Subscriber access provided by UNIVERSITY OF THE SUNSHINE COAST
Perspective
Recent Developments and Digital Perspectives in Food Safety and Authenticity Jan Fritsche J. Agric. Food Chem., Just Accepted Manuscript • DOI: 10.1021/acs.jafc.8b00843 • Publication Date (Web): 19 Jun 2018 Downloaded from http://pubs.acs.org on June 25, 2018
Just Accepted “Just Accepted” manuscripts have been peer-reviewed and accepted for publication. They are posted online prior to technical editing, formatting for publication and author proofing. The American Chemical Society provides “Just Accepted” as a service to the research community to expedite the dissemination of scientific material as soon as possible after acceptance. “Just Accepted” manuscripts appear in full in PDF format accompanied by an HTML abstract. “Just Accepted” manuscripts have been fully peer reviewed, but should not be considered the official version of record. They are citable by the Digital Object Identifier (DOI®). “Just Accepted” is an optional service offered to authors. Therefore, the “Just Accepted” Web site may not include all articles that will be published in the journal. After a manuscript is technically edited and formatted, it will be removed from the “Just Accepted” Web site and published as an ASAP article. Note that technical editing may introduce minor changes to the manuscript text and/or graphics which could affect content, and all legal disclaimers and ethical guidelines that apply to the journal pertain. ACS cannot be held responsible for errors or consequences arising from the use of information contained in these “Just Accepted” manuscripts.
is published by the American Chemical Society. 1155 Sixteenth Street N.W., Washington, DC 20036 Published by American Chemical Society. Copyright © American Chemical Society. However, no copyright claim is made to original U.S. Government works, or works produced by employees of any Commonwealth realm Crown government in the course of their duties.
Page 1 of 25
Journal of Agricultural and Food Chemistry
The AAPVL-concept for an automated computer-aided identification and evaluation of potentially noncompliant food products traded via e-commerce (A. Krewinkel unpublished data). 152x149mm (150 x 150 DPI)
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
Food Fraud Vulnerability Assessment following an Enterprise Risk Management (ERM) and PDCA approach (J. Fritsche unpublished data). 254x190mm (96 x 96 DPI)
ACS Paragon Plus Environment
Page 2 of 25
Page 3 of 25
Journal of Agricultural and Food Chemistry
Multi-source/multi-domain approach for the prevention of food fraud (J. Fritsche unpublished data). 275x190mm (96 x 96 DPI)
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
1 2
Page 4 of 25
Recent Developments and Digital Perspectives in Food Safety and Authenticity
3 4
Jan Fritsche*
5 6
ABSTRACT (max. 100 words)
7
Food Safety is of fundamental importance for the food processing industry, the food retailers and
8
distributors, as well as for the competent authorities because of its potentially direct impact on
9
consumers’ health. Next to the prevention of microbiological, chemical, and physical hazards
10
increasing efforts are currently made to combat risks associated with food fraud or food authenticity.
11
Food Safety Management Systems nowadays comprise food safety, food defense, and food fraud
12
prevention measures trying to cope with the increasing complexity and globalization of the food
13
supply chains. Future digital opportunities include the prediction of food safety and food authenticity
14
issues by handling structured and unstructured data retrieved from various sources and origins in
15
order to ensure consumers’ health and to minimize economical losses.
16 17
KEYWORDS
18
Food authenticity, food fraud, food safety, food supply chain, prediction models, RASFF, big data,
19
EMA database, National Reference Center for the Authenticity and Integrity of the Food Chain, e-
20
foods, HACCP, IMSOC, industry 4.0, TRACES, Europhyt, Global Food Safety Initiative
21
Corresponding author:
22 23
Max Rubner-Institut, Federal Research Institute of Nutrition and Food, Department of Safety and Quality of Milk and Fish Products, Hermann-Weigmann-Str. 1, 24103 Kiel, Germany
24
Phone: +49-431-609-2250 Fax: +49-431-609-2300 E-mail:
[email protected] 25 26 1
ACS Paragon Plus Environment
Page 5 of 25
27
Journal of Agricultural and Food Chemistry
Introduction
28 29
Food Safety
30
There is an urgent need to drive improvements in the efficiency and effectiveness of food chains. The
31
global population is expected to reach at least 9 billion by the year 2050, requiring up to 70% more
32
food, and demanding food production systems and the food chain to become fully sustainable. This
33
great challenge is complicated interfered by a number of overarching issues, including increasing
34
complexity of food supply chains, environmental constraintsstress, a growing aging population, and
35
changing patterns of consumer choice and food consumption. Within this context, food safety must
36
become an enabler of global food security and refers to food defense and food fraud issues including
37
food authenticity. The following perspective article focuses on recent developments of the latter.
38
Food safety management systems so far have generally focused on the unintentional contamination
39
of food by known ingredients, pathogens, mishandling, or processing. While the vast majority of
40
reported food fraud cases did not result in a threat to consumer health, some acts of food fraud,
41
such as adding adulterant substances, can become dangerous. Unfortunately, criminals usually lack
42
the motivation and/or expertise knowledge to determine whether or not their actions will result in
43
hygienic or chemical risks to consumers. Therefore, food fraud activities have the potential to cause
44
food safety issues.
45 46
Food Authenticity
47
Food authenticity, food adulteration, food crime, and food fraud are frequent terms used in public
48
domain. Food fraud encompasses a wide range of deliberate fraudulent acts, usually with intentional
49
and economic motivation including addition, dilution, tampering, or misrepresentation of food, food
50
ingredients, or food packaging; and includes false or misleading statements made about a product.
51
These clusters are similar to an analysis of the fraud notifications in the European Union Rapid Alert 2
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
Page 6 of 25
52
System for Food and Feed (RASFF) where false, improper, or missing labels/documents were the
53
most common type of food fraud and products of animal origin and dietary supplements were the
54
most frequently adulterated products [1]. However, missing labels/documents are not automatically
55
associated with food fraud. Food supply chain fraud can embrace the integrity of the food item, the
56
manufacturing processes used to produce that food item, and/or the people employed and the data
57
that accompanyingies the food item.
58
Relevant key players against food fraud actions are for example are the EU Food Fraud Network, the
59
UK Food Standards Agency (FSA-UK), the Global Food Safety Initiative (GFSI), the Safe Supply of
60
Affordable Food Everywhere (SSAFE), the US Pharmacopeia (USP), the US Food and Drug
61
Administration (FDA), and the Chinese National Center for Food Safety Risk Assessment (CFSA). The
62
Grocery Manufacturers Association in the USA estimated that global food fraud costs between $10
63
billion and $15 billion per year, affecting approximately 10% of all commercially sold food products
64
[2
65
losses, close off export markets, and damage trust in public institutions. According to Elliott [3]3,
66
increase of the complexity of supply chain networks, the rapid development of technology (internet,
67
printing, mobile phone etc.), and the rapid growth of warehouse systems and refrigerated transport
68
are the main drivers for an increase in food fraud opportunities.
69
Due to the impact on economies and consumer confidence, governments are holding competent
70
food authorities accountable for protecting against all food risks and vulnerabilities including food
71
safety and food authenticity or food fraud (regulation Regulation EU 2017/625).
.].
Formatted: Superscript
Formatted: Superscript
A single incident can permanently destroy a valuable brand, cause long-term industry-wide Formatted: Superscript
72 73
Regulatory Aactivities and cCompliance
74
In tThe European Union (EU),has defined the official food and feed controls for Member States (MS)
75
are defined in Regulation (EC) 882/2004, which ensures the effective implementation of Regulation
76
(EC) 178/2002. According to Regulation (EC) 882/2004, each Member State has to designs an annual
77
plan for their official controls within its territory. These plans should be planned and carried out with 3
ACS Paragon Plus Environment
Page 7 of 25
Journal of Agricultural and Food Chemistry
78
a “risk-based” approach at all stages of production, processing, and distribution. Controls at the
79
“point of entry” from third countries into the EU are included in Regulation (EC) 882/2004,; however,
80
additional controls are defined in Regulation (EC) 669/2009 including. According to Regulation (EC)
81
669/2009, the frequency of official controls for of a particular food (or feed) items from a specific
82
countriesy of origin is defined and is enforced in every each Member State.
83
The Official Controls Regulation (OCR; Regulation EU 625/2017) replaces the current regulation on
84
official controls (Regulation (EC) No 882/2004). It provides the framework for Member States (MS) to
85
verify that businesses comply with agri-food chain rules, encompassing all activities from farm to fork
86
including import controls and export certificates. The OCR replaces the current regulation on official
87
controls (Regulation (EC) No 882/2004 ). The agri-food chain encompasses all those activities that
88
range from farm to fork. AAgri-food chain rules therefore cover holistically the safety and quality of
89
food and feed (including fraud), as well as plant health, animal health and welfareincluding fraud.,
90
differentiate quality of food and feed, plant health, animal health and welfare. They also cover
91
import controls on goods entering the EU from third countries and export certificates.
92 93
Digitial iInformation mManagement Ssystems for Official Controls
94
At the European level, the European Commission may, by means of implementing acts, designate
95
European Union reference centrers that shall support the activities of the Commission and of the
96
Member States to prevent, detect, and combat violations of the rules referred to in Article 1(2)
97
perpetrated through fraudulent or deceptive practices (article 97 regulation Regulation EU
98
625/2017). In the light of the revision of the Regulation (EC) 882/2004, the German Federal Ministry
99
of Food and Agriculture (BMEL) in 2016 introduced in 2016 a dedicated National Reference Center
100
for the Authenticity and Integrity of the Food Chain under the leadership of the Max Rubner-
101
Institute, Federal Research Institute of Nutrition and Food (for more information about the MRI visit
102
MRI). The tasks of that National Reference Center will comprise the provision of (digital) information 4
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
103
on food fraud for the competent authorities in Germany, the development of accredited analytical
104
methods for the detection of food fraud, and the development of certified reference material and
105
authentic food samples.
106
IMSOC is the Information Management System for Official Control, so a new interconnected IT
107
system that needs to be implemented according the new Regulation 2017/625 about on official
108
controls and will include among others:
109
-
TRACES: European Commission's multilingual online management tool for all
110
sanitary and organic requirements on intra-EU trade and importation of animals,
111
semen and embryos, food, feed, and plants.
112
-
Europhyt: a notification and rapid alert system dealing with
113
Interceptionsinterceptions for plant health reasons of consignments of plants and
114
plant products imported into the EU or being traded within the EU itself.
115 116
-
Page 8 of 25
Formatted: Default Paragraph Font
RASFF: a key tool to ensure the flow of information, which enables a to enabling swift reaction, when risks to public health are detected in the food chain is RASFF.
117 118
In the EU, the Rapid Alert System for Food and Feed (RASFF) has been established as part of the
119
Regulation (EC) 178/2002 in order to support the control and safety of food and animal feed on the
120
European market. Under RASFF, members (EU-28 national competent authorities, the European
121
Commission, the European Food Safety Agency (EFSA), European Space Agency (ESA), Iceland,
122
Norway, Lichtenstein, and Switzerland) exchange information electronically, e.g. news, notifications,
123
and alerts, which are available through the RASFF portal. On this Iinternet portal interactive searches
124
can be performed in the RASFF database. The RASFF database includes both intentional food frauds,
125
for example fraudulent documents or adulteration cases, as well as unintentionally frauds, such as
126
improper, expired, or missing documents. From 2010 until to 2013 in a total of 749 notifications were
127
reported in the RASFF database under the hazard category “adulteration/fraud”, which comprises of 5
ACS Paragon Plus Environment
Page 9 of 25
Journal of Agricultural and Food Chemistry
128
6 different fraud classes: (i1) improper, fraudulent, missing, or absent health certificates, (ii2) illegal
129
importations, (iii3) tampering, (iv4) improper, expired, fraudulent, or missing common entry
130
documents (CED), (v5) expiration date, and (6vi) mislabeling.
131
Fraud notifications in RASFF have been analyszed in a few studies., The work from such as by Kleter
132
et al. 4 and co-workers coversfor the period 2003-2007 [4] and by Tähkäpää and co-workers for the
Formatted: Superscript
133
period 2008-2012 [1]. Within this periodIn the period From 2003 -to 2007, ina total of 248
Formatted: Superscript
134
notifications of fraud related issues were reported in RASFF, the majority pertained related to illegal
135
imports and lack of authorization of establishment and of transits. The predominante products were
136
meat (23%), seafood (19%), and followed by composite and mixed products (17%). Most frauds and
137
the products originated mainly from Asia (44% of the notifications) and EU (22% of the notifications).
138
An increase in tThe number of reports notifications increased was noticed after mid-2005 [4].
Formatted: Superscript
139
Comparable data were provided Similar results were observed by Tähkäpää et al.and co-workers1 [1]
Comment [NH1]: s.o.
140
for in during the following period (2008-2012). Fish and fish products and meat and meat products
141
were the most frequently reported product categories, with 16% and 11%, respectively. and Asia was
142
again by far (45%) the most common region of origin (45%). Although food fraud per se does not
143
result in a high number of notifications (2%) [1], it has the potential to become a real health risks tofor
144
humans and animals due to unpredictable risk management situations. and t Therefore, control and
145
food fraud mitigation strategies should need to be developed and applied including increased border
146
to increase the border efficiency of border in order and to allow a fast detection of food fraud and
147
management actions.
148
In the USA, the US Food Safety and Modernization Act (FSMA) was passed in January 2011 and in
149
2015 the FSMA Preventative Controls rule (FSMA-PC) was published, which included directions with
150
respect to Food Fraud and “Economically Motivated Adulteration” (EMA) in the final rule (FDA,
151
2009). It is notable thatnoteworthy that the RASFF database has a completely different fraud type
152
classification approach than compared to the EMA and USP databases., EMA which classifiesd 9 types
153
of food fraud, for example, substitution, dilution, artificial enhancement, dilution, counterfeit,
Formatted: Superscript
6
ACS Paragon Plus Environment
Formatted: Superscript
Journal of Agricultural and Food Chemistry
154
transshipment, counterfeit, and misbranding, whereas . In the USP database only 3 distinguishedd
155
food fraud classes are applied: addition, replacement, and removal.
Page 10 of 25
156 157
Food Fraud Assessment
158
Conventional and emerging The analytical techniques (both conventional and emerging) used to
159
identify food fraud involve sensory, physicochemical, DNA-based, chromatographic, and
160
spectroscopic methods. ,In addition, these methods and have been successfully combined with
161
chemometrics, making these techniques more convenient and effective for the analysis of a broad
162
variety of food products. Despite recent advances in the development of analytical methods, the
163
demand need remains for novel suitably sensitive and widely applicable and validated methodologies
164
that encompass all the various aspects of food adulteration is still existing.
165 166
Analytical Detection & Verification
167
For the analysis of food authenticity or the identification/verification of food fraud comprehensive
168
analytical methods are commonly applied. For that purpose targeted and non-targeted approaches
169
have been developed based on various analytical methods. , fFor example, Fourier-Transform
170
Infrared spectroscopy (FTIR) has already been already successfully implemented in food fraud
171
detection [5]. DNA sequencing techniques are also considered to be reliable, nevertheless, their
Formatted: Superscript
172
limitations have been discussed [6] and make them unsuitable to be employed as stand-alone tools in
Formatted: Superscript
173
the field of authentication. Furthermore, according to European legislation concerning the
174
performance of analytical methods [7], those approaches would be classified as screening methods
175
and as such they are not fit for the purpose of confirming adulteration to required legal standards.
176
This is due, due to a lack of chemical structure confirmation, if the legal action is to be pursued by
177
industry or regulators. High Resolution Mass Spectrometry (HRMS), Isotope-ratio mass spectrometry
Formatted: Superscript
7
ACS Paragon Plus Environment
Page 11 of 25
Journal of Agricultural and Food Chemistry
178
(IRMS), and Nuclear magnetic resonance (NMR) spectroscopy based fingerprinting approaches have
179
also been employed in food authentication., hHowever, even though such methods provide the
180
possibility of detecting unusual deviations within the sample set, instrumental analysis is time
181
consuming, requires expensive equipment, data storage facilities, and high processing power [8].
182
Available targeted mass spectrometry based methods designed for the purpose of confirming
183
adulteration confirmation usually employ food profiling approaches, whereby sample classification is
184
based on analyszing a selected group of matrix constituents, such as flavonoids in Ginkgo biloba or
185
ginsenosides in Panax Ginseng [9,; 10]. Such validated analytical methods ensure the accuracy of the
Formatted: Superscript
186
analytical determination [8], however, they are prone to ‘targeted designed adulteration’ [11] due to
Formatted: Superscript
187
increased knowledge regarding chemical composition of food commodities. Overall, designing an
188
analytical approach suitable for rapid, low-costcheap, and reliable detection and confirmation of
189
adulteration still presents a great challenge with respect to the experimental design (e.g. selectivity,
190
specificity, chosen (bio)markers, etc.).
Formatted: Superscript
Formatted: Superscript
191 192
Digital aApproaches to cCombat Food Fraud
193
A novel concept for the automated computer-aided identification and evaluation of potentially non-
194
compliant food products traded via electronic commerce was developed by Krewinkel et al. [12]. That
195
AAPVL prototype (AAPVL) was developed using applying a modular architecture consisting of
196
comprising a research tool, an image analysis tool, and a monitoring tool (see Figure 1). The research
197
tool utilizes both iInternet search engines and customized search algorithms. The data acquisition
198
module stores saves all matching data from webpages for later analysis and preservation
199
documentation of evidence. The image analysis tool performs logo recognition in order to
200
supplement enrich the text-based information of websites. The monitoring tool performs regular
201
automated monitoring of e-foodonline vendors, products, and ingredients. The proof of principle of
202
the prototype was achieved proven by conducting a web search for potentially hazardous food
203
products containing synephrine and caffeine. In total, 1242 product offerings on the internet for of 8
ACS Paragon Plus Environment
Formatted: Superscript
Journal of Agricultural and Food Chemistry
Page 12 of 25
204
suspicious food products were identified on the Internet among the 8683 qualified search results.
205
Thus, that this prototype has shown the potential to enhance strength consumer protection and food
206
safety with respect to online marketed e-foods [12].
Formatted: Superscript
207 208
Food Fraud Prevention: Risk Aassessment and rRisk mManagement
209
Next to the competent authorities around the world, food fraud prevention is also a hot topic for the
210
agri-food business. For that reason, quality management systems are currently adapted to include
211
food fraud vulnerability assessment tools. As is usual for quality management systems, food fraud
212
management systems are based on a continuous process typically following an Enterprise Risk
213
Management (ERM) and PDCA approach (see Figure 2). It Ttypically it starts with an evaluation to
214
characterize the food fraud vulnerabilities, which includes knowledge about used materials and
215
existing risks (e.g. geographical origins, history, economic factors, incident review, emerging issues),
216
active suppliers, supply chain (length, complexity, supply and demand arrangements), and existing
217
control measures. The Nnext step is the design and review of mitigation strategies and their
218
implementation. As soon as changes in the supply chain for an ingredient or a newly identified
219
adulterant for an ingredient are known, which may impact the previously identified vulnerabilities,
220
the entire process must be reassessed in order to ensure its continued effectiveness. For more
221
details on the Food Fraud iInitial Screening (FFIS) visit Spink et al. [13] and COSO literature [14]. It is
222
notable that GFSI compliance already requires a food fraud vulnerability assessment and mitigation
223
plan, which forces food companies into action. More recently, SSAFE, developed in cooperation with
224
PwC, Wageningen University, Vrije Universiteit Amsterdam, and in consultation with food industry
225
leaders around the world, developed a free-of-charge food fraud vulnerability assessment app, which
226
is supports the GFSI requirements (for more details visit: www.pwc.com/foodfraud).
Formatted: Superscript Formatted: Superscript
227 228
Prediction of Ffood sSafety iIncidents and fFood fFraud
9
ACS Paragon Plus Environment
Page 13 of 25
Journal of Agricultural and Food Chemistry
229
In order to prevent incidents from happening in the future, vVarious researchers and risk managers
230
have explored the possibilities to forecast food safety and food fraud incidents , including the timely
231
identification of trends and eventsby monitoring trends and events. that might eventually give rise to
232
food safety and food fraud incidents. Generally, various iInternational as well as and local
233
developments may directly or indirectly influence the performance of food-producing systems, for
234
example among them climate change, economy and trade shifts, but also human behaviourbehavior
235
(e.g. bio terrorism or sabotage), and new technologies [15‒18]. The ten key drivers to of food safety and
Formatted: Superscript
236
nutrition risks were recently identified recently in a scoping study on food safety and nutrition [19
Formatted: Superscript
237
]:were: 1i) global economy and trade, 2ii) global cooperation and standard setting, 3iii) governance,
238
4iv) demography and social cohesion, 5v) consumer attitudes and behaviour, 6vi) new food chain
239
technologies, 7vii) competition for key resources, 8viii) climate change, 9ix) emerging food chain risks
240
and disasters, and 10x) new agri-food chain structures.
241 242
A holistic approach taking stock of the forces that act upon the food chain (from farm to fork) and
243
their effect on food safety has been adopted by the FAO [20]. Such an approach has also been
Formatted: Superscript
244
proposed to address climate induced food safety risks [16,; 18,; 21]. The FAO20 has adopted Aa holistic
Formatted: Superscript
245
approach that includes a full host environment analysis of the whole entire food chain in which the
246
driving forces of food safety risks are identified and assessed determined, including associated data
247
sources from various origins. A similar approach has also been considered for climate induced food
248
safety risks.16,18,21
249 250
Application of the holistic approach in a working system to identify known and emerging food safety
251
risks needs a model that links all drivers and their dependencies. It also needs to connect , as well as
252
underlying databases from various sources and origins, and preferably allows scenario studies. A
253
suitable model should access data on the drivers, process these data, and perform calculations to
254
provide predictions on emerging food safety and food fraud risks, preferably in real-time, data on the
255
drivers, process these data, and perform calculations in order to provide predictions on (emerging)
256
food safety and food fraud risks. Up to nowTo date, no modelling approach or system has been
Formatted: Not Highlight
10
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
Page 14 of 25
257
developed for the food production chain that is able to combine take into account underlying
258
databases, interactions, and feed-back loops of the drivers, as required as encountefor red in a
259
holistic approach. One promising approach, however, is utilizing a Bayesian Network (BN) approach.
260
Novel food fraud predication approaches should consist of multi-source/multi-domain strategies
261
combining relevant information from the food business information domain, the competent
262
authorities information domain, as well as the public domain (see Figure 3). That kind of big data
263
approach will most likely be able to provide the largest data pool for food fraud prediction models.
264
Data access rights/data ownership as well as streamlining data plausibility will be the biggest legal
265
challenge for a successful food safety risk management. Ultimately, global information contracts
266
between all involved stakeholders involved, agri-food business, competent authorities, and the
267
public domain alike, are foreseen as a long term requirement for food fraud predictions.
268 269
Bayesian nNetwork
270
BNs are a class of probabilistic models originating from Bayesian statistics and decision theory in
271
addition to graph theory [22,; 23]. The structure of a BN consists ofcontains nodes (i.e., random
272
variables) connected by directed arcs reflecting a dependence structure between the nodes. BNs are
273
applied in many applicationsfields, such as hazard and risk assessment [24,; 25], fraud detection [26,; 27],
274
accident prevention [28], and food fraud prediction [29,; 30]., nanomaterials [31,; 32], and medical image
275
analysis [33]. BNs have the ability to integrate different data sources and types, such as expert
276
knowledge, measurement data, and feedback experience
[341
Formatted: Superscript
Formatted: Superscript Formatted: Superscript Formatted: Superscript Formatted: Superscript Formatted: Superscript Formatted: Superscript
] using Bayes theorem.
Formatted: Superscript
277
Formatted: Superscript, Highlight Formatted: Highlight
278
Case Sstudy hHerbs & sSpices
279
Recently, Bouzembrak et al. [3533] developed a BN model in order to predict the presence of food
280
safety hazards in herbs and spices to guide risk-based monitoring (prediction accuracy of 85%). This
281
suggested approach consisted of a 3-step-process: 1(i) data collection on the main factors (hazards,
Formatted: Space After: 0 pt, Don't adjust space between Latin and Asian text, Don't adjust space between Asian text and numbers Formatted: Not Highlight Formatted: Superscript
11
ACS Paragon Plus Environment
Page 15 of 25
Journal of Agricultural and Food Chemistry
282
product, country of origin) from using different data sources among which including KAP (Dutch
283
national monitoring program for chemical contaminations in food and feed) and the RASFF database
284
, the Dutch national monitoring program for chemical contaminations in food and feed (KAP),
285
Eurostat, the EU pesticide database and legislation; 2(ii) construct a BN model including nodes,
286
arrows, states, and the parameters for each node in the form of conditional probability tables (CPTs);
287
and 3(iii) validate the model using an independent dataset.
288
A summary of the most common hazards, products, countries of origin reported for herbs and spices
289
is shown in Table 1.
290 291
Table 1: Most common hazards reported for herbs and spices in the KAP and RASFF database. The
292
numbers in bracket indicate the number of incidents.
Hazard category:
Affected products:
Countries of origin:
1. Mycotoxins (1422)
1. Paprika (398)
RASFF (2005-2014)
2. Pesticides (528)
2. Chili pepper (330)
3. Pathogens (459)
3. Curry leaves (279)
4. Composition (399)
1. India (32%) 2. Thailand (12%) 3. Vietnam (5%) KAP (2005-2011) 1. India (23%) 2. Netherlands (11%) 3. Indonesia (8%)
293 294
Overall, the most common hazards recorded for herbs and spices in RASFF (2005-2014) and KAP
295
(2005-2011) were mycotoxins (1422), pesticides (528), pathogens (459), and composition (399) and
296
on product basis paprika (398), chili pepper (330), and curry leaves (279). Considering the countries
297
of origin, the most frequently reported origin in RASFF and KAP was India (32%), followed by Thailand
298
(12%) and Vietnam (5%), while in KAP India (23%) was first, followed by the Netherlands (11%) and
299
Indonesia (8%). It is noticeable that a lack of consistency in the terminology used in the used data
300
sources occurred. On the other hand, the The BN model could help to target sampling and analyses 12
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
Page 16 of 25
301
of products based on hazard prediction e.g. decide if investigations should be focused at market level
302
or border inspectioncan also be applied to identify the products, hazards, and countries of origin to
303
be sampled at the market level (. As reported by Bouzembrak et al. [35],). the monitoring plan
304
depends on the point in the supply chain, at which the product is sampled. For instance, at a border
305
inspection, the inspection should focus on curry, curry leaves, and chili pepper imported from India,
306
whereas at the market level, the inspection should focus more on paprika, chili pepper, and nutmeg
307
imported from India and Thailand.
Formatted: Superscript
308 309
Conclusion & Expectations
310
Over the last decade the focus of food safety developments around the world shifted from the
311
traditional food safety HACCP principle to food defense (after 09/11 in the USA) and most recently to
312
food fraud prevention. The latter is heavily pushed forward on in the global agenda of food safety
313
due to substantial regulatory acitivities in the USA, China, and Europe, but also due to the
314
engagement of the global agri -food business in order to prevent food fraud. Joint efforts making use
315
of the food business information domains and the competent authorities’ information domains at
316
the global level could contribute to minimize economical losses and to improve consumers’
317
confidence in food safety and quality (Figure 3). Closer international cooperations between national
318
authorities at the strategic and operational level as well as improved and enlarged IT-based data
319
exchange systems along the entire agri -food chain would contribute to that goal. Cooperations are
320
considered as prerequisites in order to evolve food safety in the 21st century.
321
Digital challenges will be the development of novel and reliable food fraud predication approaches
322
applying e.g. artificial neural networks and/or probabilitisticprobabilistic models, such as a Bayesian
323
nNetwork, enabling adequate and timely ressource allocations within the food control community as
324
well as within the agri -food business. Ultimatively, big data solutions will also require significant
325
changes in the education and qualification of future employees of competent authorities and the
326
agri -food business alike. being part of an industry 4.0 environment. 13
ACS Paragon Plus Environment
Page 17 of 25
Journal of Agricultural and Food Chemistry
327 328
Acknowledgement
329
The author would like to thank Prof. Martin Holle (Hamburg University of Applied Sciences, Germany)
330
for fruitfull discussions on legal aspects.
331 332 333 334 335 336
References
337
1. Tähkäpää, S.; Maijala, R.; Korkeala, H.; Nevas, M. Patterns of food frauds and adulterations
338
reported in the EU rapid alert system for food and feed and in Finland. Food Control 2015,
339
47, 175‒184.
340 341 342
Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double
2. Manning, L.; Soon, J. M. Food Safety, Food Fraud, and Food Defense: A Fast Evolving Literature. J. Food Sci. 2016, 81, R823–R834. 3. Elliott, C. Elliott Review into the Integrity and Assurance of Food Supply Networks – Final
343
Report: A National Food Crime Prevention Framework; HM Government: London, UK, 2014.
344
https://www.gov.uk/government/publications/elliott-review-into-the-integrity-and-
345
assurance-of-food-supply-networks-final-report (January 5, 2018).
346
4. Kleter, G. A.; Prandini, A.; Filippi, L.; Marvin, H. J. Identification of potentially emerging food
347
safety issues by analysis of reports published by the European Community's Rapid Alert
348
System for Food and Feed (RASFF) during a four-year period. Food Chem. Toxicol. 2009, 47,
349
932‒950.
350
5. Ellis, D. I.; Muhamadali, H.; Haughey, S. A.; Elliott, C. T.; Goodacre, R. Point-and-shoot: rapid
351
quantitative detection methods for on-site food fraud analysis – moving out of the laboratory
352
and into the food supply chain. Anal. Methods 2015, 7, 9401‒9414.
14
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
353
6. Parveen, I.; Gafner, S.; Techen, N.; Murch, S. J.; Khan, I. A. DNA Barcoding for the
354
Identification of Botanicals in Herbal Medicine and Dietary Supplements: Strengths and
355
Limitations. Planta Med. 2016, 82, 1225‒1235.
356
Page 18 of 25
7. 2002/657/EC: Commission Decision of 12 August 2002 implementing Council Directive
357
96/23/EC concerning the performance of analytical methods and the interpretation of results
358
(Text with EEA relevance) (notified under document number C(2002) 3044); Official Journal
359
of the European Communities L 221/8, 2002; p. 18.
360 361 362 363 364
8. Esslinger, S.; Riedl, J.; Fauhl-Hassek, C. Potential and limitations of non-targeted fingerprinting for authentication of food in official control. Food Res. Int. 2014, 60, 189‒204. 9. Xie, B. D.; Wang, H. T. Effects of light spectrum and photoperiod on contents of flavonoid and terpene in leaves of Ginkgo biloba L. J. Nanjing Forestry Uni. 2006, 30, 51‒54. 10. Yuan, J.; Chen, Y.; Liang, J.; Wang, C. Z.; Liu, X.; Yan, Z.; Tang, Y.; Li, J.; Yuan, C. S. Component
365
analysis and target cell-based neuroactivity screening of Panax ginseng by ultra-performance
366
liquid chromatography coupled with quadrupole-time-of-flight mass spectrometry. J.
367
Chromatogr. B Analyt. Technol. Biomed. Life Sci. 2016, 1038, 1‒11.
368 369 370
11. Sanzini, E.; Badea, M.; Dos Santos, A.; Restani, P.; Sievers, H. Quality control of plant food supplements. Food Funct. 2011, 2, 740–746. 12. Krewinkel, A.; Sünkler, S.; Lewandowski, D.; Finck, N.; Tolg, B.; Kroh, L. W.; Schreiber, G. A.;
371
Fritsche, J. Concept for automated computer-aided identification and evaluation of
372
potentially non-compliant food products traded via electronic commerce. Food Control 2016,
373
61, 204‒212.
374 375 376 377
13. Spink, J.; Moyer, D. C.; Speier-Pero, C. Introducing the Food Fraud Initial Screening model (FFIS). Food Control 2016, 69, 306‒314. 14. COSO (Committee of Sponsoring Organizations of the Treadway Commission). Welcome to COSO. https://www.coso.org (January 6, 2018).
Field Code Changed Formatted: No underline, Font color: Auto Formatted: No underline, Font color: Auto
15
ACS Paragon Plus Environment
Page 19 of 25
Journal of Agricultural and Food Chemistry
378
15. Boland, M. J.; Rae, A. N.; Vereijken, J. M.; Meuwissen, M. P. M.; Fischer, A. R. H.; van Boekel,
379
M. A. J. S.; Rutherfurd, S. M.; Gruppen, H.; Moughan, P. J.; Hendriks, W. H. The future supply
380
of animal-derived protein for human consumption. Trends Food Sci. Technol. 2013, 29, 62–
381
73.
382
16. GO-Science (The Government Office for Science). Foresight. The Future of Food and Farming
383
‒ Challenges and choices for global sustainability. Final Project Report; GO-Science: London,
384
UK, 2011. https://www.gov.uk/government/publications/future-of-food-and-farming
385
(January 6, 2018).
Formatted: No underline, Font color: Auto Formatted: No underline, Font color: Auto Field Code Changed
386
17. Godfray, H. C. J.; Beddington, J. R.; Crute, I. R.; Haddad, L.; Lawrence, D.; Muir, J. F.; Pretty, J.;
387
Robinson, S.; Thomas, S. M.; Toulmin, C. Food Security: The Challenge of Feeding 9 Billion
388
People. Science 2010, 327, 812‒818.
389
18. Miraglia, M.; Marvin, H. J.; Kleter, G. A.; Battilani, P.; Brera, C.; Coni, E.; Cubadda, F.; Croci, L.;
390
De Santis, B.; Dekkers, S.; Filippi, L.; Hutjes, R. W.; Noordam, M. Y.; Pisante, M.; Piva, G.;
391
Prandini, A.; Toti, L.; van den Born, G. J.; Vespermann, A. Climate change and food safety: an
392
emerging issue with special focus on Europe. Food Chem. Toxicol. 2009, 47, 1009‒-1021.
Formatted: Font: Italic Formatted: Font: Bold
393
19. FCEC (Food Chain Evaluation Consortium). Scoping study: Delivering on EU food safety and
394
nutrition in 2050 - Scenarios of future change and policy responses. Final Report; European
395
Commission: Brussels, Belgium, 2013.
396
https://ec.europa.eu/food/sites/food/files/safety/docs/final_report_scoping_study_en.pdf
397
(January 6, 2018).
398
Formatted: Font: Italic
20. FAO (Food and Agriculture Organization of the United Nations). Assuring Food Safety and
399
Quality: Guidelines for Strengthening National Food Control Systems; FAO Food and Nutrition
400
Papers (Book 76); FAO, WHO (World Health Organization): Rome, Italy, 2003.
401
http://www.fao.org/docrep/006/y8705e/y8705e00.htm (January 6, 2018).
Formatted: No underline, Font color: Auto Formatted: No underline, Font color: Auto
402 403
21. Marvin, H. J.; Kleter, G. A.; Prandini, A.; Dekkers, S.; Bolton, D. J. Early identification systems for emerging foodborne hazards. Food Chem. Toxicol. 2009, 47, 915‒926. 16
ACS Paragon Plus Environment
Field Code Changed
Journal of Agricultural and Food Chemistry
404 405 406 407 408 409 410 411 412 413
Page 20 of 25
22. Nielsen, T. D.; Jensen, F. V. Bayesian Networks and Decision Graphs, 2nd edition; Jordan, M., Kleinberg, J., Schölkopf, B., Eds.; Springer: New York, NY, 2007. 23. Bonafede, C. E.; Giudici, P. Bayesian Networks for enterprise risk assessment. Physica A 2007, 382, 22‒28. 24. Billoir, E.; Delignette-Muller, M. L.; Péry, A. R.; Charles, S. A Bayesian approach to analyzing ecotoxicological data. Environ. Sci. Technol. 2008, 42, 8978‒8984. 25. Iorio, F.; Tagliaferri, R.; di Bernardo, D. Identifying Network of Drug Mode of Action by Gene Expression Profiling. J. Comput. Biol. 2009, 16, 241‒251. 26. Kirkos, E.; Spathis, C.; Manolopoulos, Y. Data Mining techniques for the detection of fraudulent financial statements. Expert Syst. Appl. 2007, 32, 995–1003.
414
27. Ngai, E. W. T.; Hu, Y.; Wong, Y. H.; Chen, Y.; Sun, X. The application of data mining techniques
415
in financial fraud detection: A classification framework and an academic review of literature.
416
Decis. Support Syst. 2011, 50, 559‒569.
417
28. Mohammadfam, I.; Ghasemi, F.; Kalatpour, O.; Moghimbeigi, A. Constructing a Bayesian
418
network model for improving safety behavior of employees at workplaces. Appl. Ergon. 2017,
419
58, 35‒47.
420
29. Bouzembrak, Y.; Marvin, H. J. P. Prediction of food fraud type using data from Rapid Alert
421
System for Food and Feed (RASFF) and Bayesian network modelling. Food Control 2016, 61,
422
180‒187.
423
30. Marvin, H. J. P.; Bouzembrak, Y.; Janssen, E. M.; van der Fels- Klerx, H. J.; van Asselt, E. D.;
424
Kleter, G. A. A holistic approach to food safety risks: Food fraud as an example. Food Res. Int.
425
2016, 89, 463‒470.
426
31. Marvin, H. J.; Bouzembrak, Y.; Janssen, E. M.; van der Zande, M.; Murphy, F.; Sheehan, B.;
427
Mullins, M.; Bouwmeester, H. Application of Bayesian networks for hazard ranking of
428
nanomaterials to support human health risk assessment. Nanotoxicology 2017, 11, 123‒133.
Formatted: Highlight
17
ACS Paragon Plus Environment
Page 21 of 25
429
Journal of Agricultural and Food Chemistry
32. Murphy, F.; Sheehan, B.; Mullins, M.; Bouwmeester, H.; Marvin, H. J. P.; Bouzembrak, Y.;
430
Costa, A. L.; Das, R.; Stone, V.; Tofail, S. A. M. A Tractable Method for Measuring
431
Nanomaterial Risk Using Bayesian Networks. Nanoscale Res. Lett. 2016, 11, 503.
432
33.31.
Arias, J.; Martínez-Gómez, J.; Gámez, J. A.; Seco de Herrera, A. G.; Müller, H. Medical
433
image modality classification using discrete Bayesian networks. Comput. Vis. Image Und.
434
2016, 151, 61‒71.
435
34. Buriticá, J. A.; Tesfamariam, S. Consequence-based framework for electric power providers
Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double
using Bayesian belief network. Int. J. Elec. Power 2015, 64, 233‒241.
436 437
32.
Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double
438
35. Bouzembrak, Y.; Camenzuli, L.; Janssen, E.; van der Fels-Klerx, H. J. Application of Bayesian
Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double
439
Networks in the development of herbs and spices sampling monitoring system. Food Control
440
2018, 83, 38‒44.
441
33.
442
Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.25" + Indent at: 0.5"
443 444
Formatted: Space After: 0 pt, Line spacing: Double
18
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
Page 22 of 25
Table 1: Most common hazards reported for herbs and spices in the KAP and RASFF database. The
Formatted: Left: 0.98", Bottom: 0.79", Width: 8.27", Height: 11.69"
numbers in bracket indicate the number of incidents.
Hazard category:
Affected products:
Countries of origin:
Formatted Table
1. Mycotoxins (1422)
1. Paprika (398)
RASFF (2005-2014)
2. Pesticides (528)
2. Chili pepper
Formatted: List Paragraph, Indent: Left: 0.1", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.34" + Indent at: 0.59"
3. Pathogens (459) 4. Composition (399)
(330) 3. Curry leaves (279)
1. India (32%) 2. Thailand (12%)
Formatted: List Paragraph, Indent: Left: 0.12", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.3" + Indent at: 0.55"
3. Vietnam (5%) KAP (2005-2011)
Formatted: List Paragraph, Indent: Left: 0.15", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.38" + Indent at: 0.63"
1. India (23%) 2. Netherlands (11%) 3. Indonesia (8%)
Formatted: List Paragraph, Indent: Left: 0.15", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.39" + Indent at: 0.64"
19
ACS Paragon Plus Environment
Page 23 of 25
Journal of Agricultural and Food Chemistry
FIGURE 1: The AAPVL-concept for an automated computer-aided identification and evaluation of potentially non-compliant food products traded via ecommerce (A. Krewinkel unpublished data).
20
ACS Paragon Plus Environment
Journal of Agricultural and Food Chemistry
Page 24 of 25
FIGURE 2: Food Fraud Vulnerability Assessment following an Enterprise Risk Management (ERM) and PDCA approach (J. Fritsche unpublished data).
21
ACS Paragon Plus Environment
Page 25 of 25
Journal of Agricultural and Food Chemistry
FIGURE 3: Multi-source/multi-domain approach for the prevention of food fraud (J. Fritsche unpublished data).
22
ACS Paragon Plus Environment