Recent Developments and Digital Perspectives in Food Safety and

Publication Date (Web): June 19, 2018 ... fraud prevention measures trying to cope with the increasing complexity and globalization of the food supply...
1 downloads 0 Views 1MB Size
Subscriber access provided by UNIVERSITY OF THE SUNSHINE COAST

Perspective

Recent Developments and Digital Perspectives in Food Safety and Authenticity Jan Fritsche J. Agric. Food Chem., Just Accepted Manuscript • DOI: 10.1021/acs.jafc.8b00843 • Publication Date (Web): 19 Jun 2018 Downloaded from http://pubs.acs.org on June 25, 2018

Just Accepted “Just Accepted” manuscripts have been peer-reviewed and accepted for publication. They are posted online prior to technical editing, formatting for publication and author proofing. The American Chemical Society provides “Just Accepted” as a service to the research community to expedite the dissemination of scientific material as soon as possible after acceptance. “Just Accepted” manuscripts appear in full in PDF format accompanied by an HTML abstract. “Just Accepted” manuscripts have been fully peer reviewed, but should not be considered the official version of record. They are citable by the Digital Object Identifier (DOI®). “Just Accepted” is an optional service offered to authors. Therefore, the “Just Accepted” Web site may not include all articles that will be published in the journal. After a manuscript is technically edited and formatted, it will be removed from the “Just Accepted” Web site and published as an ASAP article. Note that technical editing may introduce minor changes to the manuscript text and/or graphics which could affect content, and all legal disclaimers and ethical guidelines that apply to the journal pertain. ACS cannot be held responsible for errors or consequences arising from the use of information contained in these “Just Accepted” manuscripts.

is published by the American Chemical Society. 1155 Sixteenth Street N.W., Washington, DC 20036 Published by American Chemical Society. Copyright © American Chemical Society. However, no copyright claim is made to original U.S. Government works, or works produced by employees of any Commonwealth realm Crown government in the course of their duties.

Page 1 of 25

Journal of Agricultural and Food Chemistry

The AAPVL-concept for an automated computer-aided identification and evaluation of potentially noncompliant food products traded via e-commerce (A. Krewinkel unpublished data). 152x149mm (150 x 150 DPI)

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

Food Fraud Vulnerability Assessment following an Enterprise Risk Management (ERM) and PDCA approach (J. Fritsche unpublished data). 254x190mm (96 x 96 DPI)

ACS Paragon Plus Environment

Page 2 of 25

Page 3 of 25

Journal of Agricultural and Food Chemistry

Multi-source/multi-domain approach for the prevention of food fraud (J. Fritsche unpublished data). 275x190mm (96 x 96 DPI)

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

1 2

Page 4 of 25

Recent Developments and Digital Perspectives in Food Safety and Authenticity

3 4

Jan Fritsche*

5 6

ABSTRACT (max. 100 words)

7

Food Safety is of fundamental importance for the food processing industry, the food retailers and

8

distributors, as well as for the competent authorities because of its potentially direct impact on

9

consumers’ health. Next to the prevention of microbiological, chemical, and physical hazards

10

increasing efforts are currently made to combat risks associated with food fraud or food authenticity.

11

Food Safety Management Systems nowadays comprise food safety, food defense, and food fraud

12

prevention measures trying to cope with the increasing complexity and globalization of the food

13

supply chains. Future digital opportunities include the prediction of food safety and food authenticity

14

issues by handling structured and unstructured data retrieved from various sources and origins in

15

order to ensure consumers’ health and to minimize economical losses.

16 17

KEYWORDS

18

Food authenticity, food fraud, food safety, food supply chain, prediction models, RASFF, big data,

19

EMA database, National Reference Center for the Authenticity and Integrity of the Food Chain, e-

20

foods, HACCP, IMSOC, industry 4.0, TRACES, Europhyt, Global Food Safety Initiative

21

Corresponding author:

22 23

Max Rubner-Institut, Federal Research Institute of Nutrition and Food, Department of Safety and Quality of Milk and Fish Products, Hermann-Weigmann-Str. 1, 24103 Kiel, Germany

24

Phone: +49-431-609-2250 Fax: +49-431-609-2300 E-mail: [email protected]

25 26 1

ACS Paragon Plus Environment

Page 5 of 25

27

Journal of Agricultural and Food Chemistry

Introduction

28 29

Food Safety

30

There is an urgent need to drive improvements in the efficiency and effectiveness of food chains. The

31

global population is expected to reach at least 9 billion by the year 2050, requiring up to 70% more

32

food, and demanding food production systems and the food chain to become fully sustainable. This

33

great challenge is complicated interfered by a number of overarching issues, including increasing

34

complexity of food supply chains, environmental constraintsstress, a growing aging population, and

35

changing patterns of consumer choice and food consumption. Within this context, food safety must

36

become an enabler of global food security and refers to food defense and food fraud issues including

37

food authenticity. The following perspective article focuses on recent developments of the latter.

38

Food safety management systems so far have generally focused on the unintentional contamination

39

of food by known ingredients, pathogens, mishandling, or processing. While the vast majority of

40

reported food fraud cases did not result in a threat to consumer health, some acts of food fraud,

41

such as adding adulterant substances, can become dangerous. Unfortunately, criminals usually lack

42

the motivation and/or expertise knowledge to determine whether or not their actions will result in

43

hygienic or chemical risks to consumers. Therefore, food fraud activities have the potential to cause

44

food safety issues.

45 46

Food Authenticity

47

Food authenticity, food adulteration, food crime, and food fraud are frequent terms used in public

48

domain. Food fraud encompasses a wide range of deliberate fraudulent acts, usually with intentional

49

and economic motivation including addition, dilution, tampering, or misrepresentation of food, food

50

ingredients, or food packaging; and includes false or misleading statements made about a product.

51

These clusters are similar to an analysis of the fraud notifications in the European Union Rapid Alert 2

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

Page 6 of 25

52

System for Food and Feed (RASFF) where false, improper, or missing labels/documents were the

53

most common type of food fraud and products of animal origin and dietary supplements were the

54

most frequently adulterated products [1]. However, missing labels/documents are not automatically

55

associated with food fraud. Food supply chain fraud can embrace the integrity of the food item, the

56

manufacturing processes used to produce that food item, and/or the people employed and the data

57

that accompanyingies the food item.

58

Relevant key players against food fraud actions are for example are the EU Food Fraud Network, the

59

UK Food Standards Agency (FSA-UK), the Global Food Safety Initiative (GFSI), the Safe Supply of

60

Affordable Food Everywhere (SSAFE), the US Pharmacopeia (USP), the US Food and Drug

61

Administration (FDA), and the Chinese National Center for Food Safety Risk Assessment (CFSA). The

62

Grocery Manufacturers Association in the USA estimated that global food fraud costs between $10

63

billion and $15 billion per year, affecting approximately 10% of all commercially sold food products

64

[2

65

losses, close off export markets, and damage trust in public institutions. According to Elliott [3]3,

66

increase of the complexity of supply chain networks, the rapid development of technology (internet,

67

printing, mobile phone etc.), and the rapid growth of warehouse systems and refrigerated transport

68

are the main drivers for an increase in food fraud opportunities.

69

Due to the impact on economies and consumer confidence, governments are holding competent

70

food authorities accountable for protecting against all food risks and vulnerabilities including food

71

safety and food authenticity or food fraud (regulation Regulation EU 2017/625).

.].

Formatted: Superscript

Formatted: Superscript

A single incident can permanently destroy a valuable brand, cause long-term industry-wide Formatted: Superscript

72 73

Regulatory Aactivities and cCompliance

74

In tThe European Union (EU),has defined the official food and feed controls for Member States (MS)

75

are defined in Regulation (EC) 882/2004, which ensures the effective implementation of Regulation

76

(EC) 178/2002. According to Regulation (EC) 882/2004, each Member State has to designs an annual

77

plan for their official controls within its territory. These plans should be planned and carried out with 3

ACS Paragon Plus Environment

Page 7 of 25

Journal of Agricultural and Food Chemistry

78

a “risk-based” approach at all stages of production, processing, and distribution. Controls at the

79

“point of entry” from third countries into the EU are included in Regulation (EC) 882/2004,; however,

80

additional controls are defined in Regulation (EC) 669/2009 including. According to Regulation (EC)

81

669/2009, the frequency of official controls for of a particular food (or feed) items from a specific

82

countriesy of origin is defined and is enforced in every each Member State.

83

The Official Controls Regulation (OCR; Regulation EU 625/2017) replaces the current regulation on

84

official controls (Regulation (EC) No 882/2004). It provides the framework for Member States (MS) to

85

verify that businesses comply with agri-food chain rules, encompassing all activities from farm to fork

86

including import controls and export certificates. The OCR replaces the current regulation on official

87

controls (Regulation (EC) No 882/2004 ). The agri-food chain encompasses all those activities that

88

range from farm to fork. AAgri-food chain rules therefore cover holistically the safety and quality of

89

food and feed (including fraud), as well as plant health, animal health and welfareincluding fraud.,

90

differentiate quality of food and feed, plant health, animal health and welfare. They also cover

91

import controls on goods entering the EU from third countries and export certificates.

92 93

Digitial iInformation mManagement Ssystems for Official Controls

94

At the European level, the European Commission may, by means of implementing acts, designate

95

European Union reference centrers that shall support the activities of the Commission and of the

96

Member States to prevent, detect, and combat violations of the rules referred to in Article 1(2)

97

perpetrated through fraudulent or deceptive practices (article 97 regulation Regulation EU

98

625/2017). In the light of the revision of the Regulation (EC) 882/2004, the German Federal Ministry

99

of Food and Agriculture (BMEL) in 2016 introduced in 2016 a dedicated National Reference Center

100

for the Authenticity and Integrity of the Food Chain under the leadership of the Max Rubner-

101

Institute, Federal Research Institute of Nutrition and Food (for more information about the MRI visit

102

MRI). The tasks of that National Reference Center will comprise the provision of (digital) information 4

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

103

on food fraud for the competent authorities in Germany, the development of accredited analytical

104

methods for the detection of food fraud, and the development of certified reference material and

105

authentic food samples.

106

IMSOC is the Information Management System for Official Control, so a new interconnected IT

107

system that needs to be implemented according the new Regulation 2017/625 about on official

108

controls and will include among others:

109

-

TRACES: European Commission's multilingual online management tool for all

110

sanitary and organic requirements on intra-EU trade and importation of animals,

111

semen and embryos, food, feed, and plants.

112

-

Europhyt: a notification and rapid alert system dealing with

113

Interceptionsinterceptions for plant health reasons of consignments of plants and

114

plant products imported into the EU or being traded within the EU itself.

115 116

-

Page 8 of 25

Formatted: Default Paragraph Font

RASFF: a key tool to ensure the flow of information, which enables a to enabling swift reaction, when risks to public health are detected in the food chain is RASFF.

117 118

In the EU, the Rapid Alert System for Food and Feed (RASFF) has been established as part of the

119

Regulation (EC) 178/2002 in order to support the control and safety of food and animal feed on the

120

European market. Under RASFF, members (EU-28 national competent authorities, the European

121

Commission, the European Food Safety Agency (EFSA), European Space Agency (ESA), Iceland,

122

Norway, Lichtenstein, and Switzerland) exchange information electronically, e.g. news, notifications,

123

and alerts, which are available through the RASFF portal. On this Iinternet portal interactive searches

124

can be performed in the RASFF database. The RASFF database includes both intentional food frauds,

125

for example fraudulent documents or adulteration cases, as well as unintentionally frauds, such as

126

improper, expired, or missing documents. From 2010 until to 2013 in a total of 749 notifications were

127

reported in the RASFF database under the hazard category “adulteration/fraud”, which comprises of 5

ACS Paragon Plus Environment

Page 9 of 25

Journal of Agricultural and Food Chemistry

128

6 different fraud classes: (i1) improper, fraudulent, missing, or absent health certificates, (ii2) illegal

129

importations, (iii3) tampering, (iv4) improper, expired, fraudulent, or missing common entry

130

documents (CED), (v5) expiration date, and (6vi) mislabeling.

131

Fraud notifications in RASFF have been analyszed in a few studies., The work from such as by Kleter

132

et al. 4 and co-workers coversfor the period 2003-2007 [4] and by Tähkäpää and co-workers for the

Formatted: Superscript

133

period 2008-2012 [1]. Within this periodIn the period From 2003 -to 2007, ina total of 248

Formatted: Superscript

134

notifications of fraud related issues were reported in RASFF, the majority pertained related to illegal

135

imports and lack of authorization of establishment and of transits. The predominante products were

136

meat (23%), seafood (19%), and followed by composite and mixed products (17%). Most frauds and

137

the products originated mainly from Asia (44% of the notifications) and EU (22% of the notifications).

138

An increase in tThe number of reports notifications increased was noticed after mid-2005 [4].

Formatted: Superscript

139

Comparable data were provided Similar results were observed by Tähkäpää et al.and co-workers1 [1]

Comment [NH1]: s.o.

140

for in during the following period (2008-2012). Fish and fish products and meat and meat products

141

were the most frequently reported product categories, with 16% and 11%, respectively. and Asia was

142

again by far (45%) the most common region of origin (45%). Although food fraud per se does not

143

result in a high number of notifications (2%) [1], it has the potential to become a real health risks tofor

144

humans and animals due to unpredictable risk management situations. and t Therefore, control and

145

food fraud mitigation strategies should need to be developed and applied including increased border

146

to increase the border efficiency of border in order and to allow a fast detection of food fraud and

147

management actions.

148

In the USA, the US Food Safety and Modernization Act (FSMA) was passed in January 2011 and in

149

2015 the FSMA Preventative Controls rule (FSMA-PC) was published, which included directions with

150

respect to Food Fraud and “Economically Motivated Adulteration” (EMA) in the final rule (FDA,

151

2009). It is notable thatnoteworthy that the RASFF database has a completely different fraud type

152

classification approach than compared to the EMA and USP databases., EMA which classifiesd 9 types

153

of food fraud, for example, substitution, dilution, artificial enhancement, dilution, counterfeit,

Formatted: Superscript

6

ACS Paragon Plus Environment

Formatted: Superscript

Journal of Agricultural and Food Chemistry

154

transshipment, counterfeit, and misbranding, whereas . In the USP database only 3 distinguishedd

155

food fraud classes are applied: addition, replacement, and removal.

Page 10 of 25

156 157

Food Fraud Assessment

158

Conventional and emerging The analytical techniques (both conventional and emerging) used to

159

identify food fraud involve sensory, physicochemical, DNA-based, chromatographic, and

160

spectroscopic methods. ,In addition, these methods and have been successfully combined with

161

chemometrics, making these techniques more convenient and effective for the analysis of a broad

162

variety of food products. Despite recent advances in the development of analytical methods, the

163

demand need remains for novel suitably sensitive and widely applicable and validated methodologies

164

that encompass all the various aspects of food adulteration is still existing.

165 166

Analytical Detection & Verification

167

For the analysis of food authenticity or the identification/verification of food fraud comprehensive

168

analytical methods are commonly applied. For that purpose targeted and non-targeted approaches

169

have been developed based on various analytical methods. , fFor example, Fourier-Transform

170

Infrared spectroscopy (FTIR) has already been already successfully implemented in food fraud

171

detection [5]. DNA sequencing techniques are also considered to be reliable, nevertheless, their

Formatted: Superscript

172

limitations have been discussed [6] and make them unsuitable to be employed as stand-alone tools in

Formatted: Superscript

173

the field of authentication. Furthermore, according to European legislation concerning the

174

performance of analytical methods [7], those approaches would be classified as screening methods

175

and as such they are not fit for the purpose of confirming adulteration to required legal standards.

176

This is due, due to a lack of chemical structure confirmation, if the legal action is to be pursued by

177

industry or regulators. High Resolution Mass Spectrometry (HRMS), Isotope-ratio mass spectrometry

Formatted: Superscript

7

ACS Paragon Plus Environment

Page 11 of 25

Journal of Agricultural and Food Chemistry

178

(IRMS), and Nuclear magnetic resonance (NMR) spectroscopy based fingerprinting approaches have

179

also been employed in food authentication., hHowever, even though such methods provide the

180

possibility of detecting unusual deviations within the sample set, instrumental analysis is time

181

consuming, requires expensive equipment, data storage facilities, and high processing power [8].

182

Available targeted mass spectrometry based methods designed for the purpose of confirming

183

adulteration confirmation usually employ food profiling approaches, whereby sample classification is

184

based on analyszing a selected group of matrix constituents, such as flavonoids in Ginkgo biloba or

185

ginsenosides in Panax Ginseng [9,; 10]. Such validated analytical methods ensure the accuracy of the

Formatted: Superscript

186

analytical determination [8], however, they are prone to ‘targeted designed adulteration’ [11] due to

Formatted: Superscript

187

increased knowledge regarding chemical composition of food commodities. Overall, designing an

188

analytical approach suitable for rapid, low-costcheap, and reliable detection and confirmation of

189

adulteration still presents a great challenge with respect to the experimental design (e.g. selectivity,

190

specificity, chosen (bio)markers, etc.).

Formatted: Superscript

Formatted: Superscript

191 192

Digital aApproaches to cCombat Food Fraud

193

A novel concept for the automated computer-aided identification and evaluation of potentially non-

194

compliant food products traded via electronic commerce was developed by Krewinkel et al. [12]. That

195

AAPVL prototype (AAPVL) was developed using applying a modular architecture consisting of

196

comprising a research tool, an image analysis tool, and a monitoring tool (see Figure 1). The research

197

tool utilizes both iInternet search engines and customized search algorithms. The data acquisition

198

module stores saves all matching data from webpages for later analysis and preservation

199

documentation of evidence. The image analysis tool performs logo recognition in order to

200

supplement enrich the text-based information of websites. The monitoring tool performs regular

201

automated monitoring of e-foodonline vendors, products, and ingredients. The proof of principle of

202

the prototype was achieved proven by conducting a web search for potentially hazardous food

203

products containing synephrine and caffeine. In total, 1242 product offerings on the internet for of 8

ACS Paragon Plus Environment

Formatted: Superscript

Journal of Agricultural and Food Chemistry

Page 12 of 25

204

suspicious food products were identified on the Internet among the 8683 qualified search results.

205

Thus, that this prototype has shown the potential to enhance strength consumer protection and food

206

safety with respect to online marketed e-foods [12].

Formatted: Superscript

207 208

Food Fraud Prevention: Risk Aassessment and rRisk mManagement

209

Next to the competent authorities around the world, food fraud prevention is also a hot topic for the

210

agri-food business. For that reason, quality management systems are currently adapted to include

211

food fraud vulnerability assessment tools. As is usual for quality management systems, food fraud

212

management systems are based on a continuous process typically following an Enterprise Risk

213

Management (ERM) and PDCA approach (see Figure 2). It Ttypically it starts with an evaluation to

214

characterize the food fraud vulnerabilities, which includes knowledge about used materials and

215

existing risks (e.g. geographical origins, history, economic factors, incident review, emerging issues),

216

active suppliers, supply chain (length, complexity, supply and demand arrangements), and existing

217

control measures. The Nnext step is the design and review of mitigation strategies and their

218

implementation. As soon as changes in the supply chain for an ingredient or a newly identified

219

adulterant for an ingredient are known, which may impact the previously identified vulnerabilities,

220

the entire process must be reassessed in order to ensure its continued effectiveness. For more

221

details on the Food Fraud iInitial Screening (FFIS) visit Spink et al. [13] and COSO literature [14]. It is

222

notable that GFSI compliance already requires a food fraud vulnerability assessment and mitigation

223

plan, which forces food companies into action. More recently, SSAFE, developed in cooperation with

224

PwC, Wageningen University, Vrije Universiteit Amsterdam, and in consultation with food industry

225

leaders around the world, developed a free-of-charge food fraud vulnerability assessment app, which

226

is supports the GFSI requirements (for more details visit: www.pwc.com/foodfraud).

Formatted: Superscript Formatted: Superscript

227 228

Prediction of Ffood sSafety iIncidents and fFood fFraud

9

ACS Paragon Plus Environment

Page 13 of 25

Journal of Agricultural and Food Chemistry

229

In order to prevent incidents from happening in the future, vVarious researchers and risk managers

230

have explored the possibilities to forecast food safety and food fraud incidents , including the timely

231

identification of trends and eventsby monitoring trends and events. that might eventually give rise to

232

food safety and food fraud incidents. Generally, various iInternational as well as and local

233

developments may directly or indirectly influence the performance of food-producing systems, for

234

example among them climate change, economy and trade shifts, but also human behaviourbehavior

235

(e.g. bio terrorism or sabotage), and new technologies [15‒18]. The ten key drivers to of food safety and

Formatted: Superscript

236

nutrition risks were recently identified recently in a scoping study on food safety and nutrition [19

Formatted: Superscript

237

]:were: 1i) global economy and trade, 2ii) global cooperation and standard setting, 3iii) governance,

238

4iv) demography and social cohesion, 5v) consumer attitudes and behaviour, 6vi) new food chain

239

technologies, 7vii) competition for key resources, 8viii) climate change, 9ix) emerging food chain risks

240

and disasters, and 10x) new agri-food chain structures.

241 242

A holistic approach taking stock of the forces that act upon the food chain (from farm to fork) and

243

their effect on food safety has been adopted by the FAO [20]. Such an approach has also been

Formatted: Superscript

244

proposed to address climate induced food safety risks [16,; 18,; 21]. The FAO20 has adopted Aa holistic

Formatted: Superscript

245

approach that includes a full host environment analysis of the whole entire food chain in which the

246

driving forces of food safety risks are identified and assessed determined, including associated data

247

sources from various origins. A similar approach has also been considered for climate induced food

248

safety risks.16,18,21

249 250

Application of the holistic approach in a working system to identify known and emerging food safety

251

risks needs a model that links all drivers and their dependencies. It also needs to connect , as well as

252

underlying databases from various sources and origins, and preferably allows scenario studies. A

253

suitable model should access data on the drivers, process these data, and perform calculations to

254

provide predictions on emerging food safety and food fraud risks, preferably in real-time, data on the

255

drivers, process these data, and perform calculations in order to provide predictions on (emerging)

256

food safety and food fraud risks. Up to nowTo date, no modelling approach or system has been

Formatted: Not Highlight

10

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

Page 14 of 25

257

developed for the food production chain that is able to combine take into account underlying

258

databases, interactions, and feed-back loops of the drivers, as required as encountefor red in a

259

holistic approach. One promising approach, however, is utilizing a Bayesian Network (BN) approach.

260

Novel food fraud predication approaches should consist of multi-source/multi-domain strategies

261

combining relevant information from the food business information domain, the competent

262

authorities information domain, as well as the public domain (see Figure 3). That kind of big data

263

approach will most likely be able to provide the largest data pool for food fraud prediction models.

264

Data access rights/data ownership as well as streamlining data plausibility will be the biggest legal

265

challenge for a successful food safety risk management. Ultimately, global information contracts

266

between all involved stakeholders involved, agri-food business, competent authorities, and the

267

public domain alike, are foreseen as a long term requirement for food fraud predictions.

268 269

Bayesian nNetwork

270

BNs are a class of probabilistic models originating from Bayesian statistics and decision theory in

271

addition to graph theory [22,; 23]. The structure of a BN consists ofcontains nodes (i.e., random

272

variables) connected by directed arcs reflecting a dependence structure between the nodes. BNs are

273

applied in many applicationsfields, such as hazard and risk assessment [24,; 25], fraud detection [26,; 27],

274

accident prevention [28], and food fraud prediction [29,; 30]., nanomaterials [31,; 32], and medical image

275

analysis [33]. BNs have the ability to integrate different data sources and types, such as expert

276

knowledge, measurement data, and feedback experience

[341

Formatted: Superscript

Formatted: Superscript Formatted: Superscript Formatted: Superscript Formatted: Superscript Formatted: Superscript Formatted: Superscript

] using Bayes theorem.

Formatted: Superscript

277

Formatted: Superscript, Highlight Formatted: Highlight

278

Case Sstudy hHerbs & sSpices

279

Recently, Bouzembrak et al. [3533] developed a BN model in order to predict the presence of food

280

safety hazards in herbs and spices to guide risk-based monitoring (prediction accuracy of 85%). This

281

suggested approach consisted of a 3-step-process: 1(i) data collection on the main factors (hazards,

Formatted: Space After: 0 pt, Don't adjust space between Latin and Asian text, Don't adjust space between Asian text and numbers Formatted: Not Highlight Formatted: Superscript

11

ACS Paragon Plus Environment

Page 15 of 25

Journal of Agricultural and Food Chemistry

282

product, country of origin) from using different data sources among which including KAP (Dutch

283

national monitoring program for chemical contaminations in food and feed) and the RASFF database

284

, the Dutch national monitoring program for chemical contaminations in food and feed (KAP),

285

Eurostat, the EU pesticide database and legislation; 2(ii) construct a BN model including nodes,

286

arrows, states, and the parameters for each node in the form of conditional probability tables (CPTs);

287

and 3(iii) validate the model using an independent dataset.

288

A summary of the most common hazards, products, countries of origin reported for herbs and spices

289

is shown in Table 1.

290 291

Table 1: Most common hazards reported for herbs and spices in the KAP and RASFF database. The

292

numbers in bracket indicate the number of incidents.

Hazard category:

Affected products:

Countries of origin:

1. Mycotoxins (1422)

1. Paprika (398)

RASFF (2005-2014)

2. Pesticides (528)

2. Chili pepper (330)

3. Pathogens (459)

3. Curry leaves (279)

4. Composition (399)

1. India (32%) 2. Thailand (12%) 3. Vietnam (5%) KAP (2005-2011) 1. India (23%) 2. Netherlands (11%) 3. Indonesia (8%)

293 294

Overall, the most common hazards recorded for herbs and spices in RASFF (2005-2014) and KAP

295

(2005-2011) were mycotoxins (1422), pesticides (528), pathogens (459), and composition (399) and

296

on product basis paprika (398), chili pepper (330), and curry leaves (279). Considering the countries

297

of origin, the most frequently reported origin in RASFF and KAP was India (32%), followed by Thailand

298

(12%) and Vietnam (5%), while in KAP India (23%) was first, followed by the Netherlands (11%) and

299

Indonesia (8%). It is noticeable that a lack of consistency in the terminology used in the used data

300

sources occurred. On the other hand, the The BN model could help to target sampling and analyses 12

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

Page 16 of 25

301

of products based on hazard prediction e.g. decide if investigations should be focused at market level

302

or border inspectioncan also be applied to identify the products, hazards, and countries of origin to

303

be sampled at the market level (. As reported by Bouzembrak et al. [35],). the monitoring plan

304

depends on the point in the supply chain, at which the product is sampled. For instance, at a border

305

inspection, the inspection should focus on curry, curry leaves, and chili pepper imported from India,

306

whereas at the market level, the inspection should focus more on paprika, chili pepper, and nutmeg

307

imported from India and Thailand.

Formatted: Superscript

308 309

Conclusion & Expectations

310

Over the last decade the focus of food safety developments around the world shifted from the

311

traditional food safety HACCP principle to food defense (after 09/11 in the USA) and most recently to

312

food fraud prevention. The latter is heavily pushed forward on in the global agenda of food safety

313

due to substantial regulatory acitivities in the USA, China, and Europe, but also due to the

314

engagement of the global agri -food business in order to prevent food fraud. Joint efforts making use

315

of the food business information domains and the competent authorities’ information domains at

316

the global level could contribute to minimize economical losses and to improve consumers’

317

confidence in food safety and quality (Figure 3). Closer international cooperations between national

318

authorities at the strategic and operational level as well as improved and enlarged IT-based data

319

exchange systems along the entire agri -food chain would contribute to that goal. Cooperations are

320

considered as prerequisites in order to evolve food safety in the 21st century.

321

Digital challenges will be the development of novel and reliable food fraud predication approaches

322

applying e.g. artificial neural networks and/or probabilitisticprobabilistic models, such as a Bayesian

323

nNetwork, enabling adequate and timely ressource allocations within the food control community as

324

well as within the agri -food business. Ultimatively, big data solutions will also require significant

325

changes in the education and qualification of future employees of competent authorities and the

326

agri -food business alike. being part of an industry 4.0 environment. 13

ACS Paragon Plus Environment

Page 17 of 25

Journal of Agricultural and Food Chemistry

327 328

Acknowledgement

329

The author would like to thank Prof. Martin Holle (Hamburg University of Applied Sciences, Germany)

330

for fruitfull discussions on legal aspects.

331 332 333 334 335 336

References

337

1. Tähkäpää, S.; Maijala, R.; Korkeala, H.; Nevas, M. Patterns of food frauds and adulterations

338

reported in the EU rapid alert system for food and feed and in Finland. Food Control 2015,

339

47, 175‒184.

340 341 342

Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double

2. Manning, L.; Soon, J. M. Food Safety, Food Fraud, and Food Defense: A Fast Evolving Literature. J. Food Sci. 2016, 81, R823–R834. 3. Elliott, C. Elliott Review into the Integrity and Assurance of Food Supply Networks – Final

343

Report: A National Food Crime Prevention Framework; HM Government: London, UK, 2014.

344

https://www.gov.uk/government/publications/elliott-review-into-the-integrity-and-

345

assurance-of-food-supply-networks-final-report (January 5, 2018).

346

4. Kleter, G. A.; Prandini, A.; Filippi, L.; Marvin, H. J. Identification of potentially emerging food

347

safety issues by analysis of reports published by the European Community's Rapid Alert

348

System for Food and Feed (RASFF) during a four-year period. Food Chem. Toxicol. 2009, 47,

349

932‒950.

350

5. Ellis, D. I.; Muhamadali, H.; Haughey, S. A.; Elliott, C. T.; Goodacre, R. Point-and-shoot: rapid

351

quantitative detection methods for on-site food fraud analysis – moving out of the laboratory

352

and into the food supply chain. Anal. Methods 2015, 7, 9401‒9414.

14

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

353

6. Parveen, I.; Gafner, S.; Techen, N.; Murch, S. J.; Khan, I. A. DNA Barcoding for the

354

Identification of Botanicals in Herbal Medicine and Dietary Supplements: Strengths and

355

Limitations. Planta Med. 2016, 82, 1225‒1235.

356

Page 18 of 25

7. 2002/657/EC: Commission Decision of 12 August 2002 implementing Council Directive

357

96/23/EC concerning the performance of analytical methods and the interpretation of results

358

(Text with EEA relevance) (notified under document number C(2002) 3044); Official Journal

359

of the European Communities L 221/8, 2002; p. 18.

360 361 362 363 364

8. Esslinger, S.; Riedl, J.; Fauhl-Hassek, C. Potential and limitations of non-targeted fingerprinting for authentication of food in official control. Food Res. Int. 2014, 60, 189‒204. 9. Xie, B. D.; Wang, H. T. Effects of light spectrum and photoperiod on contents of flavonoid and terpene in leaves of Ginkgo biloba L. J. Nanjing Forestry Uni. 2006, 30, 51‒54. 10. Yuan, J.; Chen, Y.; Liang, J.; Wang, C. Z.; Liu, X.; Yan, Z.; Tang, Y.; Li, J.; Yuan, C. S. Component

365

analysis and target cell-based neuroactivity screening of Panax ginseng by ultra-performance

366

liquid chromatography coupled with quadrupole-time-of-flight mass spectrometry. J.

367

Chromatogr. B Analyt. Technol. Biomed. Life Sci. 2016, 1038, 1‒11.

368 369 370

11. Sanzini, E.; Badea, M.; Dos Santos, A.; Restani, P.; Sievers, H. Quality control of plant food supplements. Food Funct. 2011, 2, 740–746. 12. Krewinkel, A.; Sünkler, S.; Lewandowski, D.; Finck, N.; Tolg, B.; Kroh, L. W.; Schreiber, G. A.;

371

Fritsche, J. Concept for automated computer-aided identification and evaluation of

372

potentially non-compliant food products traded via electronic commerce. Food Control 2016,

373

61, 204‒212.

374 375 376 377

13. Spink, J.; Moyer, D. C.; Speier-Pero, C. Introducing the Food Fraud Initial Screening model (FFIS). Food Control 2016, 69, 306‒314. 14. COSO (Committee of Sponsoring Organizations of the Treadway Commission). Welcome to COSO. https://www.coso.org (January 6, 2018).

Field Code Changed Formatted: No underline, Font color: Auto Formatted: No underline, Font color: Auto

15

ACS Paragon Plus Environment

Page 19 of 25

Journal of Agricultural and Food Chemistry

378

15. Boland, M. J.; Rae, A. N.; Vereijken, J. M.; Meuwissen, M. P. M.; Fischer, A. R. H.; van Boekel,

379

M. A. J. S.; Rutherfurd, S. M.; Gruppen, H.; Moughan, P. J.; Hendriks, W. H. The future supply

380

of animal-derived protein for human consumption. Trends Food Sci. Technol. 2013, 29, 62–

381

73.

382

16. GO-Science (The Government Office for Science). Foresight. The Future of Food and Farming

383

‒ Challenges and choices for global sustainability. Final Project Report; GO-Science: London,

384

UK, 2011. https://www.gov.uk/government/publications/future-of-food-and-farming

385

(January 6, 2018).

Formatted: No underline, Font color: Auto Formatted: No underline, Font color: Auto Field Code Changed

386

17. Godfray, H. C. J.; Beddington, J. R.; Crute, I. R.; Haddad, L.; Lawrence, D.; Muir, J. F.; Pretty, J.;

387

Robinson, S.; Thomas, S. M.; Toulmin, C. Food Security: The Challenge of Feeding 9 Billion

388

People. Science 2010, 327, 812‒818.

389

18. Miraglia, M.; Marvin, H. J.; Kleter, G. A.; Battilani, P.; Brera, C.; Coni, E.; Cubadda, F.; Croci, L.;

390

De Santis, B.; Dekkers, S.; Filippi, L.; Hutjes, R. W.; Noordam, M. Y.; Pisante, M.; Piva, G.;

391

Prandini, A.; Toti, L.; van den Born, G. J.; Vespermann, A. Climate change and food safety: an

392

emerging issue with special focus on Europe. Food Chem. Toxicol. 2009, 47, 1009‒-1021.

Formatted: Font: Italic Formatted: Font: Bold

393

19. FCEC (Food Chain Evaluation Consortium). Scoping study: Delivering on EU food safety and

394

nutrition in 2050 - Scenarios of future change and policy responses. Final Report; European

395

Commission: Brussels, Belgium, 2013.

396

https://ec.europa.eu/food/sites/food/files/safety/docs/final_report_scoping_study_en.pdf

397

(January 6, 2018).

398

Formatted: Font: Italic

20. FAO (Food and Agriculture Organization of the United Nations). Assuring Food Safety and

399

Quality: Guidelines for Strengthening National Food Control Systems; FAO Food and Nutrition

400

Papers (Book 76); FAO, WHO (World Health Organization): Rome, Italy, 2003.

401

http://www.fao.org/docrep/006/y8705e/y8705e00.htm (January 6, 2018).

Formatted: No underline, Font color: Auto Formatted: No underline, Font color: Auto

402 403

21. Marvin, H. J.; Kleter, G. A.; Prandini, A.; Dekkers, S.; Bolton, D. J. Early identification systems for emerging foodborne hazards. Food Chem. Toxicol. 2009, 47, 915‒926. 16

ACS Paragon Plus Environment

Field Code Changed

Journal of Agricultural and Food Chemistry

404 405 406 407 408 409 410 411 412 413

Page 20 of 25

22. Nielsen, T. D.; Jensen, F. V. Bayesian Networks and Decision Graphs, 2nd edition; Jordan, M., Kleinberg, J., Schölkopf, B., Eds.; Springer: New York, NY, 2007. 23. Bonafede, C. E.; Giudici, P. Bayesian Networks for enterprise risk assessment. Physica A 2007, 382, 22‒28. 24. Billoir, E.; Delignette-Muller, M. L.; Péry, A. R.; Charles, S. A Bayesian approach to analyzing ecotoxicological data. Environ. Sci. Technol. 2008, 42, 8978‒8984. 25. Iorio, F.; Tagliaferri, R.; di Bernardo, D. Identifying Network of Drug Mode of Action by Gene Expression Profiling. J. Comput. Biol. 2009, 16, 241‒251. 26. Kirkos, E.; Spathis, C.; Manolopoulos, Y. Data Mining techniques for the detection of fraudulent financial statements. Expert Syst. Appl. 2007, 32, 995–1003.

414

27. Ngai, E. W. T.; Hu, Y.; Wong, Y. H.; Chen, Y.; Sun, X. The application of data mining techniques

415

in financial fraud detection: A classification framework and an academic review of literature.

416

Decis. Support Syst. 2011, 50, 559‒569.

417

28. Mohammadfam, I.; Ghasemi, F.; Kalatpour, O.; Moghimbeigi, A. Constructing a Bayesian

418

network model for improving safety behavior of employees at workplaces. Appl. Ergon. 2017,

419

58, 35‒47.

420

29. Bouzembrak, Y.; Marvin, H. J. P. Prediction of food fraud type using data from Rapid Alert

421

System for Food and Feed (RASFF) and Bayesian network modelling. Food Control 2016, 61,

422

180‒187.

423

30. Marvin, H. J. P.; Bouzembrak, Y.; Janssen, E. M.; van der Fels- Klerx, H. J.; van Asselt, E. D.;

424

Kleter, G. A. A holistic approach to food safety risks: Food fraud as an example. Food Res. Int.

425

2016, 89, 463‒470.

426

31. Marvin, H. J.; Bouzembrak, Y.; Janssen, E. M.; van der Zande, M.; Murphy, F.; Sheehan, B.;

427

Mullins, M.; Bouwmeester, H. Application of Bayesian networks for hazard ranking of

428

nanomaterials to support human health risk assessment. Nanotoxicology 2017, 11, 123‒133.

Formatted: Highlight

17

ACS Paragon Plus Environment

Page 21 of 25

429

Journal of Agricultural and Food Chemistry

32. Murphy, F.; Sheehan, B.; Mullins, M.; Bouwmeester, H.; Marvin, H. J. P.; Bouzembrak, Y.;

430

Costa, A. L.; Das, R.; Stone, V.; Tofail, S. A. M. A Tractable Method for Measuring

431

Nanomaterial Risk Using Bayesian Networks. Nanoscale Res. Lett. 2016, 11, 503.

432

33.31.

Arias, J.; Martínez-Gómez, J.; Gámez, J. A.; Seco de Herrera, A. G.; Müller, H. Medical

433

image modality classification using discrete Bayesian networks. Comput. Vis. Image Und.

434

2016, 151, 61‒71.

435

34. Buriticá, J. A.; Tesfamariam, S. Consequence-based framework for electric power providers

Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double

using Bayesian belief network. Int. J. Elec. Power 2015, 64, 233‒241.

436 437

32.

Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double

438

35. Bouzembrak, Y.; Camenzuli, L.; Janssen, E.; van der Fels-Klerx, H. J. Application of Bayesian

Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double

439

Networks in the development of herbs and spices sampling monitoring system. Food Control

440

2018, 83, 38‒44.

441

33.

442

Formatted: Indent: Left: 0.25", Hanging: 0.25", Space After: 0 pt, Line spacing: Double, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.25" + Indent at: 0.5"

443 444

Formatted: Space After: 0 pt, Line spacing: Double

18

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

Page 22 of 25

Table 1: Most common hazards reported for herbs and spices in the KAP and RASFF database. The

Formatted: Left: 0.98", Bottom: 0.79", Width: 8.27", Height: 11.69"

numbers in bracket indicate the number of incidents.

Hazard category:

Affected products:

Countries of origin:

Formatted Table

1. Mycotoxins (1422)

1. Paprika (398)

RASFF (2005-2014)

2. Pesticides (528)

2. Chili pepper

Formatted: List Paragraph, Indent: Left: 0.1", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.34" + Indent at: 0.59"

3. Pathogens (459) 4. Composition (399)

(330) 3. Curry leaves (279)

1. India (32%) 2. Thailand (12%)

Formatted: List Paragraph, Indent: Left: 0.12", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.3" + Indent at: 0.55"

3. Vietnam (5%) KAP (2005-2011)

Formatted: List Paragraph, Indent: Left: 0.15", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.38" + Indent at: 0.63"

1. India (23%) 2. Netherlands (11%) 3. Indonesia (8%)

Formatted: List Paragraph, Indent: Left: 0.15", Hanging: 0.2", Space After: 0 pt, Add space between paragraphs of the same style, Numbered + Level: 1 + Numbering Style: 1, 2, 3, … + Start at: 1 + Alignment: Left + Aligned at: 0.39" + Indent at: 0.64"

19

ACS Paragon Plus Environment

Page 23 of 25

Journal of Agricultural and Food Chemistry

FIGURE 1: The AAPVL-concept for an automated computer-aided identification and evaluation of potentially non-compliant food products traded via ecommerce (A. Krewinkel unpublished data).

20

ACS Paragon Plus Environment

Journal of Agricultural and Food Chemistry

Page 24 of 25

FIGURE 2: Food Fraud Vulnerability Assessment following an Enterprise Risk Management (ERM) and PDCA approach (J. Fritsche unpublished data).

21

ACS Paragon Plus Environment

Page 25 of 25

Journal of Agricultural and Food Chemistry

FIGURE 3: Multi-source/multi-domain approach for the prevention of food fraud (J. Fritsche unpublished data).

22

ACS Paragon Plus Environment