Next Article in Journal
High-Moisture Meat Analogues Produced from Yellow Pea and Faba Bean Protein Isolates/Concentrate: Effect of Raw Material Composition and Extrusion Parameters on Texture Properties
Previous Article in Journal
Validation of Antiobesity Effects of Black Soybean Seed Coat Powder Suitable as a Food Material: Comparisons with Conventional Yellow Soybean Seed Coat Powder
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Which Company Characteristics Make a Food Business at Risk for Food Fraud?

by
Saskia M. van Ruth
1,2,* and
Onno Nillesen
3,4
1
Food Quality and Design Group, Wageningen University and Research, P.O. Box 17, 6700 AA Wageningen, The Netherlands
2
School of Biological Sciences, Queen’s University Belfast, 19 Chlorine Gardens, Belfast, Northern Ireland BT9 5DL, UK
3
PwC, Thomas R. Malthusstraat 5, 1066 JR Amsterdam, The Netherlands
4
PlanNed, Stephensonweg 14, 4207 HB Gorinchem, The Netherlands
*
Author to whom correspondence should be addressed.
Submission received: 1 March 2021 / Revised: 30 March 2021 / Accepted: 8 April 2021 / Published: 13 April 2021
(This article belongs to the Section Food Quality and Safety)

Abstract

:
Fraud can happen to any food business, but some sectors show more historical evidence of food fraud than others. This may be due to particular company characteristics that affect a company’s level of vulnerability. In the current study, we examined the relevance of the industry segment, business size, and location of food businesses on their food fraud vulnerabilities. Over 8000 food fraud vulnerability self-assessments conducted by food businesses active in 20 industry segments located in five continents were collected and the data analyzed. Results revealed that a company’s industry segment (chain and tier) affects its fraud vulnerability greatly and to a larger extent than the size of the business. The effect of industry segment on fraud vulnerability appears fairly similar across continents, whereas the effect of business size exhibits large geographical variation. The results demonstrate that those involved in animal product supply chains and end of chain nodes (catering, retail) are most vulnerable, and so are larger businesses, and businesses located in Africa and Asia. Current results imply that company characteristics are important determinants of the level of fraud vulnerability, and they may be used reversely in the future, i.e., as predictors of vulnerability.

1. Introduction

Food supply chains have become increasingly globalized [1] and so has food fraud. Food fraud is intentional deceit for economic gain with adverse human activity at the core of the problem [2]. Some of the businesses involved are offenders themselves and deliberately defraud their customers. Others are victimized by fraudsters earlier in the chain and pass on the illicit products to their own customers unknowingly [3].
Inter- and intra-organizational food fraud can have major implications for supply chain performance. High-profile food fraud scandals result in substantial damage to the reputations of retailers, food manufacturers, and entire food industry segments. Moreover, these illegal activities have significant and long-lasting social consequences: they may pose health risks and they erode consumer confidence. In this context, the melamine milk scandal in China that took place in 2009 and resulted in hundred-thousands of hospitalized infants is an atrocious example, with consumer confidence in domestic infant formula remaining low, even after a decade [4]. Another unfavorable highlight was the EU horsemeat scandal in 2013. Due to the various food fraud incidents, food fraud gradually received more attention, which is reflected, for instance, in the frequency of the search term “food fraud” in Google (Figure 1). It also resulted in the food industry eventually recognizing that food fraud is seriously spiraling out of control and requires attention [5].
To design appropriate interventions in this area, it is crucial to comprehend the ecology of food fraud. Because it all revolves around illicit human behavior, a criminological approach is the most obvious. One of the well-established criminological theories for that matter is the Routine Activities Theory which uses three elements to explain crimes: the motivated offender, the suitable target, and lack of guardianship [6]. The first two are considered to entail the threats, and the last element (lack of) potential counteracting measures. From it follows that creation of an environment that is less vulnerable and less hospitable will inhibit fraudsters or at least discourage offender activity. Using this conceptual model and with consideration of evidence from natural and social sciences, 50 factors which determine food businesses’ vulnerability to food fraud have been identified [7]. They differ from food safety risk factors as socio-economic factors and criminal behavior need to be considered too [8]. These factors have been implemented into a practical fraud vulnerability assessment for food supply chain actors [7]. This assessment was transformed into an application which was available on the Apple and Google Play stores between 2016 and 2019, free of charge. The assessment has been widely used in food supply chains and also for scientific comprehension of the fraud vulnerabilities in milk [9,10], olive oil [11], and spice supply chains [12]. However, it is unknown which, and to what extent, company characteristics are determinants for the susceptibility to food fraud. In addition to this particular type of assessment, others have been developed. An overview of tools and their adoption in the food industry has been reported. They include the United States Pharmacopeia Food Fraud Mitigation tool, the Food Fraud initial Screening Tool, and the Campden Threat and Critical Control Points tool, among others [8].
Certain food types, geographical sources, associated supply chains [13] and business characteristics [14,15,16] are seen as having historically higher levels of concern with regard to food fraud. In the current study, we try to comprehend these vulnerabilities by exploring particular characteristics of businesses, such as the industry segment they are active in, their business size, and their location, that may influence their levels of vulnerability to fraud across over 8000 businesses active in global food supply chains.

2. Materials and Methods

2.1. Food Fraud Vulnerability Assessments

Food fraud vulnerability assessments (FFVA) identify weaknesses or flaws that create opportunities for food fraud. The FFVA employed in this study consisted of 50 questions and associated three level answering grids (low-, medium-, and high vulnerability). Each question relates to identified, science-based fraud factors (indicators): nine for opportunities, 20 for motivations, and 21 for control measures [7]. The questions are listed in Appendix A. The full tool can be accessed free of charge through the Safe Supply of Affordable Food for Everyone Everywhere (SSAFE) website (www.ssafe-food.org, accessed on 1 March 2021). The assessment was developed and tested through a very extensive, interactive, and iterative procedure with representatives from businesses in food supply chains, authorities, and the scientific community from around the globe [7]. A free online version of the FFVA was developed by the SSAFE in partnership with Wageningen University, Free University of Amsterdam, and food industry leaders around the world. It aims to help companies to map their vulnerabilities and to strengthen their controls. An online application was subsequently developed by SSAFE and PricewaterhouseCoopers (PwC) which was made available free of charge to businesses in food supply chains. Although the spreadsheet version of the FFVA with all questions and answering options is still freely downloadable at the SSAFE website, the SSAFE/PwC online application is currently no longer available.

2.2. Correspondents: Assessed Businesses

Food fraud vulnerability was self-assessed voluntarily by 8021 businesses involved in food supply chains world-wide using the SSAFE FFVA described in the previous section. Four hundred fifty-two were located in Africa, 4361 in North and South America, 1341 in Asia, 1458 in Europe, and 409 in Oceania. They covered a range of 20 food industry segments, i.e., commodity supply chains and supply chain tiers (listed in the legend of Figure 2). Businesses were, for instance, involved in farming of plants or animals, pre-processing handling, food processing, wholesale, retail, and catering, as well as the production of packaging materials and feed. Businesses were allocated to the following business size groups: Nil–100, 101–500, 501–1000, 1001–10,000, and 10,000 or more employees. Companies filled out the FFVA to self-assess their organization and supply chain in the free online application for themselves, to obtain the FFVA for their organization. FFVA data were collected while anonymity of the businesses was ensured. Only identity-related information (meta-data) in regard to industry segment, business size at category scale, and location at continent level was retrieved and only if voluntarily provided by the businesses. Data were collected over the period 2016–2019.

2.3. Data Processing and Analysis

The distribution of the companies across industry segments was compared for the five continents to ensure that balance existed and that bias due to imbalance was avoided. The proximity matrix based on Pearson correlation coefficients was established.
The answer choices selected by the businesses in the SSAFE FFVA were transformed into a scoring system with assignment of a score of 1, 2, or 3 to the subsequent answering options. This meant that a high vulnerability option for the opportunities and motivations related questions was assigned a score of 3 and the low vulnerability option a score of 1, whereas for the controls related questions the order was reversed. The data resulted in a data matrix of 8021 businesses × 50 questions and, hence, 40,050 data points.
Because the assessments resulted in ordinal data, i.e., the variables have natural, ordered categories and the distances between the categories are not known, a nonparametric approach was selected for the evaluation and interpretation of the data. The relative frequencies of the answer choices were calculated for each question across industry segments and across continents, and modes (most frequently selected options) were determined. Modes were also calculated across food fraud categories for comparison of continents. Significance of the effect of industry segment and business size was determined for each fraud factor and for each continent individually in a multifactor analysis using nonparametric tests (two-tailed Kruskal-Wallis test, fraud factor × industry segment and fraud factor × business size). XLstat (Addinsoft, New York, NY, USA) was used for all statistical analyses above. A significance level of p < 0.05 was applied throughout the study.

3. Results and Discussion

3.1. General Evaluation of the Characteristics Determining Fraud Vulnerability Levels

Food fraud self-assessments were conducted by 8021 companies across five continents which were active in a wide range of food industry segments—from farming of plants to production of beverages and from food packaging production to retail (Figure 2). A very similar distribution was observed across the five continents. Relative distribution across the industry segments was highly correlated for the five continents with correlation coefficients varying from 0.931 for the correlations of Africa and the other continents up to 0.988 for Europe and the other continents. Therefore, little bias resulting from interactions between continent and industry segment is expected. The modes of the answer options selected by the businesses are presented for each fraud factor and food industry segment in Figure 2. They are divided graphically into the three key elements: opportunities, motivations, and controls. For opportunities the low vulnerability option (value = 1) was selected most frequently across the board, i.e., 74% of modes across questions and food industry segments are associated with low vulnerability. Both the medium and the high vulnerability answer options were associated with the modes of 13% of the opportunities-related fraud factor questions. For the motivations-related fraud factors, low vulnerability was selected most frequently (89% of the modes was associated with the low vulnerability option), followed by the medium vulnerability option (10%). Hence, motivations scored somewhat lower in terms of fraud vulnerability contribution than the opportunities. For controls, the most common mode for the control-related fraud factors is the medium vulnerability option (56%). It is followed by the low vulnerability option (28%). Overall, this means that the vulnerability to food fraud is often perceived as relatively low when it comes to motivations and somewhat higher in regard to opportunities, with lack of adequate controls being considered to contribute to a larger extent to fraud vulnerability. These results are in agreement with small scale assessments which compared fraud vulnerability across the fish, meat, milk, olive oil, organic banana, and spice industries in Europe [15]. These overall profiles provide a first, general impression of the large dataset. However, more detailed information is available which allows examination of the impact of food industry segment, business size, and businesses’ geographical location, which are described in the following sections.

3.2. The Industry Segment

3.2.1. Differences across Segments

The assessments showed that food industry segments differed in their level of vulnerability for the three key elements (Figure 2). At first sight, level of opportunities for food fraud across the supply chains as reported by the businesses varied considerably across segments with especially businesses involved in the processing of plant and animal perishable products, and the retail sector noting higher vulnerability.
Less variation across segments is observed for motivations with the exception of businesses involved in the production of animals and retail presenting a slightly higher vulnerability. Regarding controls, businesses in animal production and upper tiers across supply chains (retail, catering) indicated fewer adequate controls (lower control scores = higher vulnerability).
After ranking of the industry segments according to threats (combined opportunities and motivations-related responses) based on the multifactor analysis results, it is striking that in particular the animal product supply chain appears to face more threats than businesses in other supply chains (Table 1). Animal conversion, production of animals, processing of animal and plant perishable products, processing of animal perishable products rank among the top five. Those reporting fewest threats are those businesses involved in the first steps of the plant product supply chains (farming of plants and preprocessing handling of plant products), storage, distribution and wholesale, and food packaging production. Because threats may be mitigated by implemented control measures, the level of adequate controls or the lack of controls is also of interest. For this aspect, mostly businesses in the first and final steps of the supply chains rank high, which means they are lacking adequate fraud controls. On the one hand, these are businesses involved in farming of plants, farming of grains and pulses, production of animals or those involved in animal conversion. On the other hand, it concerns end of chain actors, such as those involved in retail and catering. Businesses that hardly interact with food, such as wholesalers and food brokers/agents, also report lower levels of control measures. At the other end of the scale, i.e., those that report the most adequate controls, we find businesses in food/beverage/feed production, food packaging, and fish production. Those industry segments that face threats and have limited controls in place are obviously the most vulnerable to food fraud. These involve businesses in animal product supply chains as well as those at the end of the supply chain (retail, catering). Primary production businesses are far less vulnerable to fraud. These results indicate that the industry segment is an important determinant of food fraud vulnerability and has two dimensions. Both the type of commodity chain (animal more vulnerable than plant) and the tier in the chain (upper tiers more vulnerable than lower tiers) determine food fraud vulnerability.
Interestingly, these vulnerabilities align also with recorded food fraud incidents. For instance, animal products such as meat and edible offal, milk and milk products, fish and other seafood, and honey and royal jelly most fraud records most frequently noted for the period 2008–2013 in the USP database, the FoodShield database, and the EU Rapid Alert System for Food and Feed [17]. Similarly, products of animal origin are over-represented in an analysis of local Finnish food fraud cases [18].
Regarding the tier in the chains, e.g., primary production versus processing versus retail/catering, it has been shown that each tier faces a competitive environment with its own distinct characteristics and pressure. This was illustrated in a study on fraud vulnerability in the Netherlands which indicated the enhanced vulnerability of processors of liquid milk in comparison to their supplying farmers [19]. Similarly, the study of Guntburger et al. [20] indicated that Canadian primary producers felt relatively safe from food fraud in the past, whereas a higher rate of processors that expected to have been victimized in the past was noted, and an even higher rate for distributors (retailers) [20]. In a former study, food service operators (catering) also rated fraud vulnerability considerably higher than other tiers in food supply chains with particularly more opportunities and fewer controls noted [3]. This group indicated that they lacked overview and face limited span of control of their supplies along the supply chains. Without sufficient controls, they are more likely to be victimized by suppliers or by businesses in earlier steps in the supply chain. Especially complex supply chains may create blind spots [21]. On the other hand, the number of supply chains that are long, interconnected, multi-nodal, and complex in nature is ever increasing due to globalization [1].
Another important aspect along supply chains is the difference in level of information that exists between business entities. This information asymmetry is more likely to urge opportunistic behavior which in turn weakens the vulnerability of those towards the end of the chain in longer and more complex supply chains [22]. Interaction of informed expert sellers in one business entity which interact with uninformed customers in other entities down the food supply chains increases the vulnerability of the latter substantially. This potential for fraudulent behavior by expert suppliers with superior information is also seen in health care, legal and financial services, as well as in automobile and computer repair services [23].
It is known that culturally embedded behaviors resulting in unethical practices may become normalized across food chains. It may also have a contagious effect as businesses that may be disadvantaged through such practices are forced to use similar practices for survival. As a result, eventually, some segments/supply chains will become more contaminated than others [24].

3.2.2. Variation in the Segment Effect across Continents

In order to understand the impact on individual factors in greater detail, the significance of the effect of industry segment on fraud vulnerability was determined separately for each continent for each of the 50 fraud factors (Table 2). Fraud vulnerability differed significantly across industry segments for 80% of these fraud factors (Table 2). Especially vulnerability resulting from fraud factors related to technical opportunities (97%) and opportunities in time and place (100%) were very much affected by the industry segment, and this holds for all continents. This means that considerable variation in terms of low and high vulnerability resulting from different levels of opportunities is present across the industry segments—anywhere in the world. For the motivations-related responses, 74% of the factors related to economic drivers and 71% of those related to cultural and behavioral drivers, which presented a significant difference across industry segments. Hence, industry segments differ significantly in the economic drivers they are facing, such as the supply and pricing of materials. This effect also varied more across continents: more variation in motivational drivers across segments was noted for businesses located in Africa, Asia, and Europe, and less for those based in the Americas and Oceania. Technical and managerial controls varied at an intermediate level across industry segments, with 58% and 75% of the factors across continents presenting a significant effect, respectively. However, the effects varied greatly across continents. They ranged from 9% of the technical controls factors showing significant differences across industry segments for Oceania up to 82% for Asia and Europe. Although Oceania showed also a lower number of fraud factors related to managerial controls significantly affected by industry segment (38%), the other continents exhibited more similar significance values (75–100% of the fraud factors presenting a significant effect of industry segment). To conclude, Africa, Asia, and Europe presented large differences in fraud vulnerability across industry segments, Americas to a lesser extent, and Oceania the least. Clearly, the industry segment is a key determinant of opportunities, motivations, and level of controls for food fraud around the globe.

3.3. The Business Size

3.3.1. Differences across Business Size Groups

The size of a business affected the reported threats (i.e., opportunities and motivations) they are facing. According to Kruskal-Wallis tests, in general, businesses with fewer employees are confronted with significantly fewer threats than larger sized businesses. The larger ones perceived themselves as exposed to a higher level of opportunities and motivational drivers across their supply chains. On average, the level of control measures decreased slightly with increase in business size but the levels varied considerably. Although there are no reports linking food fraud to business size to the best of our knowledge, studies on economic fraud and business size relationships exist and some indicated the relevance of business size [25]. Generally, larger sized businesses usually suffer larger losses from this kind of fraud [26]. They are probably better known and more visible, and this kind of food businesses also interact with more suppliers, which increases their exposure. Secondly, larger businesses usually deal with larger orders and bigger sums of money, which may increase attractivity [27]. Thirdly, large businesses often do business across national borders [28]. Finally, large businesses usually have more complicated organizational structures that may favor internal threats [28].

3.3.2. Variation in the Business Size Effect across Continents

The effect of business size was examined in the same manner as the effect of the industry segment described in the previous sections. Reported fraud vulnerability resulting from 49% of the fraud factors was significantly affected by the size of businesses (Table 2). This proportion is considerably lower than noted for the effect of the industry segment (80%) and this is observed for all six food fraud factor categories. Forty percent of the factors in the technical opportunities category and 30% of the factors in the opportunities in time and place category displayed significant differences between food business size groups. Motivational drivers were affected more because 54% of the factors related to economic drivers and 57% of those related to the cultural and behavioral drivers showed a significant different level of fraud vulnerability across businesses of different sizes. Fraud vulnerability resulting from presence or lack of adequate controls was influenced by business size to a similar extent as the motivational drivers: 58% and 55% of the fraud factors related to technical controls and managerial controls, respectively, exhibited significant differences.
The effect of business size on fraud vulnerability varied considerably across continents and to a larger extent than the effect of industry segment. Oceania demonstrated the smallest effect with the fraud vulnerability of 22% of the fraud factors differing significantly across business size groups. On the contrary, Asia presented the largest effect of business size, i.e., for 87% of the fraud factors. Europe (37%), Americas (47%), and Africa (52%) presented intermediate effects. In conclusion, generally the impact of business size on fraud vulnerability is lower than the impact of industry segment, but it varies more with geography.

3.4. The Location

For a first general impression of the impact of geography, the modes of all questions per continent were calculated. They are presented in a spider web diagram in Figure 3. The scores for the food fraud categories across continents agreed fairly well in terms of ranking: For instance, highest vulnerability scores are observed for technical opportunities and the two controls’ categories for all continents. There are, on the other hand, also geographical influences. The five continents were ranked according to the reported threats (scores for opportunities and motivations based on the multifactor analysis results), which resulted in the following order: Africa > Asia > Europe > Oceania > Americas. The levels of controls varied less on average, only the Americas showed a significant higher level of adequate controls compared to the other continents. The differences observed between geographical locations are in agreement with those of former studies which indicated geographical variation in fraud threats in regard to food commodities but also in many other areas [29].

3.5. Considerations Regarding the Determinants Industry Segment, Business Size, and Location

A final step in this study is the comparison of the effects of industry segment, business size, and geographical location of businesses in food supply chains on their fraud vulnerability. The proportion of fraud factors affected by either the industry segment or the business size is presented in Figure 4 for each continent. More food fraud factors exhibited significant differences due to industry segment (74% of the fraud factors on average) than due to business size (49%). The geographical component is more important for the effect of the business size than for the effect of the industry segment, which is indicated by the extent of the spread along the horizontal and vertical axis of the continents in Figure 4. Businesses in Oceania show the most uniform food fraud vulnerability with limited differences due to industry segment or business size, whereas at the other end of the scale we find Asia, where businesses differ substantially in their food fraud vulnerability patterns both in regard to industry segment and business size. Businesses in Africa, the Americas, and Europe show a similar intermediate effect of the size of businesses, but businesses located in the Americas show less effect of the industry segment than African and European businesses. It is obvious that the effect of the geographical location interacts with the effects of the other two company characteristics and needs to be considered when evaluating food fraud risks.

3.6. Considerations Regarding the Study

The SSAFE tool was designed to cover a very broad scope and aimed to be used in practice by “any food business in the world”. As a consequence, the 50 questions cover a wide but still selected range of topics, and this leads to a rough measurement of the key elements. The SSAFE tool was developed in a Western context, although input from businesses around the globe was encouraged during the long trajectory of the development of the tool with, e.g., workshops in Singapore. Nevertheless, economic and cultural practices in Asia generally differ from those in the EU or the Americas. These backgrounds may affect the selection of situations that mimic the own situation best, as required with the SSAFE tool, especially when it concerns more sensitive topics. For instance, questions regarding the ethical business culture and corruption level may result, in general, in more socially desirable answers, but if this desirability bias has a cultural component, it may affect results at the continental level. This was one of the reasons to look also into the results per continent.
Finally, there is, at this stage, limited work showing the correlation between food fraud vulnerability and actual fraud prevalence in food supply networks. To the best of our knowledge, there is only one study. This study deals with fraud vulnerability and prevalence in Chinese milk supply chains [15]. More extensive studies to correlate vulnerabilities and prevalence would certainly enhance fine-tuning of these types of assessments and their predictive and preventative capabilities.

4. Conclusions

A company’s industry segment is a key determinant of its fraud vulnerability and is more important than the size of a business. The effect of the industry segment on fraud vulnerability interacts to some extent with its location, but the influence of the business size varies much more with the company’s location. These business’s characteristics affect fraud vulnerability in different ways by influencing the level of opportunities, motivational drivers, controls, or a mix of them. The industry segment affects and determines predominantly opportunities and to a lesser extent motivational drivers and availability of adequate controls. Business size affects the level of motivational drivers and controls rather than opportunities. Opportunities and motivations vary also with geographical location. From the companies assessed, those involved in animal product supply chains and end of chain tiers (catering, retail) were most vulnerable, and so were larger sized businesses, and businesses located in Africa and Asia.
Certain businesses and employees thereof are constantly identifying new and ingenious ways to defraud their customers. For this reason, it is important for those with a stake in a company to devise ways of identifying and preventing fraud to protect their business interests. Comprehension of key characteristics of businesses leading to high fraud vulnerability and particular elements of fraud vulnerability assist decision making and help to design efficient interventions to combat food fraud.

Author Contributions

Conceptualization, S.M.v.R. and O.N.; methodology, S.M.v.R. and O.N.; formal analysis, S.M.v.R.; data curation, S.M.v.R.; writing—original draft preparation, S.M.v.R.; writing—review and editing, O.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not available.

Acknowledgments

Authors wish to thank the 8021 companies that used the SSAFE FFVA tool to assess their organizations for their fraud vulnerabilities. Secondly, authors gratefully acknowledge PwC for collection and sharing of the anonymous data from the SSAFE-PWC FFVA application.

Conflicts of Interest

There are no relationships or interests to declare that have inappropriately influenced or biased this study and publication. Saskia M. van Ruth is an independent academic. Onno Nillesen is a former employee of PwC. PwC facilitated the data collection on the tooling developed by Wageningen University and the SSAFE organization by means of an online anonymized data collection and support application, as stated in the publication. PwC discontinued the application and hence the data collection and support tool in 2019 and is no longer actively providing this service. PwC transferred the research data collected to Prof. van Ruth for research purposes. Onno Nillesen has been involved in the manuscript development because of his overseeing of the facilitation process and understanding of the data collected. He left PwC on 1 April 2020 and co-founded a consulting business named PlanNed which focuses on supporting businesses on sustainability challenges. Therefore, we declare no financial or nonfinancial conflict of interest in relation to this research paper.

Appendix A. The Fifty Questions of the SSAFE Food Fraud Vulnerability Assessment Tool

NrQuestion
1How simple or complex is adulteration of your raw materials?
2How generally available is the technology and knowledge on adulteration of your raw materials?
3How easily would adulteration of your raw materials be detected and with what kind of methods?
4How generally available is the technology and knowledge allowing adulteration of your final products?
5How easily would adulteration of your final products be detected and with what kind of methods?
6How simple or complex is counterfeiting of your final product?
7How easily would counterfeited final product be detected, and with what kind of methods?
8How would you describe the production processing lines of your company?
9How would you describe the chain network that you are part of?
10How many fraud incidences of similar raw materials have been reported?
11How many fraud incidences of similar final products have been reported?
12How would you define supply and pricing of your raw materials?
13Do special attributes or components determine the value of your raw materials?
14How would you describe the economic conditions of your company?
15What are the characteristics of the organizational/business strategy of your company?
16How would you describe the ethical business culture in your company?
17Has your company been involved in criminal offences previously?
18How would you rate the corruption level (according to the Transparency International Corruption Perception Index) in the countries in which your company is active?
19How would you describe the financial strains imposed by your own company on your direct supplier(s) ?
20How would you describe the economic conditions of your direct supplier(s)?
21What are the characteristics of the organizational/business strategy of your direct supplier(s) ?
22How would you describe the ethical business culture of your direct supplier(s) ?
23Has/have your direct supplier(s) been involved in criminal offences previously ?
24Has/have your direct supplier(s) been victimized by food fraud committed by their suppliers, customers or other parties?
25How would you rate the corruption level (according to the Transparency International Corruption Perception Index) in the countries in which your direct supplier(s) and customers are active?
26How would you describe the economic conditions in your branch of industry?
27Has/have your customer(s) been involved in criminal offences previously ?
28How would you describe the ethical business culture in your branch of industry (i.e., other meat processing companies)?
29How common are criminal offences in your branch of industry?
30How would you rate the level of competition in your branch of industry?
31How would you define price asymmetries created by the legal framework?
32How would you describe the fraud related parts of your raw material monitoring control system of your company?
33Are the fraud monitoring tasks of your raw material control system verified in your company?
34How would you describe the fraud related parts of your final product monitoring control system of your company?
35Are the fraud monitoring tasks of your final product control system verified in your company?
36How extensive is the information system for internal control of mass balance flows in your company?
37How extensive is the tracking & tracing system of your company?
38Is integrity screening of employees common procedure in your company?
39Is there an ethical code of conduct or guidelines in place and embedded in your company?
40Is there a whistle blowing system (system for reporting assumed fraud practices) in place in your company?
41What is characteristic for your contractual requirements with your direct suppliers?
42What features the fraud control system of your direct supplier(s)? An alternative for this question is that direct suppliers fill out the tool themselves with respect to the control measures as defined for the company
43How extensive is the information system for control of mass balance flows of your direct supplier(s)? This question can be only asked direct to the supplier(s)
44How extensive is the tracking & tracing system of your direct supplier(s)? An alternative for this question is that direct supplier(s) fill out the tool themselves with respect to the T&T system as defined for the company
45How would you describe the social control and transparency of actions in your supply chain network?
46How well established is the fraud control support by your branch of industry (e.g., branch of oils and fats)
47How would you describe your national food policy?
48How well are fraud related laws enforced in your local supply chain?
49How well are fraud related laws enforced in your international supply chain network?
50Does your company have fraud contingency measures in place?

References

  1. Everstine, K. Supply chain complexity and economically motivated adulteration. In Series on Food Science, Technology and Nutrition, Food Protection and Security; Kennedy, S., Ed.; Woodhead Publishing: Cambridge, UK, 2017; pp. 1–14. [Google Scholar]
  2. Spink, J.; Moyer, D.C. Defining the public health threat of food fraud. J. Food Sci. 2011, 76, R157–R163. [Google Scholar] [CrossRef]
  3. Van Ruth, S.M.; van der Veeken, P.; Luning, P.A.; Huisman, W. Feeding fiction: Fraud vulnerability in the food service industry. Food Res. Int. 2020, 133, 109158. [Google Scholar] [CrossRef]
  4. Li, S.; Zhu, C.; Chen, Q.; Liu, Y. Consumer confidence and consumers’ preferences for infant formulas in China. J. Integr. Agric. 2019, 18, 1793–1803. [Google Scholar] [CrossRef]
  5. Schaefer, K.A.; Scheitrum, D.; Nes, K. International sourcing decisions in the wake of a food scandal. Food Policy 2018, 81, 48–57. [Google Scholar] [CrossRef] [Green Version]
  6. Cohen, L.E.; Felson, M. Social change and crime rate trends: A routine activity approach. Am. Sociol. Assoc. 1979, 44, 588–608. [Google Scholar] [CrossRef]
  7. Van Ruth, S.M.; Huisman, W.; Luning, P.A. Food fraud vulnerability and its key factors. Tr. Food Sci. Technol. 2017, 67, 70–75. [Google Scholar] [CrossRef]
  8. Soon, J.M.; Krzyzaniak, S.C.; Shuttlewood, Z.; Smith, M.; Jack, L. Food fraud vulnerability assessment tools used in food industry. Food Control 2019, 101, 225–232. [Google Scholar] [CrossRef]
  9. Yang, Y.; Huisman, W.; Hettinga, K.A.; Liu, N.; Heck, J.; Schrijver, G.H.; Gaiardoni, L.; van Ruth, S.M. Fraud vulnerability in the Dutch milk supply chain: Assessments of farmers, processors and retailers. Food Control 2019, 95, 308–317. [Google Scholar] [CrossRef]
  10. Yang, Y.; Huisman, W.; Hettinga, K.A.; Zhang, L.; van Ruth, S.M. The Chinese milk supply chain: A fraud perspective. Food Control 2020, 113, 107211. [Google Scholar] [CrossRef]
  11. Yan, J.; Erasmus, S.W.; Aguilera Toro, M.; Huang, H.; van Ruth, S.M. Food fraud: Assessing fraud vulnerability in the extra virgin olive oil supply chain. Food Control 2020, 111, 107081. [Google Scholar] [CrossRef]
  12. Silvis, I.C.J.; van Ruth, S.M.; van der Fels-Klerx, H.J.; Luning, P.A. Assessment of food fraud vulnerability in the spices chain: An explorative study. Food Res. Int. 2017, 133, 109158. [Google Scholar] [CrossRef]
  13. Manning, L.; Soon, J.M. Food fraud vulnerability assessment: Reliable data sources and effective assessment approaches. Tr. Food Sci. Technol. 2019, 91, 159–168. [Google Scholar] [CrossRef]
  14. Van Ruth, S.M.; Pagter-de Witte, L. Integrity of organic foods and their suppliers: Fraud vulnerability across chains. Foods 2020, 9, 188. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Yang, Y.; Zhang, L.; Hettinga, K.A.; Erasmus, S.W.; van Ruth, S.M. Prevalence of milk fraud in the Chinese market and its relationship with fraud vulnerabilities in the chain. Foods 2020, 9, 709. [Google Scholar] [CrossRef] [PubMed]
  16. Van Ruth, S.M.; Luning, P.A.; Silvis, I.C.J.; Yang, Y.; Huisman, W. Differences in fraud vulnerability in various food supply chains and their tiers. Food Control 2018, 84, 375–381. [Google Scholar] [CrossRef]
  17. Weesepoel, Y.J.A.; van Ruth, S.M. Inventarisatie van Voedselfraude: Mondiaal Kwetsbare Productgroepen en Ontwikkeling van Analytische Methoden in Europees Onderzoek. RIKILT-Report 2015.014; RIKILT Wageningen UR: Wageningen, The Netherlands, 2015; Available online: https://edepot.wur.nl/360164 (accessed on 1 March 2021).
  18. Tähkäpää, S.; Maijala, R.; Korkeala, H.; Nevas, M. Patterns of food frauds and adulterations reported in the EU rapid alarm system for food and feed and in Finland. Food Control 2015, 47, 175–184. [Google Scholar] [CrossRef]
  19. Simpson, S. Making Sense of White Collar Crime: Theory and Research. Ohio State J. Crim. Law 2011, 8, 481–502. Available online: http://hdl.handle.net/1811/73214 (accessed on 1 March 2021).
  20. Guntzburger, Y.; Théolier, J.; Barrere, V.; Peignier, I.; Godefroy, S.; de Marcellis-Warin, N. Food industry perceptions and actions towards food fraud: Insights from a pan-Canadian study. Food Control 2020, 113, 107182. [Google Scholar] [CrossRef]
  21. IBM. Focus on Food Fraud. 2020. Available online: https://www.ibm.com/downloads/cas/YDKZAB6O (accessed on 19 February 2021).
  22. Hazen, B.T.; Skipper, J.B.; Ezell, J.D.; Boone, C.A. Big Data and predictive analytics for supply chain sustainability: A theory-driven research agenda. Comp. Ind. Eng. 2016, 101, 592–598. [Google Scholar] [CrossRef]
  23. Balafoutas, L.; Kerschbamer, R. Credence goods in the literature: What the past fifteen years have taught us about fraud, incentives, and the role of institutions. J. Behav. Exp. Financ. 2020, 26, 100285. [Google Scholar] [CrossRef]
  24. Lord, N.; Spencer, J.; Albanese, J. In pursuit of food system integrity: The situational prevention of food fraud enterprise. Eur. J. Crim. Policy Res. 2017, 23, 483–501. [Google Scholar] [CrossRef]
  25. Junger, M.; Wang, V.; Schlömer, M. Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits. Crime Sci. 2020, 19, 13. [Google Scholar] [CrossRef]
  26. Finnerty, K.; Motha, H.; Shah, J.; White, Y.; Button, M.; Wang, V. Cyber Security Breaches Survey 2018: Statistical Release; Department for Culture and Sport: London, UK, 2018. Available online: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018 (accessed on 1 March 2021).
  27. PWC. 2014 Information Security Breaches Survey. Technical Report; PriceWaterhouseCoopers: London, UK, 2014; Available online: https://www.pwc.co.uk/assets/pdf/cyber-security-2014-technical-report.pdf (accessed on 1 March 2021).
  28. Zweighart, D. Business Email Compromise and Executive Impersonation: Are Financial Institutions Exposed? J. Invest. Compl. 2017, 18, 1–7. Available online: https://www.batesgroup.com/publications/joic-02-2017-0001.pdf (accessed on 1 March 2021).
  29. Forter. Fraud Attack Index. 7th Edition. 2019. Available online: https://l.forter.com/fraud-attack-index-seventh-edition?utm_campaign=2019%20Fraud%20Attack%20Index%207th%20Edition&utm_source=blog&utm_medium=Global%20Fraud%20Trends%3A%20What%20in%20the%20World%20Happened%20in%202019%3F (accessed on 19 February 2021).
Figure 1. Evolvement of keyword search frequency in Google for “food fraud” in the period 2010–2020 (worldwide).
Figure 1. Evolvement of keyword search frequency in Google for “food fraud” in the period 2010–2020 (worldwide).
Foods 10 00842 g001
Figure 2. Overview of modes of the scores for individual questions of the food fraud vulnerability assessment per industry segment collated for opportunities, motivations and controls (global data, n = 8021). Numbers refer to fraud factor/question numbers, which are listed in Table 1. Animal conversion (n = 26); Catering (n = 80); Farming of grains and pulses (n = 49); Farming of plants (n = 279); Food broker/Agent (n = 163); Pre-processing handling of plant products (n = 210); Processing of ambient stable products (n = 757); Processing of animal perishable products (n = 363); Processing of animal and plant perishable products (n = 107); Processing of plant perishable products (n = 286); Production of (bio) chemicals (n = 170); Production of animals (n = 23); Production of beverage (n = 476); Production of feed (n = 66); Production of fish (n = 113); Production of food (n = 3494); Production of food packaging (n = 874); Retail (n = 47); Storage and distribution services (n = 346); and Wholesale (n = 92). A score of 1 indicates low vulnerability, 2 medium vulnerability, and 3 high vulnerability for the opportunities and motivations. For controls, the order is reversed.
Figure 2. Overview of modes of the scores for individual questions of the food fraud vulnerability assessment per industry segment collated for opportunities, motivations and controls (global data, n = 8021). Numbers refer to fraud factor/question numbers, which are listed in Table 1. Animal conversion (n = 26); Catering (n = 80); Farming of grains and pulses (n = 49); Farming of plants (n = 279); Food broker/Agent (n = 163); Pre-processing handling of plant products (n = 210); Processing of ambient stable products (n = 757); Processing of animal perishable products (n = 363); Processing of animal and plant perishable products (n = 107); Processing of plant perishable products (n = 286); Production of (bio) chemicals (n = 170); Production of animals (n = 23); Production of beverage (n = 476); Production of feed (n = 66); Production of fish (n = 113); Production of food (n = 3494); Production of food packaging (n = 874); Retail (n = 47); Storage and distribution services (n = 346); and Wholesale (n = 92). A score of 1 indicates low vulnerability, 2 medium vulnerability, and 3 high vulnerability for the opportunities and motivations. For controls, the order is reversed.
Foods 10 00842 g002
Figure 3. Spiderweb diagram of the modes of scores for each food fraud vulnerability assessment question (Q1, Q2, etc.) for businesses located in the five different continents. If modes of continents overlap, only one color is shown. A score of 1 on the axis indicates low vulnerability, 2 medium vulnerability, and 3 high vulnerability for the opportunities and motivations (Q1–Q31). For controls (Q32–50), the order is reversed.
Figure 3. Spiderweb diagram of the modes of scores for each food fraud vulnerability assessment question (Q1, Q2, etc.) for businesses located in the five different continents. If modes of continents overlap, only one color is shown. A score of 1 on the axis indicates low vulnerability, 2 medium vulnerability, and 3 high vulnerability for the opportunities and motivations (Q1–Q31). For controls (Q32–50), the order is reversed.
Foods 10 00842 g003
Figure 4. Comparison of the effects on variation in food fraud vulnerability responses of businesses in global food supply chains.
Figure 4. Comparison of the effects on variation in food fraud vulnerability responses of businesses in global food supply chains.
Foods 10 00842 g004
Table 1. Vulnerability ranking of industry segments resulting from threat level (scores for opportunities and motivations-related factors) and lack of adequate controls (scores for controls-related factors) from the multifactor analyses: 1 = highest vulnerability; 20 is lowest vulnerability.
Table 1. Vulnerability ranking of industry segments resulting from threat level (scores for opportunities and motivations-related factors) and lack of adequate controls (scores for controls-related factors) from the multifactor analyses: 1 = highest vulnerability; 20 is lowest vulnerability.
Industry SegmentOpportunities + Motivations (Threats)Controls
Animal Conversion13
Production of Animals2.51
Retail2.54
Processing of Animal and Plant Perishable Products (mixed products)410
Processing of Animal Perishable Products517
Processing of Ambient Stable Products6.513
Production of Feed6.514
Production of Beverage818
Production of Food915.5
Production of (bio) Chemicals1012
Catering112
Farming of Grains & Pulses126
Food Broker/Agent138
Processing of Plant Perishable Products1411
Production of Fish1520
Preprocessing handling of plant product1615.5
Production of Food Packaging1719
Farming of Plants18.55
Storage & Distribution Services18.59
Wholesale207
Table 2. Significance of differences in fraud vulnerability scores for individual fraud factors due to industry segment (A) and business size (B) for food businesses located in five continents (Kruskal-Wallis test, two-tailed).
Table 2. Significance of differences in fraud vulnerability scores for individual fraud factors due to industry segment (A) and business size (B) for food businesses located in five continents (Kruskal-Wallis test, two-tailed).
A. Differences Due to Industry SegmentB. Differences Due to Business Size
Key ElementFraud Factor CategoryQuestion nrFraud factorAfrica (n = 452)Americas (n = 4361)Asia (n = 1341)Europe (n = 1458)Oceania (n = 409)Africa (n = 452)Americas (n = 4361)Asia (n = 1341)Europe (n = 1458)Oceania (n = 409)
OpportunitiesTechnical opportunities1Complexity of adulteration of raw materials<0.0001<0.0001<0.0001<0.0001<0.00010.0930.005<0.00010.5220.000
2Availability technology and knowledge to adulterate raw materials<0.0001<0.0001<0.0001<0.00010.0030.050.0260.1620.9890.093
3Fraud detectability in raw materials0.018<0.00010.000<0.0001<0.00010.098<0.00010.0780.3210.061
4Availability technology and knowledge to adulterate final products0.000<0.0001<0.0001<0.00010.0050.0010.84<0.00010.610.155
5Fraud detectability in final products0.002<0.00010.0150.0030.0000.219<0.00010.2270.0520.842
6Complexity of counterfeiting0.000<0.0001<0.0001<0.00010.3010.0220.153<0.00010.6620.17
7Detectability of counterfeiting0.002<0.0001<0.0001<0.00010.0230.01<0.0001<0.00010.2350.023
Opportunities in time and place8Access to production lines/processing<0.0001<0.0001<0.0001<0.00010.0040.2760.5720.0060.150.804
9Transparency in chain network0.000<0.0001<0.00010.0030.0000.0040.075<0.00010.2810.09
10Historical evidence of fraud in raw materials<0.0001<0.0001<0.0001<0.00010.0060.1570.000<0.00010.560.692
11Historical evidence of fraud in final products0.013<0.0001<0.0001<0.00010.0040.1780.343<0.00010.6630.186
MotivationsEconomic drivers12Supply and pricing raw materials0.030.008<0.0001<0.00010.4230.43<0.00010.0010.1960.848
13Valuable components or attributes0.001<0.0001<0.0001<0.00010.0150.0090.197<0.00010.6320.746
14Economic health own company0.0000.364<0.00010.0160.4110.0190.6640.0000.0020.098
20Economic health supplier0.0010.5170.1260.0020.1290.0180.0060.0110.0190.006
26Economic health sector0.0090.007<0.0001<0.00010.1410.0160.216<0.00010.2050.455
30Level of competition branch of industry0.001<0.00010.014<0.00010.4260.0070.1150.0020.1840.088
31Prices asymmetries0.0010.025<0.0001<0.00010.3770.0090.002<0.00010.4070.689
Cultural and behavioral drivers15Organizational strategy own company0.0040.1520.0020.1070.0340.0040.8130.0360.6470.059
16Ethical business culture own company<0.00010.316<0.00010.0230.0670.0090.012<0.00010.130.045
17Criminal offences own company0.0070.1910.0260.0040.8710.0000.0260.0000.0070.008
18Corruption level country own company0.004<0.0001<0.00010.0020.130.092<0.00010.0130.1830.059
19Financial strains supplier0.4630.049<0.00010.0040.0250.0020.307<0.00010.0020.474
21Organizational strategy supplier0.0000.359<0.00010.0010.2970.3720.0000.0090.7680.022
22Ethical business culture supplier0.001<0.00010.020.0090.4120.0480.030.0070.3990.107
23Criminal offences supplier0.0030.021<0.00010.0580.0540.0020.063<0.00010.0080.089
24Victimization supplier<0.00010.029<0.00010.0000.0170.4960.361<0.00010.2460.226
25Corruption level country supplier0.0020.0000.020.0020.130.05<0.00010.0050.0010.004
27Criminal offences customer0.0340.326<0.00010.0010.960.140.457<0.00010.073<0.0001
28Ethical business culture branch of industry0.0370.277<0.0001<0.00010.0030.2010.72<0.00010.0860.028
29Historical evidence branch of industry0.0780.000<0.0001<0.00010.3330.040.308<0.00010.4090.019
ControlsTechnical controls32Fraud monitoring system raw materials0.0340.062<0.00010.0050.050.0000.283<0.00010.0020.124
33Verification of fraud monitoring system raw materials0.2210.2590.0040.0780.2280.0240.156<0.00010.0020.477
34Fraud monitoring system final products0.2850.0140.0000.0030.9460.0020.493<0.00010.2040.106
35Verification of fraud monitoring system final products0.480.0610.0020.0000.7990.1190.068<0.00010.1020.244
36Information system own company0.002<0.0001<0.0001<0.00010.3730.1790.405<0.0001<0.00010.106
37Tracking and tracing system own company0.0000.1430.149<0.00010.2510.0010.0000.0170.1220.112
42Fraud monitoring system supplier<0.00010.003<0.00010.0330.2650.0430.003<0.00010.0420.398
43Information system supplier0.0030.0020.0010.1270.3670.009<0.0001<0.00010.30.108
44Tracking and tracing system supplier<0.00010.058<0.0001<0.00010.1050.0000.0000.0010.0020.279
46Fraud control guidance industry0.0190.170.0550.0060.40.0010.0250.0160.0060.953
50Contingency plan0.0010.2720.0070.0000.0480.0020.1160.0110.0290.381
Managerial controls38Integrity screening own employees0.0050.010.0000.0020.110.3750.01<0.00010.0000.506
39Ethical code of conduct own company0.0000.277<0.00010.0010.4490.4210.068<0.0001<0.00010.101
40Whistle blowing own company0.0010.018<0.00010.0310.0070.0910.01<0.0001<0.00010.016
41Contractual requirements supplier0.0010.018<0.0001<0.00010.0380.1910.509<0.0001<0.00010.945
45Social control chain network0.0080.090.016<0.00010.0440.0150.0130.0180.0180.295
47National food policy0.0030.019<0.0001<0.00010.4440.0010.0710.6970.0030.033
48Law enforcement local chain0.2230.004<0.00010.0010.1830.0530.0280.3430.0020.012
49Law enforcement chain network0.1410.018<0.00010.0370.1170.2370.140.4130.0170.627
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

van Ruth, S.M.; Nillesen, O. Which Company Characteristics Make a Food Business at Risk for Food Fraud? Foods 2021, 10, 842. https://0-doi-org.brum.beds.ac.uk/10.3390/foods10040842

AMA Style

van Ruth SM, Nillesen O. Which Company Characteristics Make a Food Business at Risk for Food Fraud? Foods. 2021; 10(4):842. https://0-doi-org.brum.beds.ac.uk/10.3390/foods10040842

Chicago/Turabian Style

van Ruth, Saskia M., and Onno Nillesen. 2021. "Which Company Characteristics Make a Food Business at Risk for Food Fraud?" Foods 10, no. 4: 842. https://0-doi-org.brum.beds.ac.uk/10.3390/foods10040842

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop