | 0.001 | 0.127 | 0.367 | 0.009 | <0.0001 | <0.0001 | 0.3 | 0.108 | ||
44 | Tracking and tracing system supplier | <0.0001 | 0.058 | <0.0001 | <0.0001 | 0.105 | 0.000 | 0.000 | 0.001 | 0.002 | 0.279 | ||
46 | Fraud control guidance industry | 0.019 | 0.17 | 0.055 | 0.006 | 0.4 | 0.001 | 0.025 | 0.016 | 0.006 | 0.953 | ||
50 | Contingency plan | 0.001 | 0.272 | 0.007 | 0.000 | 0.048 | 0.002 | 0.116 | 0.011 | 0.029 | 0.381 | ||
Managerial controls | 38 | Integrity screening own employees | 0.005 | 0.01 | 0.000 | 0.002 | 0.11 | 0.375 | 0.01 | <0.0001 | 0.000 | 0.506 | |
39 | Ethical code of conduct own company | 0.000 | 0.277 | <0.0001 | 0.001 | 0.449 | 0.421 | 0.068 | <0.0001 | <0.0001 | 0.101 | ||
40 | Whistle blowing own company | 0.001 | 0.018 | <0.0001 | 0.031 | 0.007 | 0.091 | 0.01 | <0.0001 | <0.0001 | 0.016 | ||
41 | Contractual requirements supplier | 0.001 | 0.018 | <0.0001 | <0.0001 | 0.038 | 0.191 | 0.509 | <0.0001 | <0.0001 | 0.945 | ||
45 | Social control chain network | 0.008 | 0.09 | 0.016 | <0.0001 | 0.044 | 0.015 | 0.013 | 0.018 | 0.018 | 0.295 | ||
47 | National food policy | 0.003 | 0.019 | <0.0001 | <0.0001 | 0.444 | 0.001 | 0.071 | 0.697 | 0.003 | 0.033 | ||
48 | Law enforcement local chain | 0.223 | 0.004 | <0.0001 | 0.001 | 0.183 | 0.053 | 0.028 | 0.343 | 0.002 | 0.012 | ||
49 | Law enforcement chain network | 0.141 | 0.018 | <0.0001 | 0.037 | 0.117 | 0.237 | 0.14 | 0.413 | 0.017 | 0.627 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
van Ruth, S.M.; Nillesen, O. Which Company Characteristics Make a Food Business at Risk for Food Fraud? Foods 2021, 10, 842. https://doi.org/10.3390/foods10040842
van Ruth SM, Nillesen O. Which Company Characteristics Make a Food Business at Risk for Food Fraud? Foods. 2021; 10(4):842. https://doi.org/10.3390/foods10040842
Chicago/Turabian Stylevan Ruth, Saskia M., and Onno Nillesen. 2021. "Which Company Characteristics Make a Food Business at Risk for Food Fraud?" Foods 10, no. 4: 842. https://doi.org/10.3390/foods10040842
APA Stylevan Ruth, S. M., & Nillesen, O. (2021). Which Company Characteristics Make a Food Business at Risk for Food Fraud? Foods, 10(4), 842. https://doi.org/10.3390/foods10040842