IDENTIFICATION OF FOOD FRAUD VULNERABILITY FACTORS FOR IN THE SPICE INDUSTRY
DOI:
https://doi.org/10.46799/ijssr.v4i10.854Keywords:
control actions, food fraud, motivation, opportunities, vulnerabilityAbstract
Food fraud is a serious problem in the spice industry. This research aims to identify the potential for food fraud in spice commodity supply chain using the Food Fraud Vulnerability Assessment Tool from the Safe Supply of Affordable Food Everywhere (SSAFE). The research was conducted through a case study on two spice commodity industries, namely PT A and PT B, located in Jakarta and Tangerang from June to December 2023. The results of the study indicated that the opportunity factor, the motivation factor, and the control action indicator have high vulnerability in both companies, while in the control action factor, there are indicators that have low vulnerability in PT Y. The preparation of mitigation strategies was obtained from the analysis of the relationship between vulnerability factors, opportunities, motivations and control measures which were then validated from literature sources. Based on the conclusion of the food fraud vulnerability analysis in this study, there were several suggestions that can be put forward to improve the strategy of handling food fraud.
References
[SSAFE] Safe Supply Affordable Food Everywhere. 2015. SSAFE Food fraud Vulnerability Assesment Tools. Europe [EU]: SSAFE.
Aisyah, Y., Agustina, R., & Yunita, D. (2020). Pemanfaatan Teknologi Tepat Guna pada Usaha Produksi Bumbu Bubuk Instan “Meurasa” Masakan Khas Aceh. Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat, 4(3), 297–304. https://doi.org/10.12928/jp.v4i3.1951
Barrere, V., Everstine, K., Théolier, J., & Godefroy, S. (2020). Food fraud vulnerability assessment: Towards a global consensus on procedures to manage and mitigate food fraud. Trends in Food Science and Technology, 100(March), 131–137. https://doi.org/10.1016/j.tifs.2020.04.002
Black, C., Haughey, S. A., Chevallier, O. P., Galvin-King, P., & Elliott, C. T. (2016). A comprehensive strategy to detect the fraudulent adulteration of herbs: The oregano approach. Food Chemistry, 210. https://doi.org/10.1016/j.foodchem.2016.05.004
Bouzembrak, Y., & Marvin, H. J. P. (2016). Prediction of food fraud type using data from Rapid Alert System for Food and Feed (RASFF) and Bayesian network modelling. Food Control, 61. https://doi.org/10.1016/j.foodcont.2015.09.026
Cavin, C., Cottenet, G., Fuerer, C., Tran, L. A., & Zbinden, P. (2018). Food fraud vulnerabilities in the supply chain: An industry perspective. In Encyclopedia of Food Chemistry (Issue 7). Elsevier. https://doi.org/10.1016/B978-0-08-100596-5.21788-5
Everstine, K., Popping, B., & Gendel, S. M. (2020). Food fraud mitigation: Strategic approaches and tools. In Food Fraud: A Global Threat with Public Health and Economic Consequences. INC. https://doi.org/10.1016/B978-0-12-817242-1.00015-4
Galvin-King, P., Haughey, S. A., & Elliott, C. T. (2018). Herb and spice fraud; the drivers, challenges and detection. Food Control, 88. https://doi.org/10.1016/j.foodcont.2017.12.031
Global Food Safety Initiative (GFSI). (2014). GFSI position on mitigating the public health risk of food fraud.
Gussow, K. E., & Mariët, A. (2022). The scope of food fraud revisited. Crime, Law and Social Change, 78(5), 621–642. https://doi.org/10.1007/s10611-022-10055-w
Huisman, W., & van Ruth, S. (2022). Risky business: food fraud vulnerability assessments. Crime, Law and Social Change, 78(5), 559–576. https://doi.org/10.1007/s10611-021-10008-9
Lord, N., Flores Elizondo, C., Davies, J., & Spencer, J. (2022). Fault lines of food fraud: key issues in research and policy. Crime, Law and Social Change, 78(5), 577–598. https://doi.org/10.1007/s10611-021-09983-w
Manning, L. (2016). Food fraud: policy and food chain. Current Opinion in Food Science, 10(2), 16–21. https://doi.org/10.1016/j.cofs.2016.07.001
Owolabi, I. O., & Olayinka, J. A. (2021). Incidence of fraud and adulterations in ASEAN food/feed exports: A 20-year analysis of RASFF’s notifications. PLoS ONE, 16(11 November). https://doi.org/10.1371/journal.pone.0259298
Silvis, I. C. J., van Ruth, S. M., van der Fels-Klerx, H. J., & Luning, P. A. (2017). Assessment of food fraud vulnerability in the spices chain: An explorative study. Food Control, 81, 80–87. https://doi.org/10.1016/j.foodcont.2017.05.019
Soon, J. M., Krzyzaniak, S. C., Shuttlewood, Z., Smith, M., & Jack, L. (2019). Food fraud vulnerability assessment tools used in food industry. Food Control, 101(November 2018), 225–232. https://doi.org/10.1016/j.foodcont.2019.03.002
Soon, & Mei, J. (2019). Food fraud vulnerability assessment: Reliable data sources and effective assessment approaches. Trends in Food Science and Technology, 91, 159–168. https://doi.org/10.1016/j.tifs.2019.07.007
Spink, J., Fortin, N. D., Moyer, D. C., Miao, H., & Wu, Y. (2016). Food fraud prevention: Policy, strategy, and decision-making - Implementation steps for a government agency or industry. Chimia, 70(5). https://doi.org/10.2533/chimia.2016.320
United States Pharmacopeia. (2016). Food fraud Mitigation Guidance Appendix XVII.
Usman, M., Hermadi, I., & Arkeman, Y. (2021). Rancang Bangun Sistem Ketertelusuran Rantai Pasok Ayam Pedaging Melalui Aplikasi Android Berbasis Blockchain. Jurnal Ilmu Komputer Dan Agri-Informatika, 8(2), 105–114. https://doi.org/10.29244/jika.8.2.105-114
Yang, Z., Zhou, Q., Wu, W., Zhang, D., Mo, L., Liu, J., & Yang, X. (2022). Food fraud vulnerability assessment in the edible vegetable oil supply chain: A perspective of Chinese enterprises. Food Control, 138(April), 109005. https://doi.org/10.1016/j.foodcont.2022.109005
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Prinia Pamungkasany, Dase Hunaefi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.