4 research outputs found

    Regulated Information Sharing and Pattern Recognition for Smart Cities

    Get PDF

    Food Fraud Vulnerability assessment: reliable data sources and effective assessment approaches

    Get PDF
    Abstract Multiple food fraud vulnerability assessment (FFVA) tools have been developed and refined to capture and quantify food fraud issues in the supply chain. The aim of this research is to review existing FFVA tools and the databases that underpin them and consider the challenges, limitations and opportunities in their use. The databases considered include: the Rapid Alert for Food and Feed Safety (RASFF) database, the Food Fraud Risk Information, Decernis Food Fraud Database, FoodSHIELD, and HorizonScan. Four FFVA tools, Safe Supply of Affordable Food Everywhere (SSAFE), the two Food Fraud Advisor’s vulnerability assessment tools and EMAlert, are also critiqued in this paper from the viewpoint of the tools available and their efficacy for food fraud vulnerability assessment

    Food Fraud Vulnerability assessment: reliable data sources and effective assessment approaches

    Get PDF
    Background: Multiple food fraud vulnerability assessment (FFVA) tools have been developed and refined to capture and quantify food fraud issues in the supply chain. Scope and approach: The aim of this research is to review existing FFVA tools and the databases that underpin them and consider the challenges, limitations and opportunities in their use. The databases considered include: the Rapid Alert for Food and Feed Safety (RASFF) database, the Food Fraud Risk Information, Decernis Food Fraud Database, FoodSHIELD, and HorizonScan. Four FFVA tools, Safe Supply of Affordable Food Everywhere (SSAFE), the two Food Fraud Advisor’s vulnerability assessment tools and EMAlert, are also critiqued in this paper from the viewpoint of the tools available and their efficacy for food fraud vulnerability assessment. Key findings and conclusion: There is a clear requirement for more industry level cohesiveness and consistency in how FFVA is undertaken to address both intrinsic and extrinsic food fraud vulnerability. FFVA tools differ from conventional purely food safety hazard analysis or risk assessment tools as FFVA also requires consideration of socio-economic factors, knowledge levels of organization, and understanding of criminal behavior. The challenge therefore is to develop FFVA tools further so that they support assessment of existing vulnerabilities and overcome knowledge gaps to then assist food supply chain professionals in understanding where and how fraud might occur, and the situational vulnerabilities for a given organisation or food supply chain so this intelligence will effectively inform the appropriate options for food fraud control and mitigation

    Representing, Reasoning and Predicting Fraud using Fraud Plans

    No full text
    The efforts of fraudsters to think up new ways of committing fraud, and of law enforcers to detect and prosecute those fraud, often feel like a long-running competition. Yet all too often, law enforcement is accused of falling far behind the fraudsters, especially in situations where the responsibility for detecting frauds falls on non-specialists in security or on the general public.  This paper presents a format to help understand how frauds work. The paper has three key messages: firstly, that every type of fraud plan can be represented as a specialisation of a generic fraud plan; secondly, that every type of fraud has ‘red flags’ that ought to make potential victims suspicious enough to check whether a particular transaction might be fraudulent; and thirdly, that these ‘red flags’ can be linked to the fraud plans because they arise as a natural consequence of the steps in the fraud plan.  Several different types of fraud are described and generic fraud plans, specialised fraud plans and ‘red flags’ are presented. The paper concludes by showing how a particular fraud plan could have been used to predict a new fraud that arose in 2010, and speculates on future frauds that various fraud plans might predict
    corecore