diff --git a/Citavi 5 XML.js b/Citavi 5 XML.js index a164018440..9eaafd425a 100644 --- a/Citavi 5 XML.js +++ b/Citavi 5 XML.js @@ -1,7 +1,7 @@ { "translatorID": "e7243cef-a709-4a46-ba46-1b1318051bec", "label": "Citavi 5 XML", - "creator": "Philipp Zumstein, Tomasz Najdek", + "creator": "Philipp Zumstein, Tomasz Najdek, Jacob Klink", "target": "xml", "minVersion": "3.0", "maxVersion": "", @@ -12,7 +12,7 @@ }, "inRepository": true, "translatorType": 1, - "lastUpdated": "2022-08-18 11:23:00" + "lastUpdated": "2024-10-10 12:32:47" } /* @@ -45,6 +45,7 @@ TEST DATA can be found here: - Larger project (1221 KB): https://gist.github.com/zuphilip/76ce89ebbdac0386507b36cff3fd499a - Other project (1,11 MB): https://gist.github.com/anonymous/10fc363b6d79dae897e296a4327aa707 - Citavi 6 project (935 KB): https://gist.github.com/zuphilip/00a4ec6df58ac24b68366e32531bae4b + - Citavi 6 project with BibTex-Keys (948 KB): https://gist.github.com/JAC28/49e23958f3ae13118f97225a9d405284 - Nested categories: (34 KB): https://gist.github.com/tnajdek/b2375e52b48c7bf82f9f592b4f2122f5 */ @@ -125,6 +126,9 @@ async function importItems({ references, doc, citaviVersion, rememberTags, itemI addExtraLine(item, "PMID", ZU.xpathText(references[i], './PubMedID')); + // Workaround to match Better BibTex Plugin (https://retorque.re/zotero-better-bibtex/citing/) + addExtraLine(item, "Citation Key", ZU.xpathText(references[i], './BibTeXKey')); + item.pages = extractPages(ZU.xpathText(references[i], './PageRange')); item.numPages = extractPages(ZU.xpathText(references[i], './PageCount')); @@ -513,3 +517,7505 @@ function extractPages(multilineText) { } return ''; } + +/** BEGIN TEST CASES **/ +var testCases = [ + { + "type": "import", + "input": "\n\n \n \n \n \n \n \n Auto\n Scholarly sources\n e3964141-fa83-4d92-82c6-0453310b3c2f\n Single\n Groups\n False\n \n \n Auto\n Popular sources\n 57bc5c84-2b57-47b1-9b2e-c908a3b63069\n Single\n Groups\n False\n \n \n Auto\n Gray literature\n bc1857c0-304b-402f-a245-0f13d36455e9\n Single\n Groups\n False\n \n \n Auto\n Legal sources\n 85dfca94-4bd0-4fa9-990d-dc7d0db21b4d\n Single\n Groups\n False\n \n \n Auto\n Background info - not for citation!\n 16ae8ae8-1941-49df-8426-267e4b6b7ce4\n Single\n Groups\n True\n \n \n My bibliography grouping\n \n Bottom\n False\n \n \n \n \n \n Online Sources\n Manual\n \"Online address\": * OR \"DOI\": *\n Single\n SavedSearches\n \n false\n false\n true\n \"Online address\": * OR \"DOI\": *\n \"Online address\": * OR \"DOI\": *\n \n False\n \n \n Printed and online sources\n \n Printed Sources\n Top\n False\n \n \n \n \n \n \n Text\n \n None\n CustomField1\n \n \n Text\n \n None\n CustomField2\n \n \n Text\n \n None\n CustomField3\n \n \n Text\n \n None\n CustomField4\n \n \n Text\n \n None\n CustomField5\n \n \n Text\n \n None\n CustomField6\n \n \n Text\n \n None\n CustomField7\n \n \n Text\n \n None\n CustomField8\n \n \n Text\n \n None\n CustomField9\n \n \n \n true\n 10.10.2024 11:07:14\n \n \n false\n false\n true\n \"Online address\": * OR \"DOI\": *\n \"Online address\": * OR \"DOI\": *\n \n \n \n \n fa3ef021-f5ae-4529-9ac4-d5b0bbf05906\n b213355e-df97-4b43-9e69-8a185817ce57\n true\n \n \n AuthorsOrEditorsOrOrganizations\n Ascending\n \n \n YearResolved\n Ascending\n \n \n Title\n Ascending\n \n \n Volume\n Ascending\n \n \n Number\n Ascending\n \n \n \n \n AuthorsOrEditorsOrOrganizations\n Ascending\n \n \n YearResolved\n Ascending\n \n \n Title\n Ascending\n \n \n Volume\n Ascending\n \n \n Number\n Ascending\n \n \n \n \n \n _Jane Doe\n 2017-05-22T14:49:08\n _Jane Doe\n 2017-05-22T14:49:08\n Introduction\n [\"ab2b0374-5038-49d1-92d8-72db6c13c981\"]\n \n \n _Jane Doe\n 2017-05-23T08:15:46\n _Jane Doe\n 2017-05-23T08:15:46\n Definitions and background\n [\"97a37477-c3e0-4f5a-8d28-931af375ac32\"]\n \n \n _Jane Doe\n 2017-05-29T16:19:21\n _Jane Doe\n 2017-05-29T16:19:21\n Definitions\n [\"616baeb5-fc07-4650-a893-808577bd04d0\"]\n \n \n _Jane Doe\n 2017-05-29T16:19:48\n _Jane Doe\n 2017-05-29T16:19:48\n Emerging study of food fraud\n [\"fed63096-6f13-468a-bb08-bf1568fe5b26\"]\n \n \n _Jane Doe\n 2017-05-23T11:45:37\n _Jane Doe\n 2017-05-23T11:45:37\n Cases of food fraud\n [\"8330fd24-5438-4269-b769-6ca54e71d9fe\"]\n \n \n _Jane Doe\n 2017-05-23T11:45:45\n _Jane Doe\n 2017-05-23T11:45:45\n Food fraud in history\n [\"e292f0d0-ca54-4db9-81b8-36c9c1830e2e\"]\n \n \n _Jane Doe\n 2017-05-29T08:01:37\n _Jane Doe\n 2017-05-29T08:01:37\n Foods most susceptible to fraud\n [\"acb05fe1-e509-4def-aa3c-6763a81fde48\"]\n \n \n _Jane Doe\n 2017-05-23T10:35:01\n _Jane Doe\n 2017-05-23T10:35:01\n Recent cases\n [\"bd77bddc-811e-47ea-9d8c-fe7a24c0a1a3\"]\n \n \n _Jane Doe\n 2017-05-29T14:30:35\n _Jane Doe\n 2017-05-29T14:30:35\n Causes of food fraud\n [\"cbc17a1b-e998-480b-81db-ee1c5511d60d\"]\n \n \n _Jane Doe\n 2017-05-29T16:21:29\n _Jane Doe\n 2017-05-29T16:21:29\n Countermeasures\n [\"8c92169d-11fe-4566-a139-93a21369046e\"]\n \n \n _Jane Doe\n 2017-05-29T07:59:16\n _Jane Doe\n 2017-05-29T07:59:16\n Developing World\n [\"9db1e1ef-883b-402b-b359-03b8b435de38\"]\n \n \n _Jane Doe\n 2017-05-29T07:59:25\n _Jane Doe\n 2017-05-29T07:59:25\n Developed World\n [\"04fabbac-8057-428e-8461-107297187542\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:49\n _Jane Doe\n 2017-05-29T08:03:49\n China\n [\"fda524f0-df9c-47f0-9462-5ccfe59b7178\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:17\n _Jane Doe\n 2017-05-29T08:03:17\n Europe\n [\"4b7e3844-06d9-4ec9-a1fc-c9bd4cab37c1\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:23\n _Jane Doe\n 2017-05-29T08:03:23\n United States\n [\"0a83c4d9-f62a-4ffb-8fbb-b4a4eadcb68e\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:54\n _Jane Doe\n 2017-05-29T08:03:54\n India\n [\"86ea4611-c8b5-4634-a57b-92a7f37dac81\"]\n \n \n _Jane Doe\n 2017-05-29T08:04:54\n _Jane Doe\n 2017-05-29T08:04:54\n United Kingdom\n [\"d651fa1a-a4ee-4fbc-b8ea-136487327ce5\"]\n \n \n _Jane Doe\n 2017-05-29T08:06:44\n _Jane Doe\n 2017-05-29T08:06:44\n Asia\n [\"c888bd70-641b-49fd-a3dc-3f35a709c9d0\"]\n \n \n _Jane Doe\n 2017-05-29T08:34:53\n _Jane Doe\n 2017-05-29T08:34:53\n Australia and New Zealand\n [\"d071a807-f42c-43ae-9e5e-4925f7d911fc\"]\n \n \n _Jane Doe\n 2017-05-23T11:51:43\n _Jane Doe\n 2017-05-23T11:51:43\n International measures\n [\"25a2fda9-f4b9-415c-9dde-605993432e90\"]\n \n \n _Jane Doe\n 2017-05-23T11:51:54\n _Jane Doe\n 2017-05-23T11:51:54\n National and regional measures\n [\"2680063b-5f91-438d-8534-e254a0ae2f6b\"]\n \n \n _Jane Doe\n 2017-05-23T11:52:07\n _Jane Doe\n 2017-05-23T11:52:07\n Industry measures\n [\"dcf798eb-58ff-4ac6-86b8-4ae7b4a9bbe5\"]\n \n \n _Jane Doe\n 2017-05-23T13:26:47\n _Jane Doe\n 2017-05-23T13:26:47\n Thin layer chromatography (TLC)\n [\"23b9f08b-9607-4255-bce4-8459f1359b0e\"]\n \n \n _Jane Doe\n 2017-05-23T13:27:02\n _Jane Doe\n 2017-05-23T13:27:02\n High-performance liquid chromatography (HPLC)\n [\"1fc372cc-4824-491a-8cc5-66878eae204f\"]\n \n \n _Jane Doe\n 2017-05-23T13:27:27\n _Jane Doe\n 2017-05-23T13:27:27\n Gas chromatography (GC)\n [\"82d927da-bb5b-425a-ba8b-1dca403680b9\"]\n \n \n _Jane Doe\n 2017-05-23T13:28:13\n _Jane Doe\n 2017-05-23T13:28:13\n Infared techniques\n [\"935d50a7-7543-4c63-9113-4f571afa22e4\"]\n \n \n _Jane Doe\n 2017-05-23T13:28:47\n _Jane Doe\n 2017-05-23T13:28:47\n Nuclear magnetic resonance (NMR)\n [\"9958eaff-f5a4-4389-bd49-cf42215796e2\"]\n \n \n _Jane Doe\n 2017-05-23T11:55:39\n _Jane Doe\n 2017-05-23T11:55:39\n DNA methods\n [\"950edbd4-7eba-4611-bbd7-43b7c8d1a228\"]\n \n \n _Jane Doe\n 2017-05-23T13:16:39\n _Jane Doe\n 2017-05-23T13:16:39\n Sensory methods\n [\"9d2d84f2-15af-4e07-a368-67e05698d57c\"]\n \n \n _Jane Doe\n 2017-05-23T13:16:52\n _Jane Doe\n 2017-05-23T13:16:52\n Chemometric methods\n [\"54edd26a-6a21-4ff2-8e87-51e15e27433e\"]\n \n \n _Jane Doe\n 2017-05-23T13:30:22\n _Jane Doe\n 2017-05-23T13:30:22\n Mass spectrometry (MS)\n [\"ad1969a0-9047-45d4-b015-599b83f5b6c3\"]\n \n \n _Jane Doe\n 2017-05-23T13:17:10\n _Jane Doe\n 2017-05-23T13:17:10\n Chromatographic analysis\n [\"57b553db-6322-4e4a-bf1b-1460fc8ebae6\"]\n \n \n _Jane Doe\n 2017-05-23T13:17:24\n _Jane Doe\n 2017-05-23T13:17:24\n Spectroscopic methods\n [\"48fffc9e-9445-4740-bd1b-1cb63ad08a70\"]\n \n \n _Jane Doe\n 2017-05-23T11:55:26\n _Jane Doe\n 2017-05-23T11:55:26\n Screening technology\n [\"2d01172e-8e96-4fb9-90f0-457bf78123c2\"]\n \n \n _Jane Doe\n 2017-05-23T13:22:42\n _Jane Doe\n 2017-05-23T13:22:42\n Risk analysis\n [\"358184f0-e435-47a2-9c0f-5c5e9d6f6e4a\"]\n \n \n _Jane Doe\n 2017-05-23T13:22:49\n _Jane Doe\n 2017-05-23T13:22:49\n Vulnerability assessment\n [\"f298a2cc-30b1-4b97-9067-9e19333b4e35\"]\n \n \n _Jane Doe\n 2017-05-23T11:52:36\n _Jane Doe\n 2017-05-23T11:52:36\n Company guidelines and best practices\n [\"b2a9de22-c5a7-4ca8-a9fc-c855a6e3bfe2\"]\n \n \n _Jane Doe\n 2017-05-23T11:52:54\n _Jane Doe\n 2017-05-23T11:52:54\n Consumer guidelines and best practices\n [\"7577c43a-a95e-45d7-a8a3-4d8e57a18354\"]\n \n \n _Jane Doe\n 2017-05-23T11:56:06\n _Jane Doe\n 2017-05-23T11:56:06\n Blockchain\n [\"5531afd2-dd84-4ef9-88dc-434303383325\"]\n \n \n _Jane Doe\n 2017-05-29T16:34:25\n _Jane Doe\n 2017-05-29T16:34:25\n Digital mass serialization\n [\"2440fe0b-b001-4171-95d3-2b3766aece4f\"]\n \n \n _Jane Doe\n 2017-05-24T11:35:04\n _Jane Doe\n 2017-05-24T11:35:04\n RFID\n [\"ff6fea97-8ac1-40f8-b055-60d1e2c5f5b6\"]\n \n \n _Jane Doe\n 2017-05-23T11:51:22\n _Jane Doe\n 2017-05-23T11:51:22\n Regulation\n [\"3106342c-71e8-40fc-a09a-972776cfc837\"]\n \n \n _Jane Doe\n 2017-05-29T16:22:07\n _Jane Doe\n 2017-05-29T16:22:07\n Enforcement\n [\"fdcc7198-eba6-4b37-b2ba-56e26fe389b2\"]\n \n \n _Jane Doe\n 2017-05-23T11:54:20\n _Jane Doe\n 2017-05-23T11:54:20\n Prevention\n [\"181f8bad-e984-4da5-b30e-f3faf6678cf9\"]\n \n \n _Jane Doe\n 2017-05-23T11:53:12\n _Jane Doe\n 2017-05-23T11:53:12\n Improving supply chain transparency\n [\"1bc869d4-92c6-4b63-8dea-179397392230\"]\n \n \n _Jane Doe\n 2017-05-23T11:47:27\n _Jane Doe\n 2017-05-23T11:47:27\n Conclusion\n [\"e57f8bfe-f42d-40ad-95ca-ef17ed09d603\"]\n \n \n \n 00000000-0000-0000-0000-000000000000;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;fab7624c-e13e-4fc5-9991-758d7e0fdbf6;a83e3adf-a16b-4864-82ef-0efc1dbaa236;0a74c8cc-cda1-4336-869f-5e5f518273d7;4a05cca9-2d0d-4ea5-8440-5a09c4f40249\n 3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;92c35cb6-0cf5-4949-804a-1d31fbcfbd06;8b2dd3a7-2643-425a-9009-4e63647ea860\n fab7624c-e13e-4fc5-9991-758d7e0fdbf6;ac5840bd-bca9-4faa-be65-b59301e55ff1;c8122f49-7dc9-49e0-8919-eefad7f416a9;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 0a74c8cc-cda1-4336-869f-5e5f518273d7;73aa7410-7c17-4acc-83af-249657be15e6;09e0c3fd-e4d7-4edc-9481-ab654bd25b81;145b6eba-876a-46a4-b946-75ddf0389eda;adbb0c87-4c1c-4156-844b-3bb40145b49a\n fc506b83-b591-4183-b9a9-0041d2242545;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 721654e5-7ac1-42ac-9c9c-69111c7e8b90;f1ba83e7-fdda-4bb8-bbe1-e84af8112dfa;190d402f-4513-4442-ab76-155be2ce8db8\n 22387b25-e632-4404-9270-2df1ce7f461c;9ce92a38-44f1-48c4-b1d7-36b74f0836a7;6aaba073-4a78-4cfc-b277-a12ecde05560;b8337610-de37-46a2-bf81-82bc5053255d;d3100956-91ed-4965-ac76-7b66f51d147a;fc506b83-b591-4183-b9a9-0041d2242545;4afcfa69-74cc-4a95-8aba-4a6aadaf59c5\n b03947cc-d2ec-4f99-886e-aab560749d35;55b0134d-a7ca-4853-89fe-1cabd07ed9aa;443ad9c4-cc2b-42f4-a4d6-16d0c8d40614;082d3154-9484-4992-999d-b9c93343d0cb\n 1903e642-0108-4c7c-91e3-7219833a5e54;62e9b05b-6763-4591-8136-899f33bdce7e;4fae714d-c9dc-4759-954e-e4e195f9d20d\n a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d;530cb647-c5aa-46b6-bb8f-d49dab51a26a;99056660-3ef1-45cf-8d39-6e9d8151d848;c5730108-95c7-4468-a834-88a85d582130;a5607a6f-cc37-4e62-968b-bb5deada2317;b03947cc-d2ec-4f99-886e-aab560749d35;1903e642-0108-4c7c-91e3-7219833a5e54\n 4bbd6753-30f2-4e3b-9e32-3c65b5037589;ddb219dd-dfc6-4f0b-b61b-cf5c1b179ae5;3ff07eeb-a959-41de-bab6-c3945d6f0f35\n 73aa7410-7c17-4acc-83af-249657be15e6;721654e5-7ac1-42ac-9c9c-69111c7e8b90;22387b25-e632-4404-9270-2df1ce7f461c;fb23b54d-bb22-492a-b6a3-a60a2a1288f3\n 09e0c3fd-e4d7-4edc-9481-ab654bd25b81;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d\n 145b6eba-876a-46a4-b946-75ddf0389eda;4bbd6753-30f2-4e3b-9e32-3c65b5037589;fabfd984-d738-4459-8a45-1699b4959a4c\n adbb0c87-4c1c-4156-844b-3bb40145b49a;de4970f8-9818-44d8-88cc-53d9ad4885a3;7c3bf245-d473-41fa-952c-22ccb3bf3f8e;55496d4d-9f92-44aa-89ce-3b30e5c437d7\n \n \n \n _Jane Doe\n 2017-05-29T15:57:06\n _Jane Doe\n 2017-05-29T15:57:06\n 1\n Background info - not for citation!\n Popular sources used for learning more about the topic that should not be cited.\n background info - not for citation!\n 6997c8d11d3c3e836499011437f68be5ccef3034\n \n \n _Jane Doe\n 2017-05-29T16:04:36\n _Jane Doe\n 2017-05-29T16:04:36\n 1\n Gray literature\n gray literature\n 02046038ad4995a0540bf3b60c009333865403f9\n \n \n _Jane Doe\n 2017-05-29T16:02:51\n _Jane Doe\n 2017-05-29T16:02:51\n 1\n Legal sources\n legal sources\n 3db4c33d42ca7d002cb2071ec75335f4d42ac390\n \n \n _Jane Doe\n 2017-05-29T15:58:16\n _Jane Doe\n 2017-05-29T15:58:16\n 1\n Popular sources\n News articles, social media posts, blog posts, podcasts, etc.\n popular sources\n f40a12e3e6684284bdd26ca1204fa6fca2a58444\n \n \n _Jane Doe\n 2017-05-29T15:59:09\n _Jane Doe\n 2017-05-29T15:59:09\n 1\n Scholarly sources\n Sources that have undergone peer review\n scholarly sources\n 3854569f7c4de9fdd72dda7b742df98e829daa98\n \n \n \n \n _Jane Doe\n 2017-05-23T15:28:57\n _Jane Doe\n 2017-05-23T15:28:57\n Adulteration\n false\n adulteration\n d524ee69450d46d228f60852c6860a65bc5960f2\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Artificial foods\n false\n artificial foods\n 8c730a3de9791d3c24558dac7dc223b72f1314f8\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Asia\n true\n asia\n ad5e672b03149688034bd2a80a9f3c7e64c3c174\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Blockchain\n false\n blockchain\n 32aebb064157bdba70224d9022fca19728cdc19f\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Cattle genetics\n true\n cattle genetics\n ccb780d8c3c22c1b7024d2c6eb5c20ff64eaae25\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n China\n false\n china\n 830861a7be146b54573618ab59d51536353969c4\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Classification\n false\n classification\n dda2c3ad13cd236589f3a85743cbe6ed90df0e2c\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Coffee\n true\n coffee\n 8ef35c4b0cfec47df0fd84a376c9f2525209fe6e\n \n \n _Jane Doe\n 2017-05-29T15:16:24\n _Jane Doe\n 2017-05-29T15:16:24\n Companies\n false\n companies\n e1291fdba457a9b6af0537da53d024641f4b2e20\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Computer networks\n false\n computer networks\n 8388a36f48fa0c6e23f066c59a578818259877d2\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Consumer education\n false\n consumer education\n 111a7cad35c44ed0cf94a074a743a0d97e1e3a02\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Consumer product safety\n true\n consumer product safety\n e63487aaf68038d2d17358157817ecd06a2edede\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Consumer risk\n false\n consumer risk\n 0dadc2a60ab569d90580fc5c64199336a9eb4172\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Contamination\n false\n contamination\n 32c61ee4d8b70a5f98a2d9529d7041be313f8029\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Crime\n false\n crime\n cd7b553da774ad81d8c60df89304d3aaa00b6f1d\n \n \n _Jane Doe\n 2017-05-29T15:13:03\n _Jane Doe\n 2017-05-29T15:13:03\n Crime vulnerability\n true\n crime vulnerability\n c880827928ee3e9ce3942db7f6f909193754d643\n \n \n _Jane Doe\n 2017-05-29T15:02:26\n _Jane Doe\n 2017-05-29T15:02:26\n Digital mass serialization\n false\n digital mass serialization\n 47a7e6bd04591b15bc13f3a31ab9cfb4a101a12e\n \n \n _Jane Doe\n 2017-05-29T15:20:11\n _Jane Doe\n 2017-05-29T15:20:11\n Direct Food Fraud Risk\n false\n direct food fraud risk\n f2045dee0c4d8e4fed7091fa0e99b855cbaff2e1\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n DNA Barcoding\n true\n dna barcoding\n 808ddcb60b964dcb43f7570b35c1df21a3073dd7\n \n \n _Jane Doe\n 2017-05-29T15:14:53\n _Jane Doe\n 2017-05-29T15:14:53\n Egg Adulteration\n false\n egg adulteration\n 3939d0895141e49c998e7513b28b9aacb4932dbf\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Electron scanning microscopy\n true\n electron scanning microscopy\n 45b4964bf3470d4a7e10b54f5c4dcd0420d2a396\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Europe\n false\n europe\n da48050821dc673bb44a3b0d7c9271712f8a1505\n \n \n _Jane Doe\n 2017-05-29T15:07:14\n _Jane Doe\n 2017-05-29T15:07:14\n Factors\n false\n factors\n 8dc56a365792c42231a96b230b8ab4a02399dff4\n \n \n _Jane Doe\n 2017-05-29T15:14:09\n _Jane Doe\n 2017-05-29T15:14:09\n FAO\n false\n fao\n 93a14737486bc24923fba150ef057a178d56d038\n \n \n _Jane Doe\n 2017-05-29T15:10:33\n _Jane Doe\n 2017-05-29T15:10:33\n Fiction\n false\n fiction\n 08737e7dee9e1771ff394626ad5254647828a207\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Fishery products\n false\n fishery products\n b966e34e97386b6b92c52292271e0392b0f82e68\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Food additives\n true\n food additives\n b41e1accde8b0abd92716e382f054afaee4a122a\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Food adulteration and inspection\n true\n food adulteration and inspection\n 044ed2f9af12bb172155f2fd19f16744b9ccc954\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Food and drink industry\n true\n food and drink industry\n 95b80bd04586170ebf7c0884e33b89c1c86d063d\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Food contamination\n true\n food contamination\n 228bc01bb125b5e3761a255582ffb83734f1c759\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Food contamination analysis\n true\n food contamination analysis\n 2513df73a5aba75ab66ab160d6195bbe31f527eb\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Food contamination prevention and control\n true\n food contamination prevention and control\n 636a1fcf6f96ac04c4fdc1a4e5efec780f8512b5\n \n \n _Jane Doe\n 2017-05-29T15:07:41\n _Jane Doe\n 2017-05-29T15:07:41\n Food crime\n true\n food crime\n e99650e7eedfa9108a509460d68d6c7388da49cb\n \n \n _Jane Doe\n 2017-05-23T15:28:57\n _Jane Doe\n 2017-05-23T15:28:57\n Food defense\n true\n food defense\n f09fecc48879dffeac8b2dd92c017d846ffa4452\n \n \n _Jane Doe\n 2017-05-29T15:07:41\n _Jane Doe\n 2017-05-29T15:07:41\n Food fraud\n true\n food fraud\n c0da59c9845a76348f2d4c18fe0f71718140eb9e\n \n \n _Jane Doe\n 2017-05-29T14:59:31\n _Jane Doe\n 2017-05-29T14:59:31\n Food Fraud Network (FFN)\n true\n food fraud network (ffn)\n afb4041a86fc31fc46c9114a7796c5e801b7c932\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Food industry and trade\n true\n food industry and trade\n a07882f001b381b14ddb523bfb8b0d004d629be5\n \n \n _Jane Doe\n 2017-05-22T08:08:45\n _Jane Doe\n 2017-05-22T08:08:45\n Food industry legislation and jurisprudence\n true\n food industry legislation and jurisprudence\n bfdc2c96f9b605c9f9316fdb2083ae4748c2cf6d\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Food quality\n true\n food quality\n c0bc8ec3ba6920a7eb8fb25a499ec49355465a94\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Food safety\n true\n food safety\n 1c749e13abfbddc73a210dcfe6f76a04d5dd5f2e\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Food safety methods\n true\n food safety methods\n 6cec3f7022b4ab110db0d556418bc6481ebbc9cd\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Food science\n false\n food science\n 5f66148cf3287371cec39b052444cac040385029\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Food security\n false\n food security\n 3fe9ad9c2d6f88349bbb124ff5c1e5283d18886d\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Food substitutes\n false\n food substitutes\n 444dfe30a9c02f132541ae4cb6e703782280db5c\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Fraud\n false\n fraud\n 366e620a8ed87fcc3df0157648a1e2c7c15b633e\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Fraud prevention and control\n true\n fraud prevention and control\n d3925bbcd8d544c29e9192ac4ded7e3c826d8927\n \n \n _Jane Doe\n 2017-05-29T15:14:09\n _Jane Doe\n 2017-05-29T15:14:09\n FSIS\n false\n fsis\n 5af327e54eed3c8dfa62deea665533c79283c59f\n \n \n _Jane Doe\n 2017-05-29T14:39:52\n _Jane Doe\n 2017-05-29T14:39:52\n GFSI\n true\n gfsi\n cb6791ac604715f3ee0b8b991c12ae98a766825e\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Government policy\n false\n government policy\n 02af1cf38c1ea511f3ac2bfb618f3546c45b546e\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Hazard analysis and critical control points\n true\n hazard analysis and critical control points\n f3a186e0a2caf968ef928d886ea201e526782d2c\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Horsemeat scandal\n false\n horsemeat scandal\n 3be91ab16df7e0201fd401f1414c0128116452cb\n \n \n _Jane Doe\n 2017-05-22T08:00:50\n _Jane Doe\n 2017-05-22T08:00:50\n Humans\n false\n humans\n 2d65c873e8358f70a20600b351326a3e77ffd1e7\n \n \n _Jane Doe\n 2017-05-29T15:20:18\n _Jane Doe\n 2017-05-29T15:20:18\n Indirect food fraud risk\n true\n indirect food fraud risk\n c88aa235d05d42eca76c289dc7eb2823d0fa14c5\n \n \n _Jane Doe\n 2017-05-29T15:15:20\n _Jane Doe\n 2017-05-29T15:15:20\n Intentional food fraud\n true\n intentional food fraud\n 46e106ec5d8259e1c29489903e4f346fb933fd83\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n International trade\n false\n international trade\n 6045a5734134c31ddc24766470d2e813e5d8c011\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Ireland\n false\n ireland\n 1575b3f97b84b925c8bb047f977c7bb7dff78ee4\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Jakarta\n false\n jakarta\n 05cb36037c6c4f9bd094f6f8cb4e811e19ee4def\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Language\n false\n language\n cc1f7052057a1ec518e41f548aa4c5a4ba47c59d\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Law and legislation\n false\n law and legislation\n 9577132e54fe39726e348d67e108a8777929233c\n \n \n _Jane Doe\n 2017-05-22T08:06:43\n _Jane Doe\n 2017-05-22T08:06:43\n Legislation\n true\n legislation\n e7a6dde2d7af6c6c9d3c03f1db27d00977c20708\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Linux Foundation Hyperledger Project\n false\n linux foundation hyperledger project\n cf36626de791eaa060041ff102d46871fc0b51bb\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Marketing\n false\n marketing\n c67ab0ee866931c94df3abc9602c12a1a051c0b2\n \n \n _Jane Doe\n 2017-05-29T15:08:45\n _Jane Doe\n 2017-05-29T15:08:45\n Mass spectrometry (MS)\n true\n mass spectrometry (ms)\n ee1856295a7a7c26f4fbdc53d7f504832a03a054\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Meat\n false\n meat\n 1e9839371988f246a9f9a992ca6025877654e4aa\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Nutrition\n false\n nutrition\n f2a1984945697f62c6e893304fcb13415e775ac8\n \n \n _Jane Doe\n 2017-05-29T15:04:51\n _Jane Doe\n 2017-05-29T15:04:51\n Operation OPSON VI\n false\n operation opson vi\n 489c794f6378b769eb22ab51e974753e65f6f4b2\n \n \n _Jane Doe\n 2017-05-29T15:09:14\n _Jane Doe\n 2017-05-29T15:09:14\n PCR\n false\n pcr\n e10d4dad9bdffc69c850dc22fdaef811c2058bb9\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Preserved food\n true\n preserved food\n 722b11dfd4f0aee62cb1b87c9e2cf0bc9abb6065\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Prevention\n false\n prevention\n 81273c488e09bcee1fd1036bc3453a7ddee7b8ef\n \n \n _Jane Doe\n 2017-05-29T15:13:32\n _Jane Doe\n 2017-05-29T15:13:32\n Psychology\n false\n psychology\n 70cb2b28c474188d0666600577d55597ec2fd815\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Public Health\n false\n public health\n ca27a461fb9b52c7c4a3b3cdc38acaea2e4440a7\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Quality\n false\n quality\n c5f2406640f4f08577b3adfe0b94ddc1b821f406\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Republic of Korea\n false\n republic of korea\n 49dbef98c7004d4e3bc82a16da32c2284e8b3965\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Risk Assessment\n false\n risk assessment\n 2faaead91a77e94890e2f8800f553180f30b870a\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Risk Factors\n false\n risk factors\n b42bc3ec203ea6ff2bbbbe19ef17995182cfb1c9\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Risk reduction\n false\n risk reduction\n cfa94db9c436e1867b169ca64bf6612ece57805b\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n RNA\n true\n rna\n 1b8249f6e9cb15de19b38833f42bfe495cd3e044\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Russia\n false\n russia\n c03221708b5e1a8450f7a8e5cd33589dc3ad5239\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Safer food\n true\n safer food\n 0f72f13b7656c3ba7680b81fb3d7c8524c9d4212\n \n \n _Jane Doe\n 2017-05-29T15:17:46\n _Jane Doe\n 2017-05-29T15:17:46\n Screening\n false\n screening\n 358ef8c946dd65065f1098bb8c1e2c3658af5b06\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Service industries\n false\n service industries\n 1c7979286d4b5c026b95b1da038f18b210898cc2\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Singapore\n false\n singapore\n 9e8646e8a516de51eee2271060a7e01296268001\n \n \n _Jane Doe\n 2017-05-29T15:03:44\n _Jane Doe\n 2017-05-29T15:03:44\n Statistics\n false\n statistics\n 52e769de1d8d2e1ceff5784a064ce04a2bf49a46\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Supermarkets\n false\n supermarkets\n 0e0fe1493c9a2b206d123ac574d3cbe543df8d7f\n \n \n _Jane Doe\n 2017-05-29T15:01:36\n _Jane Doe\n 2017-05-29T15:01:36\n Supply chain\n true\n supply chain\n 05580aa7510cc9bd11176e4f52ab8836c69d3656\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Systems engineering\n false\n systems engineering\n 81a49a87b65957c1d44154b589bd5633f6929fa3\n \n \n _Jane Doe\n 2017-05-29T15:20:27\n _Jane Doe\n 2017-05-29T15:20:27\n Technical food fraud risk\n true\n technical food fraud risk\n 20ea68cb39e61c89f95dde1326d4f1e9bb8730a4\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Terrorism\n false\n terrorism\n f5782a45f8281317be2edfdf0b8944233fa23234\n \n \n _Jane Doe\n 2017-05-22T08:08:45\n _Jane Doe\n 2017-05-22T08:08:45\n Terrorism prevention and control\n true\n terrorism prevention and control\n 9cdfbbdd56b7adcdac8ddc158797a0664c9db623\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n The meat industry\n true\n the meat industry\n f380befc2aec2ea6ded79a197d5945a1b58b42c6\n \n \n _Jane Doe\n 2017-05-23T15:24:24\n _Jane Doe\n 2017-05-23T15:24:24\n Todd, Sweeney (legendary character)\n true\n todd, sweeney (legendary character)\n 040fa436e2fe7f080f810bba8efe55b81e2ac37a\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Tokyo\n false\n tokyo\n c29f5f80e80081780e440672e8d904c67738e71f\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Tsinghua University\n false\n tsinghua university\n 59b1bf4e20d388770dc03f9b462002bf67c2f5a1\n \n \n _Jane Doe\n 2017-05-29T15:15:20\n _Jane Doe\n 2017-05-29T15:15:20\n Unintentional food fraud\n true\n unintentional food fraud\n 7646b4c6210f73559838c3ff7c140cdd898ff2df\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n United Kingdom\n true\n united kingdom\n 96220982e731d3a94ac92b6b57b2f773a853eba5\n \n \n _Jane Doe\n 2017-05-22T08:00:50\n _Jane Doe\n 2017-05-22T08:00:50\n United States\n false\n united states\n 9fb68c67959913c15f7214c815d8a259a0a025a9\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Walmart Food Safety Collaboration Center\n false\n walmart food safety collaboration center\n f04dd2fd8c59e3adfe9937bea5d4f63fe5860b6f\n \n \n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n British Library\n 1\n british library\n 82c54085fee7651c9c000e85b094413b864801af\n \n \n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n 2223-9944\n Academic Research International\n 0\n true\n arint. (academic research international)\n ARInt.\n ARInt\n 8d7a72db1eb7b78dd0ac852e2362a3d72ea43a6d\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n 1471-2458\n BMC Public Health\n 0\n true\n bmc public health (bmc public health)\n BMC Public Health\n BMC Public Health\n 6c989d88ea22950543da5756f3eb009e93e016aa\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n 0959-535X\n British Medical Journal\n (Clinical research ed.)\n 0\n true\n bmj (british medical journal)\n BMJ\n BMJ\n 124000ae92a56abbb1add5392842bc552b7178c8\n \n \n _Jane Doe\n 2017-05-22T08:26:26\n _Jane Doe\n 2017-05-22T08:26:26\n British Food Journal\n 0\n true\n brit. food j. (british food journal)\n Brit. Food J.\n Brit Food J\n 59c2df569a730e5fecec504ccc58f62ef7600be0\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n 1040-8347\n Critical Reviews in Analytical Chemistry\n 0\n true\n crit. rev. anal. chem. (critical reviews in analytical chemistry)\n Crit. Rev. Anal. Chem.\n Crit Rev Anal Chem\n a95fdbc699498473dd785df684830d035a3bfc3b\n \n \n _Jane Doe\n 2017-05-22T08:08:45\n _Jane Doe\n 2017-05-22T08:08:45\n 0097-6326\n Federal register\n 0\n true\n fed. regist. (federal register)\n Fed. Regist.\n Fed Regist\n 2214b87c7b2192ebb2c8f745f2b5aa6ed7af31cd\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n 0308-8146\n Food chemistry\n 0\n true\n food chem. (food chemistry)\n Food Chem.\n Food Chem\n cad4f77606b5a93e17d6a11933e0d30a9816fe37\n \n \n _Jane Doe\n 2017-05-24T11:30:01\n _Jane Doe\n 2017-05-24T11:30:01\n Food Industry Executive\n 0\n true\n food indust. exec. (food industry executive)\n Food Indust. Exec.\n Food Industry Executive\n 8521e3d71c77efcc1ea926fdbb5838316ddd4b30\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n 2304-8158\n Foods\n Foods (Basel, Switzerland)\n 0\n true\n foods\n 6576d4250f14ada5e5da82b762a256afcc075507\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n 0263-5577\n Industrial Management & Data Systems\n 0\n true\n ind. manage. data syst. (industrial management & data systems)\n Ind. Manage. Data Syst.\n Ind Manage Data Syst\n 6c4ae90f21952e292dd37321e5fdf34dfc7616a2\n \n \n _Jane Doe\n 2017-05-22T12:36:41\n _Jane Doe\n 2017-05-22T12:36:41\n International Journal of Environmental Research and Public Health\n 0\n true\n int. j. env. res. pub. he. (international journal of environmental research and public health)\n Int. J. Env. Res. Pub. He.\n Int J Env Res Pub He\n c3aa2ff8be1177a53ebcd7e3522642d24d82688c\n \n \n _Jane Doe\n 2017-05-22T08:22:13\n _Jane Doe\n 2017-05-22T08:22:13\n 1752-0401\n The Journal of Asian Studies\n 0\n true\n j. asian stud. (the journal of asian studies)\n J. Asian Stud.\n J Asian Stud\n c23562cd0fe4846dbc1fd5102bb135f88ac7553c\n \n \n _Jane Doe\n 2017-05-22T08:24:49\n _Jane Doe\n 2017-05-22T08:24:49\n 1459-0255\n Journal of Food Agriculture and Environment\n 0\n true\n j. food agric. environ. (journal of food agriculture and environment)\n J. Food Agric. Environ.\n J Food Agric Environ\n bd2ff86d80158e229c236f1892f159cb2ab480fd\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n 0022-1147\n Journal of food science\n 0\n true\n j. food sci. (journal of food science)\n J. Food Sci.\n J Food Sci\n b237d086473f3deb700eea79280b54cfaf689f54\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n 0022-5142\n Journal of the Science of Food and Agriculture\n 0\n true\n j. sci. food agric. (journal of the science of food and agriculture)\n J. Sci. Food Agric.\n J Sci Food Agric\n 1bf7217e10c8eea99fcfae586bc4704b7a417eb7\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n 1674-7305\n Science China. Life sciences\n 0\n true\n sci. china life sci. (science china. life sciences)\n Sci. China Life Sci.\n Sci China Life Sci\n 94d1862560db3827f020991d726974198a5be0ec\n \n \n _Jane Doe\n 2017-09-27T10:09:59\n _Jane Doe\n 2017-09-27T10:09:59\n Tech in Asia\n 0\n false\n tech in asia\n d0f4f353e26d4ddaf4075d82ad7d225dd99de0e6\n \n \n _Jane Doe\n 2017-05-23T15:07:44\n _Jane Doe\n 2017-05-23T15:07:44\n The Guardian\n 0\n true\n the guardian\n e4aaaeb5be9e1cb4eff82754b2b104e1638fe6a4\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n 09242244\n Trends in Food Science & Technology\n 0\n true\n trends food sci. tech. (trends in food science & technology)\n Trends Food Sci. Tech.\n Trends Food Sci Tech\n 60e8e832a30a1fefe2ece1c80930da108c504dd2\n \n \n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n Emmanuel\n Agbaraji\n Chuks\n true\n 2\n agbaraji, emmanuel chuks\n bf0469d7bd9d53f83a1f09af993ce48d927c0d0f\n \n \n _Jane Doe\n 2017-08-09T08:25:50\n _Jane Doe\n 2017-08-09T08:25:50\n Ken\n Albala\n false\n 2\n albala, ken\n 5735a153df7a837eb432ba4997a2375d38e105e1\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Martin\n Alewijn\n false\n 2\n alewijn, martin\n a4eddc4f1ca1f14c0e741ec1a009f710b18dd23f\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Aida\n Azmi\n Azrina\n false\n 1\n azmi, aida azrina\n da1e417c69c0c6b2ff40ed9c919820368ccab67e\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Diána\n Bánáti\n true\n 1\n bánáti, diána\n 6e79fadacc818c0cd1b5dde4344690d9606656a6\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Susan\n Barlow\n M.\n false\n 1\n barlow, susan m.\n 4bd1e6c5f78f7f230c5059daaa6553915734c40a\n \n \n _Jane Doe\n 2017-05-24T13:45:58\n _Jane Doe\n 2017-05-24T13:45:58\n BBC Two Scotland\n true\n 3\n bbc two scotland\n c6338d07816dcfbdd36bd8339697d8d9f84f22f5\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Mac\n Bishop\n William\n false\n 2\n bishop, mac william\n 285fe87b3e6b102e66f300f82641a4d49d7a9ca5\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Michail\n Bitzios\n true\n 2\n bitzios, michail\n 2510963c3ec646166951c58340346354d64d26fa\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Rita\n Boerrigter-Eenling\n false\n 1\n boerrigter-eenling, rita\n ccb90b90681ea2ae59f827a4389543c485ba199a\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Alan\n Boobis\n R.\n false\n 2\n boobis, alan r.\n e2c487e23bb6bba596a5f64bd9d3f6f522da0b75\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Jamie\n Bower\n Campbell\n true\n 2\n bower, jamie campbell\n 7d9db321cd7c0c1b43b9c012a5a1a695bd831c02\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Darrell\n Braden\n T.\n false\n 2\n braden, darrell t.\n bd8c25f625826028c7c674df2fd0749c79710db7\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Jim\n Bridges\n false\n 2\n bridges, jim\n 98edb6616db3b8c875c67909eb94499784298d2c\n \n \n _Jane Doe\n 2017-05-23T15:24:24\n _Jane Doe\n 2017-05-23T15:24:24\n Tim\n Burton\n false\n 2\n burton, tim\n 3217fe47d0428f040bb5414904947355dfef8bde\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Michael\n Calnan\n false\n 2\n calnan, michael\n f277f28440381baf89b539f56919b2cf01de11cf\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Helena\n Carter\n Bonham\n false\n 1\n carter, helena bonham\n 7cee36f78941b2a8792f2f4ba566439c3f97ad95\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Iain\n Chambers\n false\n 2\n chambers, iain\n f5e48f9b47a75a83e15d2e4608f98268a0a764db\n \n \n _Jane Doe\n 2017-06-28T10:15:43\n _Jane Doe\n 2017-06-28T10:15:43\n Yaakob\n Che Man\n Bin\n true\n 2\n che man, yaakob bin\n 459234774584d45c034b1b3db2d6e7fd2b7fb95a\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jane Doe\n 2017-05-22T12:10:22\n Junshi\n Chen\n true\n 2\n chen, junshi\n 7c4817e33b72591203075eecf2ea0f2bb18d3d1f\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Hyang\n Chun\n Sook\n true\n 1\n chun, hyang sook\n c5ca8e5fa7de59267abfbda0f0ac449ed11e27aa\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Andrew\n Cockburn\n false\n 2\n cockburn, andrew\n aed0f10214bc9b954af0d283d9e536f3e15ffe63\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Jean\n Codron\n Marie\n true\n 2\n codron, jean marie\n f008088966f8281965e5e0a0779c9d5fec68a44f\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Sacha\n Cohen\n Baron\n true\n 2\n cohen, sacha baron\n 3f5bdb99dcbb0e01dcefc1dd56b3ca2837241840\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n John\n Coveney\n false\n 2\n coveney, john\n 3438a36e000d671148ae503ade483fb67dce7777\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Cong\n Dai\n true\n 2\n dai, cong\n d7fc44c62719b09ae9d4a42c34b44def2ea30204\n \n \n _Jane Doe\n 2017-05-24T11:16:02\n _Jane Doe\n 2017-05-24T11:16:02\n Eoghan\n Daly\n false\n 2\n daly, eoghan\n 5e0c2a6a0843b8ec097294ed05481d8813bb5a79\n \n \n _Jane Doe\n 2017-05-23T14:14:34\n _Jane Doe\n 2017-05-23T14:14:34\n Samir\n Dani\n true\n 2\n dani, samir\n 4000df698ee63e8c984538affbb2fc21eeadd780\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Wolfgang\n Dekant\n false\n 2\n dekant, wolfgang\n 8bda5cbf81c02f99db1001f01e6c08b01b71a48b\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Johnny\n Depp\n false\n 2\n depp, johnny\n 15a47b2b5c25058a7f8f9c8dd2a525b42530e122\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Lisa\n Desai\n false\n 1\n desai, lisa\n fdc808bd8d6500092b49dcdd3d5572e5d5040e62\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n Georgios\n Doukidis\n false\n 2\n doukidis, georgios\n 8d66ae8fa4ecdd8996494a0e64dc6a0e8748425c\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Liesbeth\n Dries\n K. E.\n false\n 1\n dries, liesbeth k. e.\n 751b1385862d0c99aed80da0d6e0bc166c473332\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jane Doe\n 2017-05-24T12:31:04\n Angela\n Druckman\n false\n 1\n druckman, angela\n 4af1152683873f71a35221357299805ad1e9ef90\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Dmitry\n Edelev\n false\n 2\n edelev, dmitry\n a6a07c2fa313913282b66e76a30653d01514269e\n \n \n _Jane Doe\n 2017-06-28T10:26:17\n _Jane Doe\n 2017-06-28T10:26:17\n FFN\n European Commission Food Fraud Network\n true\n 3\n european commission food fraud network (ffn)\n 30df2db645ddbe61191bfe2f332c8f4d3f555fbb\n \n \n _Jane Doe\n 2017-05-23T10:30:23\n _Jane Doe\n 2017-05-23T10:30:23\n Europol\n true\n 3\n europol\n 4d3b991064ae709308c45c8713a67f06f21f67ae\n \n \n _Jane Doe\n 2017-05-24T11:39:43\n _Jane Doe\n 2017-05-24T11:39:43\n Richard\n Evershed\n false\n 2\n evershed, richard\n bcfcba440003cf3e211470192fcd6d9cfa266ca4\n \n \n _Jane Doe\n 2017-05-22T08:06:43\n _Jane Doe\n 2017-05-22T08:06:43\n Karen\n Everstine\n false\n 1\n everstine, karen\n 6277ee54ee685d2bf893e61338d6beef1ec59c2f\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Michael\n Ewing-Chow\n false\n 2\n ewing-chow, michael\n 33f0d152dd630eaa82ad47e5ac14415e93fb898a\n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n Gloria\n Ezeh\n N.\n false\n 1\n ezeh, gloria n.\n a5a34e7dabec05e03a8ee5c351ed558faa77db08\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Long\n Fan\n false\n 2\n fan, long\n 03a4c85bdd377acc5041eda114448036b82ba1cc\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Adriana\n Farah\n false\n 1\n farah, adriana\n 21b95ae6d52a19d9187e0f35678ec9e1cc8c52b5\n \n \n _Jane Doe\n 2017-05-23T14:14:34\n _Jane Doe\n 2017-05-23T14:14:34\n Liam\n Fassam\n true\n 2\n fassam, liam\n 2042b6a587fb7cc162f7eaf568432811df74c62e\n \n \n _Jane Doe\n 2017-05-23T14:17:30\n _Jane Doe\n 2017-05-23T14:17:30\n Emilio\n Ferrari\n true\n 2\n ferrari, emilio\n 5a18becfc2ea05e4a0dc555122b97a1bd22352e1\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Victor\n Fersht\n false\n 2\n fersht, victor\n 5e0ab2915b1cf01d5f567d060322211e2eca6b9c\n \n \n _Jane Doe\n 2017-05-24T13:55:14\n _Jane Doe\n 2017-05-24T13:55:14\n FDA\n Food and Drug Administration\n true\n 3\n food and drug administration (fda)\n 73fd573482016e47f4f236719fd762624a89abbb\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jane Doe\n 2017-05-22T12:34:38\n Eelco\n Franz\n true\n 2\n franz, eelco\n 28f0c2ed8f2c33694ca4ad77c213966c827cc7c3\n \n \n _Jane Doe\n 2017-05-24T11:30:21\n _Jane Doe\n 2017-05-24T11:30:21\n Krista\n Garver\n false\n 1\n garver, krista\n a6b238d9c2d15a75822824519e89af0bbbade7d0\n \n \n _Jane Doe\n 2017-05-23T11:39:28\n _Jane Doe\n 2017-05-23T11:39:28\n GFSI\n Global Food Safety Initiative\n true\n 3\n global food safety initiative (gfsi)\n 07d5a51f3094164a422f94ccba36bdecad7717e1\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Kai\n He\n true\n 2\n he, kai\n 4cd523e44badf966ba160ee72e3578cc82e48c30\n \n \n _Jane Doe\n 2017-05-30T10:39:53\n _Jane Doe\n 2017-05-30T10:39:53\n Craig\n Hedberg\n false\n 2\n hedberg, craig\n db7e6b48a4e76e72c8ec6970aacc7cb57ee52d31\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Julie\n Henderson\n false\n 1\n henderson, julie\n c6d6f3d450588ed7aa2aa1c5df42cc58dd1192cf\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Paul\n Hepburn\n false\n 2\n hepburn, paul\n 1452419cbbdac26f7540be48730a90feb1956818\n \n \n _Jane Doe\n 2017-05-23T14:14:34\n _Jane Doe\n 2017-05-23T14:14:34\n Mils\n Hills\n true\n 2\n hills, mils\n fb06ecc132f7af321211f87b9d549feb37dc6134\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Channon\n Hodge\n true\n 1\n hodge, channon\n caa387e80b013f9db9cb17c92ca6632c0960ffd4\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Eunyoung\n Hong\n true\n 1\n hong, eunyoung\n 6442602cb41594449f83ac1616f1e84b20ce70b0\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Miao\n Hong\n true\n 1\n hong, miao\n 0440a5cda84af189bcecda1265fd57e340444a23\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Geert\n Houben\n F.\n false\n 2\n houben, geert f.\n 6c43bd452dd396221f65867ba64ba432c3caa22a\n \n \n _Jane Doe\n 2017-05-24T11:23:35\n _Jane Doe\n 2017-05-24T11:23:35\n IBM\n International Business Machines Corporation\n true\n 3\n international business machines corporation (ibm)\n f15d426dc0fa1a5880251e9bdbb326d5844e6a6e\n \n \n _Jane Doe\n 2017-05-24T11:18:32\n _Jane Doe\n 2017-05-24T11:18:32\n ISO\n International Organization for Standardization\n true\n 3\n international organization for standardization (iso)\n 738a08116e0e73e8bd139b7dc49cb86008246d90\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jane Doe\n 2017-05-23T14:19:18\n ISL\n International Symposium on Logistics\n true\n 3\n international symposium on logistics (isl)\n 0a9d03fa6fd7428cf7147c7217775d78d932da38\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Lisa\n Jack\n false\n 1\n jack, lisa\n 475f30cc7ea684e803465750f78270ce74eb8f77\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jane Doe\n 2017-05-22T12:10:22\n Joseph\n Jen\n J.\n false\n 2\n jen, joseph j.\n d0a04ce6c1a00ad2dd1382e4f57484f8463ca144\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Jae\n Jeong\n Yun\n false\n 0\n jeong, jae yun\n 94869efdb3407e0c8928feb269eed7d1b662d9bf\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Min\n Jiang\n false\n 1\n jiang, min\n 5e377f2ca786f9064741277343d1237db6a8e0b8\n \n \n _Jane Doe\n 2017-05-24T11:41:45\n _Jane Doe\n 2017-05-24T11:41:45\n Thomas\n Judd\n false\n 2\n judd, thomas\n 9606855ca81466db1676638eea5aef14090e8153\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Konstantinos\n Karantininis\n false\n 2\n karantininis, konstantinos\n 7b84899c7876b78c3c34772c9a4b3326ebf17d03\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n Philippos\n Karipidis\n true\n 2\n karipidis, philippos\n 4ace98e166c320a037f00a0b5b116ff325430903\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n Thomas\n Kelepouris\n false\n 2\n kelepouris, thomas\n 958a8db784b6bbd78f30222a35c2fcbc7a3b1386\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Laura\n Kelly\n Michelle\n false\n 1\n kelly, laura michelle\n c28d066e7787fc10dc36a5952627e098b5c771f7\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Farihah\n Khalid\n Liyana\n true\n 1\n khalid, farihah liyana\n a5da3e6495acc19fc8166d0152e21a01b732c066\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Byung\n Kim\n Hee\n true\n 2\n kim, byung hee\n 03a573f81f7eb3ba95bde63a552a4d40979b887d\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Jürgen\n König\n false\n 2\n könig, jürgen\n 76075e00d603f43139263e0743f171131ce6f608\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Sally-Ann\n Krzyzaniak\n Caroline\n true\n 1\n krzyzaniak, sally-ann caroline\n 34eba8291e82fafb393e6d6b7ed470c665c6c5b5\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Kisung\n Kwon\n false\n 0\n kwon, kisung\n 9accb1732aadf985ffb4eb69e95d3e4823431cf6\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Felicity\n Lawrence\n false\n 1\n lawrence, felicity\n 99d9d9b3982b20e4559d43eb3b4c6dc1587203dc\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Sang\n Lee\n Yoo\n true\n 2\n lee, sang yoo\n df7e6c1a9e30a07d8d1c33141d22ec5fc2de7b0d\n \n \n _Jane Doe\n 2017-10-16T07:58:47\n _Jane Doe\n 2017-10-16T07:58:47\n Yin-Ling\n Lin\n false\n 0\n lin, yin-ling\n 9ed581b08bf7e1d0c32a1a34dcb502856f39c13c\n \n \n _Jane Doe\n 2017-06-28T12:25:01\n _Jane Doe\n 2017-06-28T12:25:01\n L.\n Manning\n false\n 0\n manning, l.\n e399c92840d02386e0b2c81c590db22014d76928\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Louise\n Manning\n false\n 1\n manning, louise\n b4cea9146ce4c5b8a265561f0e3220ed5d02a9a8\n \n \n _Jane Doe\n 2017-05-24T11:15:48\n _Jane Doe\n 2017-05-24T11:15:48\n Roy\n Manuell\n false\n 2\n manuell, roy\n f7847615681788181d96077e4e694d3e432d60c6\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Gaetano\n Martino\n false\n 2\n martino, gaetano\n 013fd7416380cd459bde46efab27b5a562b06ca6\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Dean\n McCullum\n false\n 2\n mccullum, dean\n ee5140234a4d08c5db88c0c9b57a4259fda26293\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Samantha\n Meyer\n B.\n false\n 1\n meyer, samantha b.\n 183aa65874f13d3a289b93ab02d1e8c5dc245b2d\n \n \n _Jane Doe\n 2017-05-24T11:13:08\n _Jane Doe\n 2017-05-24T11:13:08\n Michigan State University\n true\n 3\n michigan state university\n 37c580ef2b57ed8dfcc80e853d9ecdf077a2eefe\n \n \n _Jane Doe\n 2017-05-24T11:57:02\n _Jane Doe\n 2017-05-24T11:57:02\n Steven\n Millward\n false\n 2\n millward, steven\n 131f8fd8191a18e0e34188c6652d5e1bf6365ff7\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Douglas\n Moyer\n C.\n false\n 2\n moyer, douglas c.\n 8351d7d7c023d15740adfbcccb63e9a7b617d96c\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Robert\n Murphy\n W.\n false\n 2\n murphy, robert w.\n 600240cc3cdbe3a14cb2c38bab92f19be5f4e2c8\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Shuhaimi\n Mustafa\n true\n 2\n mustafa, shuhaimi\n 014adf3dd4cf5a81f9b17a9ec85250a4660a8381\n \n \n _Jane Doe\n 2017-06-28T10:49:28\n _Jane Doe\n 2017-06-28T10:49:28\n Carina\n Nascimento\n de Fátima\n false\n 1\n nascimento, carina de fátima\n 9851152262ceb324c304a432a9204997b7e17fce\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Maarten\n Nauta\n J.\n false\n 2\n nauta, maarten j.\n 0eac94a27a626f3806045b999adce11ee2ff6b00\n \n \n _Jane Doe\n 2017-05-23T15:59:24\n _Jane Doe\n 2017-05-23T15:59:24\n Nestec Ltd.\n true\n 3\n nestec ltd.\n 7352ebdfd3df96f07717ebc14ed3d40c497d98f7\n \n \n _Jane Doe\n 2017-05-24T11:06:04\n _Jane Doe\n 2017-05-24T11:06:04\n Oceana\n true\n 3\n oceana\n aaa6fc4dc1a85711e3d78e41e302455fdaf29976\n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n Deborah\n Ochulor\n O.\n false\n 1\n ochulor, deborah o.\n 955b95287e0c8b90c2c9dfd0418a1c699df0717f\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Gislene\n Oliveira\n Batista de\n true\n 1\n oliveira, gislene batista de\n 11eaa5cbba5b5da8ec076e7605d298188c4d264a\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Larry\n Olmsted\n false\n 2\n olmsted, larry\n 7d4ef7b6cfff7fcb554aabf933d7fa29747152f7\n \n \n _Jane Doe\n 2017-05-22T08:24:49\n _Jane Doe\n 2017-05-22T08:24:49\n Linus\n Opara\n Umezuruike\n true\n 2\n opara, linus umezuruike\n 7e192a2c9fc541467678ade834644d06ba314f81\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Seung\n Paek\n Yeop\n true\n 2\n paek, seung yeop\n 4d0d054820805e0a33dee3ebc713b5061bf55a4f\n \n \n _Jane Doe\n 2017-05-24T11:46:59\n _Jane Doe\n 2017-05-24T11:46:59\n Jason\n Papathanasiou\n false\n 2\n papathanasiou, jason\n 29158315a398eb475dffc1224ec1bd22fff4f1a0\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Hyeonho\n Park\n true\n 2\n park, hyeonho\n 78bd511428d9f005620984b132849fee9068471f\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Jung\n Park\n Min\n true\n 2\n park, jung min\n a7b018978524be5416b5315e32daf80a809a40ff\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Stefano\n Pascucci\n false\n 2\n pascucci, stefano\n 8d8906c856c048133b09a13c31a0572cf51d1684\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jane Doe\n 2017-05-23T14:19:18\n Kulwant\n Pawar\n S.\n true\n 2\n pawar, kulwant s.\n 4bccc17550722be8ed2d48b5db3c20081a049534\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Alex\n Pearce\n R.\n false\n 2\n pearce, alex r.\n 3daba8e793c9d5166955739fcff380f16060d939\n \n \n _Jane Doe\n 2017-05-24T12:17:05\n _Jane Doe\n 2017-05-24T12:17:05\n Edenir\n Pereira-Filho\n Rodrigues\n true\n 2\n pereira-filho, edenir rodrigues\n 1d2684bdfd5093c4aedda56d0c5335f70d928924\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Helena\n Pezza\n Redigolo\n false\n 1\n pezza, helena redigolo\n ba90d1b2fe0bac16771935c20286deee981dd528\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Leonardo\n Pezza\n false\n 2\n pezza, leonardo\n 1fe4e6681f6d18475714a3ca8651c801ae7457ed\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n Katerina\n Pramatari\n false\n 1\n pramatari, katerina\n da5fede75686022b6c6fcd02b7aa01fcf5dcadec\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Raha\n Rahim\n Abdul\n true\n 1\n rahim, raha abdul\n ff855c1fa639349bed471c870de0686a1074e280\n \n \n _Jane Doe\n 2017-05-24T11:23:50\n _Jane Doe\n 2017-05-24T11:23:50\n Shanker\n Ramamurthy\n true\n 2\n ramamurthy, shanker\n e290490e306d7dba4c2eb1bcbf84d4ef831a071c\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Alan\n Rickman\n false\n 2\n rickman, alan\n ad6f83ddf0df81077f101b80d5c1583363d0ce2f\n \n \n _Jane Doe\n 2017-06-28T10:47:47\n _Jane Doe\n 2017-06-28T10:47:47\n Fábio\n Rocha\n Rodrigo Piovezani\n true\n 2\n rocha, fábio rodrigo piovezani\n abb0bb32c8b71b70d01580b28118217d6fa9f5b1\n \n \n _Jane Doe\n 2017-05-23T14:17:30\n _Jane Doe\n 2017-05-23T14:17:30\n Helen\n Rogers\n true\n 1\n rogers, helen\n 004ce77fad1834eaf22762254fc3a50ae68c8795\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Pedro\n Rosado\n Rafael\n false\n 2\n rosado, pedro rafael\n 5e940211f269808d90e7aee82716797168d31018\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Saskia\n van Ruth\n Ruth\n M.\n true\n 1\n ruth, saskia m.\n 390dad2636e661bbf86dd2b899420c69404c5e5e\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n John\n Ryan\n M.\n false\n 2\n ryan, john m.\n 3176d88230638e6c7a250d07a244f6004b43b563\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Ian\n Sample\n false\n 2\n sample, ian\n a6b5cf5ebb1fc96700b789baf7682dae8d678f34\n \n \n _Jane Doe\n 2017-06-28T10:47:47\n _Jane Doe\n 2017-06-28T10:47:47\n Poliana\n Santos\n Macedo dos\n true\n 1\n santos, poliana macedo dos\n 2c7b4485a0ab287009e298aaf2901a896011d504\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Awis\n Sazili\n Qurni\n true\n 2\n sazili, awis qurni\n 4edd070b6942951f30f6655225186ed609c6d25a\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jane Doe\n 2017-05-22T12:34:38\n Oliver\n Schlüter\n false\n 2\n schlüter, oliver\n 6445f7b6e25391a376b2e369006702f6fee1496b\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Jeroen\n Schuermans\n false\n 2\n schuermans, jeroen\n d04a3680ab8ddfe216a931ae7ecf28a129a6540d\n \n \n _Jane Doe\n 2017-05-24T14:40:26\n _Jane Doe\n 2017-05-24T14:40:26\n Sciex\n true\n 3\n sciex\n d9e90c8076a472839d5ee62f3b27aee445b286d2\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Bing\n Shao\n true\n 2\n shao, bing\n 4f2348ec9ab7a9f9000b3a8a281ded62f3aefb20\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Melanie\n Slade\n Vilarasau\n false\n 1\n slade, melanie vilarasau\n d149b7f08bf98a4225ec95ada78cf311aebdedf2\n \n \n _Jane Doe\n 2017-05-24T11:44:46\n _Jane Doe\n 2017-05-24T11:44:46\n Hannah\n Slocum\n false\n 1\n slocum, hannah\n 1372dd64241e7acb9a9e6362eec69f56b9745886\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Jan\n Soon\n Mei\n true\n 1\n soon, jan mei\n f8151c5f7a5b32c8e19f0ce21d7da2ab9472e688\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Timothy\n Spall\n false\n 2\n spall, timothy\n 54b7930d990038cac9b9bde121effd856b44c38a\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n John\n Spink\n false\n 2\n spink, john\n 796fbeac6a5cac33c85348fc37c652d6f3c60504\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Elaisha\n Stokes\n true\n 1\n stokes, elaisha\n dd0cdb072ce1f73a5b428a910c037e696d28574c\n \n \n _Jane Doe\n 2017-05-24T11:46:59\n _Jane Doe\n 2017-05-24T11:46:59\n Theodore\n Tarnanidis\n false\n 2\n tarnanidis, theodore\n 56e3bb6667d7da6650d5d8ffa5c4a2862aabb64b\n \n \n _Jane Doe\n 2017-05-24T11:39:43\n _Jane Doe\n 2017-05-24T11:39:43\n Nicola\n Temple\n true\n 1\n temple, nicola\n 7600b8153cd43450bf4aa3d414a039d7eb1cdd61\n \n \n _Jane Doe\n 2017-05-24T12:56:43\n _Jane Doe\n 2017-05-24T12:56:43\n Feng\n Tian\n true\n 2\n tian, feng\n c2e89337f9a55246074367535256467f3d12d94a\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Aline\n Toci\n Theodoro\n false\n 1\n toci, aline theodoro\n 057a4055394765a420d9dd8ddb5284e03f276fab\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n Dimitrios\n Tselempis\n true\n 2\n tselempis, dimitrios\n cfe9bf3f3bad1ce064a02c1ba03ce3d474fa24bc\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n Loukas\n Tsironis\n K.\n true\n 2\n tsironis, loukas k.\n dd211273c972ffdb6df2e25fc216dfff5ba8f28e\n \n \n _Jane Doe\n 2017-05-24T14:39:54\n _Jane Doe\n 2017-05-24T14:39:54\n USC\n United States Congress\n true\n 3\n united states congress (usc)\n fd9a4b1bcec064c1fa15a32c4b5a5d9d5fd0f78b\n \n \n _Jane Doe\n 2017-05-24T11:27:14\n _Jane Doe\n 2017-05-24T11:27:14\n USSC\n United States Supreme Court\n true\n 3\n united states supreme court (ussc)\n 0b2ef9ed510d4f17461af532e3da2e2e33356e18\n \n \n _Jane Doe\n 2017-05-23T15:30:24\n _Jane Doe\n 2017-05-23T15:30:24\n University of Minnesota\n true\n 3\n university of minnesota\n add53e102b3a6c128aa875cef00d41823553acd6\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jane Doe\n 2017-05-22T12:34:38\n Mieke\n Uyttendaele\n false\n 1\n uyttendaele, mieke\n 12b642f6eec0a3d72657f230158c8a1ab1851e48\n \n \n _Jane Doe\n 2017-05-24T11:46:59\n _Jane Doe\n 2017-05-24T11:46:59\n Maro\n Vlachopoulou\n true\n 1\n vlachopoulou, maro\n 13c6ef91081b23ef83caa3d3539ed89bfb5d19c2\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Wenzhi\n Wang\n true\n 2\n wang, wenzhi\n 5e2ae8d41fea9a2936c298a99654882a92267798\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Yunyu\n Wang\n true\n 2\n wang, yunyu\n 16616916b8a6a6059a47c355e10d825095e1c2ce\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Yushui\n Wang\n true\n 2\n wang, yushui\n c3fb7d7ecdaaa5be0cddeda543ca33ee25cc973b\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Paul\n Ward\n false\n 2\n ward, paul\n 659bb743dc97a0af6b2e659ac69649370d6db9ec\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Trevor\n Webb\n false\n 2\n webb, trevor\n 27c2da16683df02f775722b9807ad7411ce8ec7d\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Ben\n Werschkul\n false\n 2\n werschkul, ben\n e7f69ea309a4e9afd68d8d31f50c95f511b656f8\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jane Doe\n 2017-05-24T12:31:04\n Elizabeth\n Whitworth\n false\n 1\n whitworth, elizabeth\n ee6bed98ec6581eaf3d0032c20149b2641596956\n \n \n _Jane Doe\n 2017-05-29T16:00:22\n _Jane Doe\n 2017-05-29T16:00:22\n Wikipedia\n true\n 3\n wikipedia\n e84bc0e1c5a877c79be55c97c45195c9ee85a1c3\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Annabelle\n Wilson\n Mary\n true\n 1\n wilson, annabelle mary\n 41584548a0847d45103034b813aef3420e18de1d\n \n \n _Jane Doe\n 2017-05-24T10:45:54\n _Jane Doe\n 2017-05-24T10:45:54\n Carl\n Winter\n false\n 2\n winter, carl\n bb71e74b3d2ea962253adb0f5553c1a333c821e1\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Jayne\n Wisener\n false\n 1\n wisener, jayne\n 8a62905296d72b1a4f3074bd466293f25c6c493a\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jane Doe\n 2017-05-24T12:31:04\n Amy\n Woodward\n false\n 1\n woodward, amy\n fb550a7b2ae728f28a0ee5a41938c9d06c4781eb\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Shifang\n Wu\n true\n 1\n wu, shifang\n c18ed77f8d74a27f7f271ee52cfbde31dcb9d750\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Yongning\n Wu\n true\n 2\n wu, yongning\n 6cd8131b63daf11d26bbfceac0ce17afa2eeaf90\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Mark\n Xu\n false\n 2\n xu, mark\n efec7ef091c630ccf294d2a1e9f05f06b9f3030c\n \n \n _Jane Doe\n 2017-05-22T08:22:13\n _Jane Doe\n 2017-05-22T08:22:13\n Yunxiang\n Yan\n true\n 2\n yan, yunxiang\n 6a26d7018c816da1c664427252d7e4a235dd8ae4\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Baojian\n Yang\n true\n 2\n yang, baojian\n 476c63c41aec65de09cf010c52353a53c9ae11c8\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Yaping\n Zhang\n true\n 2\n zhang, yaping\n 581e61eb3e5ba6cc11b278b092ca58ec8c7f7915\n \n \n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Academic Press\n Imprint of Elsevier\n true\n academic press\n 5dd7c8ff8760876167e944f9e5ae80cfc10778fb\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Algonquin Books of Chapel Hill\n false\n algonquin books of chapel hill\n 38f3aaa7f2004513fffa0359de859320c0129434\n \n \n _Jane Doe\n 2017-05-24T11:42:49\n _Jane Doe\n 2017-05-24T11:42:49\n Audible Studios for Bloomsbury\n false\n audible studios for bloomsbury\n 445da2b0a5d075f1582dbc0acc442bd18f9fa6cb\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jane Doe\n 2017-05-23T14:19:18\n Centre for Concurrent Enterprise\n false\n centre for concurrent enterprise\n 093e0a130031850a33fd36ab84b2fce9960ab46c\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Edward Elgar Publishing\n false\n edward elgar publishing\n a5058ea8db5152faeb2b5d65636a84560753d42d\n \n \n _Jane Doe\n 2017-06-28T13:47:03\n _Jane Doe\n 2017-06-28T13:47:03\n Food Safety Music - UC Davis\n true\n food safety music - uc davis\n 7fdec54dc9bbf1971f2f4e0f70d3cb78acc80a35\n \n \n _Jane Doe\n 2017-05-22T08:23:33\n _Jane Doe\n 2017-05-22T08:23:33\n IEEE\n false\n ieee\n 0858ab9b315bf3096f4b1d08e81ae10db51fe30d\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n IGI Global\n false\n igi global\n 858b32ea791ae8e303558af34ba016eee9122442\n \n \n _Jane Doe\n 2017-05-24T11:20:44\n _Jane Doe\n 2017-05-24T11:20:44\n International Organization for Standardization\n false\n international organization for standardization\n 31e5c8b5909a1f655fe9a239a40c5ee33275334a\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jane Doe\n 2017-05-22T12:10:22\n John Wiley & Sons, Inc\n false\n john wiley & sons, inc\n c3e7a333cab75e9e904cd2452e54c6c3c4fc376f\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Nova Science Publishers\n false\n nova science publishers\n 02fc85bc3e14a723701ea858c4cd3af4e204683c\n \n \n _Jane Doe\n 2017-08-09T08:25:50\n _Jane Doe\n 2017-08-09T08:25:50\n SAGE Reference\n true\n sage reference\n f2494ecf35ec0f1572f408d569f13ff1dd3dedf1\n \n \n _Jane Doe\n 2017-05-23T15:00:01\n _Jane Doe\n 2017-05-23T15:00:01\n The New York Times\n false\n the new york times\n c7ff9a01c9eb9bd867ebbd5f7c4494e85e7e4928\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Wageningen Academic Publishers\n false\n wageningen academic publishers\n 7cad595e3198fee2d306845cbe363c7bafe4cf70\n \n \n _Jane Doe\n 2017-05-30T09:41:27\n _Jane Doe\n 2017-05-30T09:41:27\n Warner Home Video\n false\n warner home video\n a5b9fba67479ebc75578d2c49201675ea23d6667\n \n \n \n \n _Jane Doe\n 2017-05-24T11:49:46\n _Jane Doe\n 2017-05-24T11:49:46\n Advances in Business Strategy and Competitive Advantage\n false\n advances in business strategy and competitive advantage\n 153d35ddc42cb931f31f9c506e3c57929bd4f71b\n \n \n _Jane Doe\n 2017-05-24T11:23:30\n _Jane Doe\n 2017-05-24T11:23:30\n Blockchain Unleashed: IBM Blockchain Blog\n false\n blockchain unleashed: ibm blockchain blog\n 3231f074caa8d1a4affe67b33e2b5dab1df6be8c\n \n \n _Jane Doe\n 2017-05-24T11:13:12\n _Jane Doe\n 2017-05-24T11:13:12\n Food Fraud Initiative Blog\n false\n food fraud initiative blog\n 4a1dd44ff916215c298118a5bdaaf6ad3ad6c21b\n \n \n _Jane Doe\n 2017-05-30T10:34:47\n _Jane Doe\n 2017-05-30T10:34:47\n Food Science and Technology\n false\n food science and technology\n 1894af7529cbed74e41cfa5504576881e9deec15\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n NUS Centre for International Law series\n false\n nus centre for international law series\n 8da04eac17e5f4a15503762d362049368c2bc904\n \n \n _Jane Doe\n 2017-05-24T13:02:55\n _Jane Doe\n 2017-05-24T13:02:55\n The Guardian's Science Weekly\n false\n the guardian's science weekly\n 31f5c7ee36f1c800bc5ce3e7c95002fb7dae1bd2\n \n \n _Jane Doe\n 2017-05-30T10:22:55\n _Jane Doe\n 2017-05-30T10:22:55\n Timescast\n false\n timescast\n f23ce7f65118442b09615b6de3322cd3409e1d3d\n \n \n \n \n e438ddc5-5a1f-4c76-9e57-55ee67c48763\n _Jane Doe\n 2017-05-22T08:22:45\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Agbaraji.2012\n 0\n 2012-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 2\n Jane Doe, 2017-5-29\n \n 24\n true\n 24\n 24\n\n\n 31\n true\n 31\n 31\n\n24-31]]>\n 24\n 30\n 0\n JournalArticle\n Agbaraji, Ochulor et al. 2012 – Food and drug counterfeiting\n 0\n OriginalSource\n [\"a8c585d7-1d5f-44d5-99b7-074f086ff45e\"]\n The implications and way-out\n 0\n 0\n Food and drug counterfeiting in the developing nations\n 3\n 2012\n \n \n _Jane Doe\n 2017-08-09T08:25:50\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Albala.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n 9781452243016\n -1\n Los Angeles\n 0\n BookEdited\n Albala (Ed.) 2015 – The SAGE encyclopedia of food\n 0\n The British Library\n [\"fd32aff3-1b6f-44d8-920f-9d1a35414818\"]\n 0\n 0\n The SAGE encyclopedia of food issues\n 2015\n \n \n ace033bb-c74d-4096-a059-1f1975e0bdea\n _Jane Doe\n 2017-05-23T08:30:27\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}{\\f1\\fnil\\fcharset0 Arial;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised. } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised. </p>\n Barlow.2015\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Barlow, Boobis et al 2015 - The role of hazard.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2015-01-01T00:00:00\n 10.1016/j.tifs.2015.10.007\n 0\n 0\n false\n false\n eng\n en\n 2\n \n 176\n true\n 176\n 176\n\n\n 188\n true\n 188\n 188\n\n176-188]]>\n 176\n 30\n 0\n JournalArticle\n Barlow, Boobis et al. 2015 – The role of hazard\n 0\n CrossRef\n [\"9ddce1aa-e7ce-4e1a-ba5f-f9ed10841765\"]\n 0\n 0\n The role of hazard- and risk-based approaches in ensuring food safety\n 46\n 2015\n \n \n c2f95721-b77f-47ae-a48d-1e63c63a3104\n _Jane Doe\n 2017-05-23T14:58:18\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n A senior scientist at Oceana discusses the group’s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 A senior scientist at Oceana discusses the group\\u8217 s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>A senior scientist at Oceana discusses the group’s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.</p>\n 2017-05-23\n Bishop.20130221\n 0\n 2013-02-21T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede&region=caption&pgtype=article\n -1\n 0\n AudioOrVideoDocument\n Bishop, Werschkul et al. 2013-02-21 – Truth in seafood labeling\n 0\n 5:09 minutes\n [\"23dee43c-5d58-42e9-bb1f-8aaee92ea8ba\"]\n 0\n 0\n Truth in seafood labeling\n 2013-02-21\n \n \n 298acc7b-14bf-4120-ab3e-27211e0bcb19\n _Jane Doe\n 2017-05-22T08:12:02\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Braden.2014\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Braden 2014 - Food fraud and adulterated ingredients.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2014-01-01T00:00:00\n 0\n 0\n false\n false\n 9781631177309\n eng\n en\n <c>113</c> \n<in>true</in> \n<os>113</os> \n<ps>113</ps>\n -1\n New York\n 0\n Book\n Braden 2014 – Food fraud and adulterated ingredients\n 0\n Library of Congress\n [\"4e617371-6978-4468-a951-80dc8754017f\"]\n Background, issues, and federal action\n 0\n 0\n Food fraud and adulterated ingredients\n 2014\n \n \n _Jane Doe\n 2017-05-23T15:24:24\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Reinventing himself as Sweeney Todd, a man unjustly sent to prison returns to exact revenge on those who ruined his life, especially the evil Judge Turpin who sent the man to prison. Not only does he seek revenge for the cruel punishment he suffered in prison, but also for what happened to his wife and daughter. When he returns to his home town, he reopens his barber shop, where Mr. Todd becomes the Demon of Fleet Street. Mrs. Lovett is Sweeney's amorous accomplice who creates diabolical meat pies out of the remains of Mr. Todd's victims.\n Burton.2013\n 0\n 2007-12-01\n 2013-01-01T00:00:00\n 0\n 0\n false\n false\n 9786314961534\n eng\n en\n Logan, John, (screenwriter.)\nMacDonald, Laurie, (producer.)\nParkes, Walter F., (producer.)\nZanuck, Richard D., (producer.)\nBurton, Tim, (director.)\nDepp, Johnny, (actor.)\nBonham Carter, Helena, (actor.)\nRickman, Alan, (actor.)\nSpall, Timothy, (actor.)\nBaron Cohen, Sacha, (actor.)\nWisener, Jayne, (actor.)\nBower, Jamie Campbell, (actor.)\nKelly, Laura Michelle, (actor.)\nSanders, Ed, (actor.)\nHead, Anthony Stewart, (actor.)\nBowles, Peter, (actor.)\nSondheim, Stephen, (composer.)\nWheeler, Hugh, (composer.)\nBond, C. G (adapter.)\n -1\n Demon barber of Fleet Street\n Burbank, CA\n 0\n Movie\n Burton 2013 – Sweeney Todd\n 0\n WorldCat\n 116 minutes\n Videodisc\n [\"5c5ba2e8-a506-41df-8c00-46c5ee9107d8\"]\n The demon barber of Fleet Street\n 0\n 0\n Sweeney Todd\n 2013\n \n \n _Jane Doe\n 2017-05-22T12:08:33\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n CheMan.2010\n 0\n 2010-08-26\n 2010-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n US20100216136 A1\n https://www.google.com/patents/US20100216136\n -1\n 0\n Patent\n Che Man, Mustafa et al. 2010 – Method for identifying a pork\n 0\n Google Patents\n Universiti Putra Malaysia\n US 12/594,164\n 2008-06-26\n [\"202cb4c4-b982-4cf0-b42c-a0575ab98a63\"]\n 0\n 0\n Method for identifying a pork content in a food\n Pork-specific PCR assay is performed for Halal authentication, by detecting porcine DNA in food products.\n 2010\n \n \n 15abcda1-f600-441e-9138-95b46cc0f12f\n _Jane Doe\n 2017-05-22T08:05:15\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Dai.2013\n 0\n 2013-01-01T00:00:00\n 10.1136/bmj.f3385\n 0\n 0\n false\n false\n eng\n en\n \n Omit\n f3385\n f3385\n\nf3385]]>\n 2147483647\n 100\n 23716434\n 0\n JournalArticle\n Dai, Jiang 2013 – Fake meat scandals add\n 0\n PubMed\n [\"b97192f6-db5b-4949-9e97-e6cd9ae8b1e0\"]\n 0\n 0\n Fake meat scandals add to Chinese food fears\n Letter\n 346\n 2013\n \n \n _Jane Doe\n 2017-05-22T11:17:26\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n In anticipation of Food Fraud 2017, New Food speaks exclusively to Eoghan Daly of Crowe Clark Whitehill about tackling food fraud in the 21st Century.\n 2017-05-22\n Daly.20170411\n 0\n 2017-04-11\n 2017-04-11T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/\n -1\n 0\n InterviewMaterial\n Manuell 2017-04-11 – Fighting food fraud in 2017\n 0\n [\"97fcd513-dd0c-4c0d-9235-d0dcf2e7a8f9\"]\n 0\n 0\n Fighting food fraud in 2017\n \n \n _Jane Doe\n 2017-05-23T10:46:02\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Dries.Inpress\n 0\n 0\n 0\n false\n false\n 9789086863013\n eng\n en\n -1\n Wageningen\n 0\n BookEdited\n Dries, Karantininis et al. (Ed.) [In press] – It’s a jungle out there\n 0\n WorldCat\n [\"23681484-6956-4491-8af0-dced9966fb67\"]\n 0\n 0\n It’s a jungle out there - the strange animals of economic organization in agri-food value chains\n [In press]\n \n \n _Jane Doe\n 2017-05-22T11:59:43\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-22\n EuropeanCommissionFoodFraudNetwork.20130526\n 0\n 2013-05-26\n 2013-05-26T00:00:00\n 0\n 1\n Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.</p>\n false\n false\n eng\n en\n https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf\n <c>3</c> \n<in>true</in> \n<os>3</os> \n<ps>3</ps>\n -1\n 1\n UnpublishedWork\n European Commission Food Fraud Network 2013-05-26 – Food Fraud Network activity report\n 0\n [\"ee041024-d6d5-432d-924e-c90bacc2ed53\"]\n 0\n 0\n Food Fraud Network activity report 2015\n \n \n _Jane Doe\n 2017-05-23T10:25:46\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.\n 2017-05-23\n Europol.20170425\n 0\n 2017-04-25\n 2017-04-25T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud\n -1\n The Hague\n 0\n PressRelease\n Europol 2017-04-25 – EUR 230 million worth\n 0\n https://www.europol.europa.eu/contact-us/request-media\n [\"d4a8e294-f9f7-4f79-8768-afd6a3c8cf2a\"]\n 0\n 0\n EUR 230 million worth of fake food and beverages seized in global OPSON operation targeting food fraud\n \n \n _Jane Doe\n 2017-05-22T11:02:49\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Evershed.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Evershed, Temple 2016 - Sorting the beef.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 1522614370\n eng\n en\n -1\n 0\n AudioBook\n Evershed, Temple 2016 – Sorting the beef\n 0\n WorldCat\n 9:12 hours\n [\"da3db725-74ab-42d0-9a90-8a6f0fdff619\"]\n The science of food fraud forensics\n 0\n 0\n Sorting the beef from the bull\n 2016\n \n \n _Jane Doe\n 2017-05-23T15:28:57\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n The food supply system is vulnerable to various types of contamination and adulteration. This research focuses on economically motivated adulteration (often called \"food fraud\"). Economically motivated adulteration (EMA) refers to the knowingly selling a food product that is not up to standards in order to gain economic advantage. There is a long history of EMA in a wide variety of food products. The food safety paradigm is not sufficient for food defense, or for prevention and deterrence of EMA. The goal of this research was to develop methods to improve capabilities for preventing and detecting EMA incidents. First, the food ingredient monographs in the United States Pharmacopeial (USP) Convention Food Chemicals Codex (FCC) were evaluated for susceptibility to EMA. These evaluations can be used to help target the most susceptible ingredients for monograph modernization within USP, and for inspection and laboratory testing resources by regulatory agencies. Second, economic and production data for dairy products in China leading up to the melamine adulteration event was analyzed to evaluate the utility of this data for alerting to the potential for EMA in a food commodity. This analysis shed insight on variables that may be useful for tracking the production of global commodities for early indications of EMA. Finally, a surveillance technique for trade data was evaluated using melamine adulteration of wheat gluten as a case study. This biosurveillance-like methodology can be applied to food import data to identify supply chain shifts that could indicate changes in the market for food products and a heightened risk of EMA. Regulatory agencies have an enormous burden of responsibility for regulating the food supply for both domestically-produced and imported food products. Given the constrained resources of these agencies, they need improved methods for targeting those resources towards the riskiest food products. These preliminary efforts to shed light on EMA vulnerabilities and potential mitigation efforts can contribute to efforts in that area. An integrated, systems-based approach to food protection that encompasses both food safety and food defense is imperative for ensuring the integrity of our food supply.\n 2017-05-23\n Everstine.May2013\n 0\n May 2013\n 2013-05-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://hdl.handle.net/11299/153189\n -1\n Minneapolis, Minnesota\n 0\n Thesis\n Everstine May 2013 – Economically motivated adulteration\n 0\n conservancy.umn.edu\n [\"df9d1649-1819-476d-bdb3-55003909d8ef\"]\n Implications for food protection and alternate approaches to detection\n 0\n 0\n Economically motivated adulteration\n Dissertation\n \n \n 334763c8-e50b-45c5-9786-3506b14a6ac1\n _Jane Doe\n 2017-05-22T08:14:06\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n EwingChow.2016\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 9781785361890\n eng\n en\n -1\n Cheltenham\n 0\n BookEdited\n Ewing-Chow, Slade (Ed.) 2016 – International trade and food security\n 0\n The British Library\n [\"f544c2d2-f01a-4300-b8a2-08a437c59bf5\"]\n Exploring collective food security in Asia\n 0\n 0\n International trade and food security\n 2016\n \n \n _Jane Doe\n 2017-05-23T07:12:19\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-23\n FoodandDrugAdministration.20120827\n 0\n 2012-08-27\n 2012-08-27T00:00:00\n 0\n 1\n Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.</p>\n false\n false\n eng\n en\n https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf\n <c>30</c> \n<in>true</in> \n<os>30</os> \n<ps>30</ps>\n -1\n Silver Spring, Maryland\n 3\n UnpublishedWork\n Food and Drug Administration 2012-08-27 – Vulnerability assessments of food systems\n 0\n [\"2c7b2a79-aba7-40ac-ae66-453e9e25424f\"]\n Final summary report, June 2009 – February 2012\n 0\n 1\n Vulnerability Assessments of Food Systems \n Table of Contents \n I. Executive Summary \n II. Background \n III. Method Overview \n IV. Assessment Results \n Commonalities of Critical Process Nodes \n Commonalities of Mitigation Strategies a \n Commonalities of Identified Research Gap \n Commonalities of Identified Threat Indic \n V. CARVER + Shock Vulnerability Assessm \n VI. Overall Assessment Observations \n Assessment Preparation and Conduct \n Selection of Threat Agent for CARVER + S \n Participant Perspective \n International Assessments and Food Defen \n Other Observations \n VII. Conclusion\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Vulnerability Assessments of Food Systems}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql \n\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Table of Contents }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 I. Executive Summary }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 II. Background }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 III. Method Overview } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 IV. Assessment Results }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1 \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Critical Process Nodes }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Mitigation Strategies a}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Identified Research Gap} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Identified Threat Indic}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 V. CARVER + Shock Vulnerability Assessm}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 VI. Overall Assessment Observations }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Assessment Preparation and Conduct } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 Selection of Threat Agent for CARVER + S}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Participant Perspective }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 International Assessments and Food Defen}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Other Observations } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 VII. Conclusion}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Vulnerability Assessments of Food Systems</p><p> Table of Contents </p><p> I. Executive Summary </p><p> II. Background </p><p> III. Method Overview </p><p> IV. Assessment Results </p><p> Commonalities of Critical Process Nodes </p><p> Commonalities of Mitigation Strategies a</p><p> Commonalities of Identified Research Gap</p><p> Commonalities of Identified Threat Indic</p><p> V. CARVER + Shock Vulnerability Assessm</p><p> VI. Overall Assessment Observations </p><p> Assessment Preparation and Conduct </p><p> Selection of Threat Agent for CARVER + S</p><p> Participant Perspective </p><p> International Assessments and Food Defen</p><p> Other Observations </p><p> VII. Conclusion</p>\n Vulnerability assessments of food systems\n \n \n dfbd6cd9-7faa-46e7-9534-6b88fdc65d74\n _Jane Doe\n 2017-05-22T08:08:45\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n The Food and Drug Administration (FDA or we) is issuing this final rule to require domestic and foreign food facilities that are required to register under the Federal Food, Drug, and Cosmetic Act (the FD&C Act) to address hazards that may be introduced with the intention to cause wide scale public health harm. These food facilities are required to conduct a vulnerability assessment to identify significant vulnerabilities and actionable process steps and implement mitigation strategies to significantly minimize or prevent significant vulnerabilities identified at actionable process steps in a food operation. FDA is issuing these requirements as part of our implementation of the FDA Food Safety Modernization Act (FSMA).\n 2017-05-30\n FoodandDrugAdministration.20160527\n 0\n 2016-05-27\n 2016-05-27T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 103\n https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf\n \n 34165\n true\n 34165\n 34165\n\n\n 34223\n true\n 34223\n 34223\n\n34165-223]]>\n 34165\n 30\n 27236872\n 0\n StatuteOrRegulation\n Food and Drug Administration 2016-05-27 – Mitigation strategies to protect food\n 0\n PubMed\n [\"79436db7-2da2-459a-b0fd-c353bbda401c\"]\n 0\n 0\n Mitigation strategies to protect food against intentional adulteration. Final rule\n 81\n 2016\n \n \n f318673c-c4f2-4cf9-b62d-e32d7ee99a71\n _Jane Doe\n 2017-05-22T07:54:02\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n The food industry has been abuzz lately about the potential of blockchain to solve the problem of end-to-end traceability in the supply chain.\n 2017-05-22\n Garver.20170307\n 0\n 2017-03-07\n 2017-03-07T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/\n -1\n 0\n NewspaperArticle\n Garver 2017-03-07 – What is blockchain and how\n 0\n [\"f578087a-7148-40a3-afd2-9d760c68c09d\"]\n 0\n 0\n What is blockchain and how will it impact the food industry?\n \n \n _Jane Doe\n 2017-05-23T11:34:32\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-23\n GlobalFoodSafetyInitiative.July2014\n 0\n July 2014\n 2014-07-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf\n <c>4</c> \n<in>true</in> \n<os>4</os> \n<ps>4</ps>\n -1\n 0\n UnpublishedWork\n Global Food Safety Initiative July 2014 – GFSI position on mitigating the public\n 0\n [\"cd664384-0a2c-40e3-9468-f892fc8b71d4\"]\n 0\n 0\n GFSI position on mitigating the public health risk of food fraud\n \n \n e79c323b-c950-4415-9046-4d5c1c7944e3\n _Jane Doe\n 2017-05-22T08:07:14\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n This review provides current information on the analytical methods used to identify food adulteration in the six most adulterated food categories: animal origin and seafood, oils and fats, beverages, spices and sweet foods (e.g. honey), grain-based food, and others (organic food and dietary supplements). The analytical techniques, both conventional and emerging, used to identify adulteration in these six food categories involve sensory, physicochemical, DNA-based, chromatographic, and spectroscopic methods, and have been combined with chemometrics, making these techniques more convenient and effective for the analysis of a broad variety of food products. Despite recent advances, a need remains for suitably sensitive and widely applicable methodologies that will encompass all the various aspects of food adulteration.\n Hong.Inpress\n 0\n 2017-04-10\n 10.1002/jsfa.8364\n 0\n 1\n Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10 \n\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.</p>\n false\n false\n eng\n en\n -1\n 5\n JournalArticle\n Hong, Lee et al. [In press] – Modern analytical methods\n 0\n PubMed\n [\"1ab907ad-d95e-44cb-a59e-77264735b7d6\"]\n 0\n 0\n Modern analytical methods for the detection of food fraud and adulteration by food category\n [In press]\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.</p>\n 2017-05-23\n InternationalBusinessMachinesCorporation.20161019\n 0\n 2016-10-19\n 2016-10-19T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www-03.ibm.com/press/us/en/pressrelease/50816.wss\n -1\n 0\n PressRelease\n International Business Machines Corporation 2016-10-19 – Walmart, IBM and Tsinghua University\n 0\n hslocum@us.ibm.com\n [\"0616600e-57f9-4033-866b-8da1e0f43ff1\"]\n 0\n 0\n Walmart, IBM and Tsinghua University explore the use of blockchain to help bring safer food to dinner tables across China\n \n \n _Jane Doe\n 2017-05-22T12:15:04\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-22\n InternationalOrganizationforStandardization.200509\n 0\n 2005-09\n 2005-09-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n ISO 22000:2005\n https://www.iso.org/standard/35466.html\n -1\n Geneva, Switzerland\n 0\n Standard\n International Organization for Standardization 2005-09 – Food safety management systems\n 0\n [\"2f4f57cd-d30d-4f50-8a5c-469fa5abc004\"]\n 0\n 0\n Food safety management systems – Requirements for any organization in the food chain\n 67.020\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Jen.2017\n 0\n 2017-01-01T00:00:00\n 0\n 0\n false\n false\n 1119237963\n eng\n en\n <c>696</c> \n<in>true</in> \n<os>696</os> \n<ps>696</ps>\n -1\n Chichester, West Sussex; Hoboken, New Jersey\n 0\n BookEdited\n Jen, Chen (Ed.) 2017 – Food safety in China\n 0\n WorldCat\n [\"b27c82ac-4a36-4780-b975-caf29b75dda3\"]\n Science, technology, management and regulation\n 0\n 0\n Food safety in China\n 2017\n \n \n 4bc2cd0d-43cf-465e-a518-8a395784f486\n _Jane Doe\n 2017-05-22T08:24:18\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Kelepouris.2007\n 0\n 2007-01-01T00:00:00\n 10.1108/02635570710723804\n 0\n 0\n false\n false\n eng\n en\n 2\n \n 183\n true\n 183\n 183\n\n\n 200\n true\n 200\n 200\n\n183-200]]>\n 183\n 30\n 0\n JournalArticle\n Kelepouris, Pramatari et al. 2007 – RFID-enabled traceability in the food\n 0\n EndNote Tagged Import Format\n [\"e3991426-b94d-4d2c-b83b-1217780f05cc\"]\n 0\n 0\n RFID-enabled traceability in the food supply chain\n 107\n 2007\n \n \n 24593c6d-4296-4052-aae0-3e87b48503bc\n _Jane Doe\n 2017-05-23T15:05:04\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n With the Europewide scandal over the contamination of meat products, from beefburgers to lasagne, showing no sign of abating, study the issue in depth and learn all you need to know about how it came to this with our essential guide\n 2017-05-23\n Lawrence.20130215\n 0\n 2013-02-15\n 2013-02-15T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide\n -1\n 0\n NewspaperArticle\n Lawrence 2013-02-15 – Horsemeat scandal\n 0\n [\"53c63961-4e08-4334-9c6b-0ef1ec62adab\"]\n The essential guide\n 0\n 0\n Horsemeat scandal\n \n \n 81f9afba-db76-4ce6-8482-46e8810f4aea\n _Jane Doe\n 2017-05-24T12:28:24\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Manning.2016b\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 1\n -1\n 0\n SpecialIssue\n Manning (Ed.) 2016 – Food and supply chain integrity\n 0\n [\"2c00daa5-5641-401d-869d-c9cdda61773f\"]\n 0\n 0\n Food and supply chain integrity\n 119\n 2016\n \n \n 7f2b5e6b-dfc0-46e5-b94b-2c3e21cb1ebc\n _Jane Doe\n 2017-05-22T08:06:12\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. Successful models of food crime are dependent on how well the crime has been executed and at what point, or even if, detection actually occurs. The aim of this paper is to undertake a literature review and critique the often contradictory definitions that can be found in the literature in order to compare and contrast existing food crime risk assessment tools and their application. Food safety, food defense, and food fraud risk assessments consider different criteria in order to determine the degree of situational risk for each criteria and the measures that need to be implemented to mitigate that risk. Further research is required to support the development of global countermeasures, that are of value in reducing overall risk even when the potential hazards may be largely unknown, and specific countermeasures that can act against unique risks.\n Manning.2016c\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food safety.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 10.1111/1750-3841.13256\n 0\n 1\n A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}{\\f1\\fnil\\fcharset0 Arial;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10 \n\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned. }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned. </p>\n false\n false\n eng\n en\n 4\n \n Other\n Omit\n R823-R834\n R823-R834\n\nR823-R834]]>\n 2147483647\n 100\n 26934423\n 3\n JournalArticle\n Manning, Soon 2016 – Food safety\n 0\n PubMed\n [\"1a3b109f-d918-4f92-8f02-1102f3f02776\"]\n A fast evolving literature\n 0\n 0\n Food safety, food fraud, and food defense\n 81\n 2016\n \n \n d47914ed-11a6-4b74-a863-8dd7f6e70091\n _Jane Doe\n 2017-05-22T08:04:33\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n BACKGROUND: Food regulatory bodies play an important role in public health, and in reducing the costs of food borne illness that are absorbed by both industry and government. Regulation in the food industry involves a relationship between regulators and members of the industry, and it is imperative that these relationships are built on trust. Research has shown in a variety of contexts that businesses find the most success when there are high levels of trust between them and their key stakeholders. An evidence-based understanding of the barriers to communication and trust is imperative if we are to put forward recommendations for facilitating the (re)building of trusting and communicative relationships. METHODS: We present data from 72 interviews with regulators and industry representatives regarding their trust in and communication with one another. Interviews were conducted in the UK, New Zealand, and Australia in 2013. RESULTS: Data identify a variety of factors that shape the dynamic and complex relationships between regulators and industry, as well as barriers to communication and trust between the two parties. Novel in our approach is our emphasis on identifying solutions to these barriers from the voices of industry and regulators. CONCLUSIONS: We provide recommendations (e.g., development of industry advisory boards) to facilitate the (re)building of trusting and communicative relationships between the two parties.\n Meyer.2017\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Meyer, Wilson et al 2017 - In the interest of food.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2017-01-01T00:00:00\n 10.1186/s12889-017-4118-x\n 0\n 0\n false\n false\n eng\n en\n 189\n \n 1\n true\n 1\n 1\n\n\n 13\n true\n 13\n 13\n\n1-13]]>\n 1\n 30\n 28193265\n 0\n JournalArticle\n Meyer, Wilson et al. 2017 – In the interest of food\n 0\n PubMed\n [\"79627d7c-a838-47c9-9184-fde7757d8f95\"]\n A qualitative study investigating communication and trust between food regulators and food industry in the UK, Australia and New Zealand\n 0\n 0\n In the interest of food safety\n 17\n 2017\n \n \n bf222998-c7a3-47fb-bc1c-b191e74f8a50\n _Jane Doe\n 2017-05-22T07:56:38\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n Fake soy sauce, fake rice, fake eggs – those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Fake soy sauce, fake rice, fake eggs \\u8211 those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Fake soy sauce, fake rice, fake eggs – those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.</p>\n 2017-05-22\n Millward.20170324\n 0\n 2017-03-24\n 2017-03-24T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.techinasia.com/alibaba-fake-food-detection-blockchain\n -1\n 0\n NewspaperArticle\n Millward 2017-03-24 – Alibaba to use blockchain\n 0\n [\"208ddbaf-3caf-4f35-8591-17beb2fd739a\"]\n 0\n 0\n Alibaba to use blockchain to fight China’s fake food\n \n \n 506c8e72-ff94-480e-9267-3036d694b546\n _Jane Doe\n 2017-05-24T12:17:05\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Milk adulteration is a current fraudulent practice to mask the quality parameters (e.g. protein and fat content) and increase the product shelf life. Milk adulteration includes addition of toxic substances, such as formaldehyde, hydrogen peroxide, hypochlorite, dichromate, salicylic acid, melamine, and urea. In order to assure the food safety and avoid health risks to consumers, novel analytical procedures have been proposed for detection of these adulterants. The innovations encompass sample pretreatment and improved detection and data processing, including chemometric tools. This review focuses on critical evaluation of analytical approaches for assay of milk adulteration, with emphasis on applications published after 2010. Alternatives for fast, environmentally friendly and in-situ detection of milk adulterants are highlighted.\n Nascimento.2017\n 0\n 2017-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 1232\n true\n 1232\n 1232\n\n\n 1244\n true\n 1244\n 1244\n\n1232-1244]]>\n 1232\n 30\n 27979084\n 0\n JournalArticle\n Nascimento, Santos et al. 2017 – Recent advances on determination\n 0\n PubMed\n [\"04f160d3-f434-4e4c-9835-730086f32fab\"]\n 0\n 0\n Recent advances on determination of milk adulterants\n 221\n 2017\n \n \n _Jane Doe\n 2017-05-22T12:02:39\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-22\n NestecLtd..2016\n 0\n 2016\n 2016-01-01T00:00:00\n 0\n 1\n An example of an industry-created guide for preventing food fraud.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 An example of an industry-created guide for preventing food fraud. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>An example of an industry-created guide for preventing food fraud. </p>\n false\n false\n eng\n en\n http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf\n <c>13</c> \n<in>true</in> \n<os>13</os> \n<ps>13</ps>\n -1\n Vevey, Switzerland\n 0\n UnpublishedWork\n Nestec Ltd. 2016 – Food Fraud\n 0\n [\"6cabb958-863a-4430-a9cb-5cbd22e8f2ca\"]\n Economically-motivated adulteration\n 0\n 0\n Food Fraud\n \n \n _Jane Doe\n 2017-05-22T12:07:01\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Seafood is a global commodity traded all over the world, following a long, complex and non-transparent supply chain. It also serves as an important source of protein for millions of people every day. However, seafood fraud and species substitutions occur regularly, cheating consumers out of what they ordered and putting public health and the oceans at risk. In addition, seafood fraud allows illegally caught fish to be laundered into the legal seafood trade.\n 2017-05-22\n Oceana.2016\n 0\n 2016-01-01T00:00:00\n 0\n 1\n This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}{\\f1\\fnil\\fcharset0 Arial;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.</p>\n false\n false\n eng\n en\n https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU\n -1\n 3\n Map\n Oceana 2016 – Global seafood fraud\n 0\n [\"1838e3cb-d17d-46fa-a49f-337949a9a637\"]\n 0\n 0\n Global seafood fraud\n Interactive map\n 2016\n \n \n a9fef79e-b3b7-4040-8ce2-5445c3b89297\n _Jane Doe\n 2017-05-23T06:40:56\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Consumers' interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester-FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry-ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry-PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.\n Oliveira.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 3\n \n 359\n true\n 359\n 359\n\n\n 375\n true\n 375\n 375\n\n359-375]]>\n 359\n 30\n PMC5224536\n 28231211\n 0\n JournalArticle\n Oliveira, Alewijn et al. 2015 – Compositional signatures of conventional\n 0\n PubMed\n [\"e9a69d09-d2e9-4ede-a994-58217467226f\"]\n 0\n 0\n Compositional signatures of conventional, free range, and organic pork meat using fingerprint techniques\n 4\n 2015\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n [Description from publisher - J.S.] \nYou've seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn't. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we're eating is not what we're really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It's a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 [Description from publisher - J.S.]}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 You've seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn't. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we're eating is not what we're really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It's a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>[Description from publisher - J.S.]</p><p>You&#39;ve seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn&#39;t. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we&#39;re eating is not what we&#39;re really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It&#39;s a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters</p>\n Olmsted.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Olmsted 2016 - Real food fake food.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 9781616204211\n eng\n en\n <c>318</c> \n<in>true</in> \n<os>318</os> \n<ps>318</ps>\n -1\n Chapel Hill, North Carolina\n 0\n Book\n Olmsted 2016 – Real food fake food\n 0\n GBV Gemeinsamer Bibliotheksverbund\n [\"504afdaa-2da2-46e7-b4aa-1d5aa96d3be5\"]\n Why you don't know what you're eating & what you can do about it\n 0\n 1\n Real food, perfected : a day in the life of Parma \nWhat is fake food? \nFishy fish \nSpoiled oils : olive and \"truffle\" \nWhat's in a name? : real foods come from real places \nQ:Where's the Kobe beef? A:not on your plate \nChampagne and scotch : the sincerest form of flattery \nCheesy cheeses \nFine wines and not-so-fine wines \nThe other red (and white) meat? \nFakes, fakes, and more fakes : what else is there?\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0 \n;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Real food, perfected : a day in the life of Parma}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 What is fake food?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Fishy fish}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Spoiled oils : olive and \"truffle\"}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 What's in a name? : real foods come from real places} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Q:Where's the Kobe beef? A:not on your plate}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1 \n\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Champagne and scotch : the sincerest form of flattery}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Cheesy cheeses}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Fine wines and not-so-fine wines}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 The other red (and white) meat?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Fakes, fakes, and more fakes : what else is there?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Real food, perfected : a day in the life of Parma</p><p>What is fake food?</p><p>Fishy fish</p><p>Spoiled oils : olive and &quot;truffle&quot;</p><p>What&#39;s in a name? : real foods come from real places</p><p>Q:Where&#39;s the Kobe beef? A:not on your plate</p><p>Champagne and scotch : the sincerest form of flattery</p><p>Cheesy cheeses</p><p>Fine wines and not-so-fine wines</p><p>The other red (and white) meat?</p><p>Fakes, fakes, and more fakes : what else is there?</p>\n Real food fake food\n 2016\n \n \n 21d7a947-9a3c-4f93-ad14-8ef4c050bfe9\n _Jane Doe\n 2017-05-22T08:24:49\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Opara.2003\n 0\n 2003-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 101\n true\n 101\n 101\n\n\n 106\n true\n 106\n 106\n\n101-106]]>\n 101\n 30\n 0\n JournalArticle\n Opara 2003 – Traceability in agriculture and food\n 0\n EndNote Tagged Import Format\n [\"5c6cde77-701b-4cc5-a446-e247ad3dc371\"]\n A review of basic concepts, technological implications, and future prospects\n 0\n 0\n Traceability in agriculture and food supply chain\n 1\n 2003\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-23\n Pawar.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n 9780853583080\n eng\n en\n http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf\n -1\n ISL 2015\n Nottingham\n 0\n ConferenceProceedings\n Pawar, Rogers et al. (Ed.) 2015 – Reflections on supply chain research\n 0\n WorldCat\n Bologna, Italy\n July 5th - 8th, 2015\n [\"e1e0c888-30c2-47a4-a2f9-05c597655820\"]\n The proceedings of 20th International Symposium on Logistics (ISL 2015)\n 0\n 0\n Reflections on supply chain research and practice\n 2015\n \n \n ae89202c-4fd6-431a-89c6-03922e44af4d\n _Jane Doe\n 2017-05-23T09:54:08\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Leveraging blockchain for food supply chain tracking and authentication, is critical to finding and helping to address sources of contamination worldwide.\n 2017-05-23\n Ramamurthy.20161116\n 0\n 2016-11-16T00:00:00\n 0\n 1\n This blog article discusses IBM, Walmart, and Tsinghua University's pilot program to apply blockchain technology to tracing the food supply chain.\n {\\rtf1\\ansi \n\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 This blog article discusses IBM, Walmart, and Tsinghua University's pilot program to apply blockchain technology to tracing the food supply chain. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>This blog article discusses IBM, Walmart, and Tsinghua University&#39;s pilot program to apply blockchain technology to tracing the food supply chain. </p>\n false\n false\n eng\n en\n https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/\n -1\n 0\n InternetDocument\n Ramamurthy 2016-11-16 – Leveraging blockchain to improve food\n 0\n [\"423a99b9-dd6a-489d-b496-535526d374ef\"]\n 0\n 0\n Leveraging blockchain to improve food supply chain traceability\n Blog post\n 2016-11-16\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Food Fraud provides an overview of the current state on the topic to help readers understand which products are being impacted, how pervasive food fraud is, and what laws are in effect across the developed world. As international food trade increases, food processors, distributors, and consumers are purchasing more and more food from foreign countries that, in many cases, have inadequate oversight or control over what is coming into our supermarkets, restaurants, and refrigerators. This book is an essential quick reference that will familiarize readers with the latest issues surrounding the food industry.\n Ryan.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Ryan 2016 - Food fraud.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 0128033932\n eng\n en\n <c>92</c> \n<os>92 pages</os> \n<ps>92 pages</ps>\n -1\n Amsterdam; Boston\n 0\n Book\n Ryan 2016 – Food fraud\n 0\n Library of Congress\n [\"78818239-2d41-44da-9d70-7b402dc63d44\"]\n 0\n 1\n Table of Contents \n Introduction \n Chapter 1. Background \n Abstract \n 1.1 Risk \n 1.2 Prevention Versus Corrective Action \n Chapter 2. Some Food Fraud Laws \n Abstract \n 2.1 Defining Food Fraud in the European Union \n 2.2 Defining Food Fraud in the United States \n 2.3 Executive Responsibilities and Prosecution: The Park Doctrine \n 2.4 FDA Ties with Customs and Border Protection and Homeland Security \n 2.5 Introduction of an Adulterated Food into Interstate Commerce \n 2.6 The Potential for Terrorism \n Chapter 3. Food Fraud Through the Supply Chain \n Abstract \n 3.1 Labeling \n 3.2 Blends: Walking on the Edge \n 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates \n 3.4 Supply Chain Food Fraud Examples \n Chapter 4. Unprotected Customers \n Abstract \n 4.1 Detection Testing and the Authentication Dilemma \n 4.2 Whistle Blowers \n 4.3 What are Consumers Being Told? \n Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems \n Abstract \n 5.1 Item Level Traceability \n 5.2 Barcode: Case Level Traceability \n 5.3 Pallet Level Traceability and Temperature Monitoring \n 5.4 Pallet and Container Level Traceability and Temperature Monitoring \n 5.5 Container Level Traceability and Temperature Control \n 5.6 Recall and the Chain of Custody \n Chapter 6. Recommendations \n Abstract \n 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement \n 6.2 Take Responsibility \n 6.3 Get Training and Get Involved \n 6.4 Establish Preventive Purchasing Practices \n 6.5 Know Your Supply Chain \n 6.6 Establish a System of Distributed Authority \n 6.7 Invest in Prevention by Establishing a System of Continuous Improvement \n 6.8 Hire Honest People \n 6.9 Proactively Cooperate with the Competition \n 6.10 Help Prosecute and Publicize \n Chapter 7. Available Resources \n Abstract \n 7.1 Some International Experts \n 7.2 Better Seafood Board (BSB) \n 7.3 FDA DNA Seafood Labeling Training \n 7.4 FDA Fish Substitutes \n 7.5 The University of Michigan Food Fraud Initiative \n 7.6 The US Pharmacopeial Food Fraud Database \n 7.7 Food Fraudster \n 7.8 UK Food Standards Agency “Reporting food fraud” \n 7.9 European Commission Official Controls and Enforcement \n 7.10 National Center for Food Protection and Defense: Food Fraud Resources \n 7.11 National Science Foundation (NSF) \n 7.12 Rapid Alert System for Food and Feed (RASFF) \n Chapter 8. Summary: Confusion Reigns\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;} \n{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Table of Contents}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Introduction}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 1. Background}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 1.1 Risk}{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cf1 1.2 Prevention Versus Corrective Action}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 2. Some Food Fraud Laws}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.1 Defining Food Fraud in the European Union}{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cf1 2.2 Defining Food Fraud in the United States}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1 \n\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.3 Executive Responsibilities and Prosecution: The Park Doctrine}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.4 FDA Ties with Customs and Border Protection and Homeland Security} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.5 Introduction of an Adulterated Food into Interstate Commerce}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.6 The Potential for Terrorism}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 3. Food Fraud Through the Supply Chain}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.1 Labeling}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.2 Blends: Walking on the Edge}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.4 Supply Chain Food Fraud Examples} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 4. Unprotected Customers}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 4.1 Detection Testing and the Authentication Dilemma}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 4.2 Whistle Blowers}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 4.3 What are Consumers Being Told?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1 \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.1 Item Level Traceability} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.2 Barcode: Case Level Traceability}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1 \n\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.3 Pallet Level Traceability and Temperature Monitoring}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.4 Pallet and Container Level Traceability and Temperature Monitoring} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.5 Container Level Traceability and Temperature Control}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql \n\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.6 Recall and the Chain of Custody}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 6. Recommendations}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cf1 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.2 Take Responsibility}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.3 Get Training and Get Involved}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 6.4 Establish Preventive Purchasing Practices}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.5 Know Your Supply Chain}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.6 Establish a System of Distributed Authority}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.7 Invest in Prevention by Establishing a System of Continuous Improvement} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.8 Hire Honest People}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.9 Proactively Cooperate with the Competition}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.10 Help Prosecute and Publicize}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 7. Available Resources} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.1 Some International Experts}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.2 Better Seafood Board (BSB)}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.3 FDA DNA Seafood Labeling Training}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 7.4 FDA Fish Substitutes}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.5 The University of Michigan Food Fraud Initiative}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.6 The US Pharmacopeial Food Fraud Database}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.7 Food Fraudster} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.8 UK Food Standards Agency \\u8220 Reporting food fraud\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.9 European Commission Official Controls and Enforcement}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.10 National Center for Food Protection and Defense: Food Fraud Resources} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.11 National Science Foundation (NSF)}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.12 Rapid Alert System for Food and Feed (RASFF)}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 8. Summary: Confusion Reigns}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Table of Contents</p><p> Introduction</p><p> Chapter 1. Background</p><p> Abstract</p><p> 1.1 Risk</p><p> 1.2 Prevention Versus Corrective Action</p><p> Chapter 2. Some Food Fraud Laws</p><p> Abstract</p><p> 2.1 Defining Food Fraud in the European Union</p><p> 2.2 Defining Food Fraud in the United States</p><p> 2.3 Executive Responsibilities and Prosecution: The Park Doctrine</p><p> 2.4 FDA Ties with Customs and Border Protection and Homeland Security</p><p> 2.5 Introduction of an Adulterated Food into Interstate Commerce</p><p> 2.6 The Potential for Terrorism</p><p> Chapter 3. Food Fraud Through the Supply Chain</p><p> Abstract</p><p> 3.1 Labeling</p><p> 3.2 Blends: Walking on the Edge</p><p> 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates</p><p> 3.4 Supply Chain Food Fraud Examples</p><p> Chapter 4. Unprotected Customers</p><p> Abstract</p><p> 4.1 Detection Testing and the Authentication Dilemma</p><p> 4.2 Whistle Blowers</p><p> 4.3 What are Consumers Being Told?</p><p> Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems</p><p> Abstract</p><p> 5.1 Item Level Traceability</p><p> 5.2 Barcode: Case Level Traceability</p><p> 5.3 Pallet Level Traceability and Temperature Monitoring</p><p> 5.4 Pallet and Container Level Traceability and Temperature Monitoring</p><p> 5.5 Container Level Traceability and Temperature Control</p><p> 5.6 Recall and the Chain of Custody</p><p> Chapter 6. Recommendations</p><p> Abstract</p><p> 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement</p><p> 6.2 Take Responsibility</p><p> 6.3 Get Training and Get Involved</p><p> 6.4 Establish Preventive Purchasing Practices</p><p> 6.5 Know Your Supply Chain</p><p> 6.6 Establish a System of Distributed Authority</p><p> 6.7 Invest in Prevention by Establishing a System of Continuous Improvement</p><p> 6.8 Hire Honest People</p><p> 6.9 Proactively Cooperate with the Competition</p><p> 6.10 Help Prosecute and Publicize</p><p> Chapter 7. Available Resources</p><p> Abstract</p><p> 7.1 Some International Experts</p><p> 7.2 Better Seafood Board (BSB)</p><p> 7.3 FDA DNA Seafood Labeling Training</p><p> 7.4 FDA Fish Substitutes</p><p> 7.5 The University of Michigan Food Fraud Initiative</p><p> 7.6 The US Pharmacopeial Food Fraud Database</p><p> 7.7 Food Fraudster</p><p> 7.8 UK Food Standards Agency “Reporting food fraud”</p><p> 7.9 European Commission Official Controls and Enforcement</p><p> 7.10 National Center for Food Protection and Defense: Food Fraud Resources</p><p> 7.11 National Science Foundation (NSF)</p><p> 7.12 Rapid Alert System for Food and Feed (RASFF)</p><p> Chapter 8. Summary: Confusion Reigns</p>\n Food fraud\n 2016\n \n \n ffa21229-056a-4d12-87ed-9c9b99dd4517\n _Jane Doe\n 2017-05-22T11:16:01\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n From fake eggs to horsemeat burgers, food fraud is common, but hard to detect. How can we be sure that what we’re eating is the real thing?\n 2017-05-22\n Sample.20160226\n 0\n 2016-02-26T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast\n -1\n 0\n AudioOrVideoDocument\n Sample, Chambers 2016-02-26 – A proper mouthful\n 0\n [\"36069b58-90be-414b-831b-2081bf44c26b\"]\n How do we prevent food fraud?\n 0\n 0\n A proper mouthful\n Podcast\n 2016-02-26\n \n \n _Jane Doe\n 2017-05-24T12:46:57\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n [Description from publisher - J.S.] \nA powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 [Description from publisher - J.S.]}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 A powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>[Description from publisher - J.S.]</p><p>A powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.</p>\n 2017-05-24\n Sciex.20170329\n 0\n 2017-03-29T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://sciex.com/products/software/markerview-software\n -1\n 0\n ComputerProgram\n Sciex 2017-03-29 – MarkerView Software\n 0\n Windows 7 or later\n 1.3.1\n [\"1ce6bdd0-3df6-43b7-aa18-a8b22bde8a67\"]\n 0\n 0\n MarkerView Software\n 2017-03-29\n \n \n 01555634-9293-4288-bfef-2fa44000717d\n _Jane Doe\n 2017-05-23T14:48:56\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.  They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.\\~ They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.&#160; They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.</p>\n 2017-05-23\n Spink.20140508\n 0\n 2014-05-08T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/\n -1\n 0\n InternetDocument\n Spink 2014-05-08 – GFSI direction on food fraud\n 0\n [\"ef55aa5c-a0ab-4b7c-bb5a-72c4727f8b39\"]\n 0\n 0\n GFSI direction on food fraud and vulnerability assessment (VACCP)\n Blog post\n 2014-05-08\n \n \n 7f2b5e6b-dfc0-46e5-b94b-2c3e21cb1ebc\n _Jane Doe\n 2017-05-22T08:06:30\n _Jkli14\n 2024-10-10T07:55:48\n 1\n 1\n Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that—economically motivated—but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud—it focuses specifically on the public health threat—and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications ofthe crime triangle and the chemistry ofthe crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0\\fprq2{\\*\\panose 02020603050405020304}Times New Roman \n;}{\\f1\\froman\\fcharset2\\fprq2{\\*\\panose 05050102010706020507}Symbol;}{\\f2\\fswiss\\fcharset0\\fprq2{\\*\\panose 020b0604020202020204}Arial;}{\\f3\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\sqformat\\spriority0\\sa120\\aspalpha\\aspnum \n\\adjustright\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\af3\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3 Normal;}{\\s1\\sbasedon0\\snext0\\styrsid15694742\\sqformat\\spriority0\\keepn\\sb240\\sa480\\aspalpha\\aspnum\\adjustright\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\rtlch\\ab\\af3\\afs32\\ltrch\\b\\fs28\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\kerning32 heading 1;}{\\*\\cs10\\additive\\ssemihidden\\spriority0 Default Paragraph Font;}}{\\*\\rsidtbl\\rsid10976062}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{ \n\\info\\version1\\edmins0\\nofpages1\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055 \n\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1{\\*\\wgrffmtfilter 013f}\\viewkind1\\viewscale100\\fet0\\ftnbj\\aenddoc\\ftnrstcont\\aftnrstcont\\ftnnar\\aftnnrlc\\widowctrl\\nospaceforul\\nolnhtadjtbl\\alntblind\\lyttblrtgr\\dntblnsbdb\\noxlattoyen\\wrppunct \n\\nobrkwrptbl\\expshrtn\\snaptogridincell\\asianbrkrule\\htmautsp\\noultrlspc\\useltbaln\\splytwnine\\ftnlytwnine\\lytcalctblwd\\allowfieldendsel\\lnbrkrule\\nouicompat\\nofeaturethrottle1\\formshade\\nojkernpunct\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\sectlinegrid360\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\guttersxn0\\headery708\\footery708\\colsx708\\ltrsect\\pard\\plain\\itap0\\s0\\sa120\\aspalpha\\aspnum\\adjustright\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\af3\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that\\u8212 economically motivated\\u8212 but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud\\u8212 it focuses specifically on the public health threat\\u8212 and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications } \n{\\rtlch\\af3\\afs18\\ltrch\\b0\\i\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 ofthe crime triangle }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 and }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i\\fs18\\lang2055\\langnp2055 \n\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 the chemistry ofthe crime. }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 The research provides a }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i\\fs18\\lang2055\\langnp2055 \n\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 food risk matrix }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.} \n{\\rtlch\\af3\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef0\\lsdunhideuseddef0\\lsdqformatdef0\\lsdprioritydef0{\\lsdlockedexcept\\lsdqformat1 Normal;\\lsdqformat1 heading 1;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 2;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 3 \n;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 4;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 5;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 6;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 7;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 8 \n;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 9;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 caption;\\lsdqformat1 Title;\\lsdqformat1 Subtitle;\\lsdqformat1 Strong;\\lsdqformat1 Emphasis;\\lsdsemihidden1\\lsdpriority99 Placeholder Text;\\lsdqformat1\\lsdpriority1 No Spacing \n;\\lsdpriority60 Light Shading;\\lsdpriority61 Light List;\\lsdpriority62 Light Grid;\\lsdpriority63 Medium Shading 1;\\lsdpriority64 Medium Shading 2;\\lsdpriority65 Medium List 1;\\lsdpriority66 Medium List 2;\\lsdpriority67 Medium Grid 1;\\lsdpriority68 Medium Grid 2 \n;\\lsdpriority69 Medium Grid 3;\\lsdpriority70 Dark List;\\lsdpriority71 Colorful Shading;\\lsdpriority72 Colorful List;\\lsdpriority73 Colorful Grid;\\lsdpriority60 Light Shading Accent 1;\\lsdpriority61 Light List Accent 1;\\lsdpriority62 Light Grid Accent 1;\\lsdpriority63 Medium Shading 1 Accent 1 \n;\\lsdpriority64 Medium Shading 2 Accent 1;\\lsdpriority65 Medium List 1 Accent 1;\\lsdsemihidden1\\lsdpriority99 Revision;\\lsdqformat1\\lsdpriority34 List Paragraph;\\lsdqformat1\\lsdpriority29 Quote;\\lsdqformat1\\lsdpriority30 Intense Quote;\\lsdpriority66 Medium List 2 Accent 1 \n;\\lsdpriority67 Medium Grid 1 Accent 1;\\lsdpriority68 Medium Grid 2 Accent 1;\\lsdpriority69 Medium Grid 3 Accent 1;\\lsdpriority70 Dark List Accent 1;\\lsdpriority71 Colorful Shading Accent 1;\\lsdpriority72 Colorful List Accent 1;\\lsdpriority73 Colorful Grid Accent 1 \n;\\lsdpriority60 Light Shading Accent 2;\\lsdpriority61 Light List Accent 2;\\lsdpriority62 Light Grid Accent 2;\\lsdpriority63 Medium Shading 1 Accent 2;\\lsdpriority64 Medium Shading 2 Accent 2;\\lsdpriority65 Medium List 1 Accent 2;\\lsdpriority66 Medium List 2 Accent 2 \n;\\lsdpriority67 Medium Grid 1 Accent 2;\\lsdpriority68 Medium Grid 2 Accent 2;\\lsdpriority69 Medium Grid 3 Accent 2;\\lsdpriority70 Dark List Accent 2;\\lsdpriority71 Colorful Shading Accent 2;\\lsdpriority72 Colorful List Accent 2;\\lsdpriority73 Colorful Grid Accent 2 \n;\\lsdpriority60 Light Shading Accent 3;\\lsdpriority61 Light List Accent 3;\\lsdpriority62 Light Grid Accent 3;\\lsdpriority63 Medium Shading 1 Accent 3;\\lsdpriority64 Medium Shading 2 Accent 3;\\lsdpriority65 Medium List 1 Accent 3;\\lsdpriority66 Medium List 2 Accent 3 \n;\\lsdpriority67 Medium Grid 1 Accent 3;\\lsdpriority68 Medium Grid 2 Accent 3;\\lsdpriority69 Medium Grid 3 Accent 3;\\lsdpriority70 Dark List Accent 3;\\lsdpriority71 Colorful Shading Accent 3;\\lsdpriority72 Colorful List Accent 3;\\lsdpriority73 Colorful Grid Accent 3 \n;\\lsdpriority60 Light Shading Accent 4;\\lsdpriority61 Light List Accent 4;\\lsdpriority62 Light Grid Accent 4;\\lsdpriority63 Medium Shading 1 Accent 4;\\lsdpriority64 Medium Shading 2 Accent 4;\\lsdpriority65 Medium List 1 Accent 4;\\lsdpriority66 Medium List 2 Accent 4 \n;\\lsdpriority67 Medium Grid 1 Accent 4;\\lsdpriority68 Medium Grid 2 Accent 4;\\lsdpriority69 Medium Grid 3 Accent 4;\\lsdpriority70 Dark List Accent 4;\\lsdpriority71 Colorful Shading Accent 4;\\lsdpriority72 Colorful List Accent 4;\\lsdpriority73 Colorful Grid Accent 4 \n;\\lsdpriority60 Light Shading Accent 5;\\lsdpriority61 Light List Accent 5;\\lsdpriority62 Light Grid Accent 5;\\lsdpriority63 Medium Shading 1 Accent 5;\\lsdpriority64 Medium Shading 2 Accent 5;\\lsdpriority65 Medium List 1 Accent 5;\\lsdpriority66 Medium List 2 Accent 5 \n;\\lsdpriority67 Medium Grid 1 Accent 5;\\lsdpriority68 Medium Grid 2 Accent 5;\\lsdpriority69 Medium Grid 3 Accent 5;\\lsdpriority70 Dark List Accent 5;\\lsdpriority71 Colorful Shading Accent 5;\\lsdpriority72 Colorful List Accent 5;\\lsdpriority73 Colorful Grid Accent 5 \n;\\lsdpriority60 Light Shading Accent 6;\\lsdpriority61 Light List Accent 6;\\lsdpriority62 Light Grid Accent 6;\\lsdpriority63 Medium Shading 1 Accent 6;\\lsdpriority64 Medium Shading 2 Accent 6;\\lsdpriority65 Medium List 1 Accent 6;\\lsdpriority66 Medium List 2 Accent 6 \n;\\lsdpriority67 Medium Grid 1 Accent 6;\\lsdpriority68 Medium Grid 2 Accent 6;\\lsdpriority69 Medium Grid 3 Accent 6;\\lsdpriority70 Dark List Accent 6;\\lsdpriority71 Colorful Shading Accent 6;\\lsdpriority72 Colorful List Accent 6;\\lsdpriority73 Colorful Grid Accent 6 \n;\\lsdqformat1\\lsdpriority19 Subtle Emphasis;\\lsdqformat1\\lsdpriority21 Intense Emphasis;\\lsdqformat1\\lsdpriority31 Subtle Reference;\\lsdqformat1\\lsdpriority32 Intense Reference;\\lsdqformat1\\lsdpriority33 Book Title;\\lsdsemihidden1\\lsdunhideused1\\lsdpriority37 Bibliography \n;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1\\lsdpriority39 TOC Heading;}}}\n <p>Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that—economically motivated—but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud—it focuses specifically on the public health threat—and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications <em>ofthe crime triangle </em>and <em>the chemistry ofthe crime. </em>The research provides a <em>food risk matrix </em>and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.</p>\n Spink.2011\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defining the public health threat.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2011-01-01T00:00:00\n 10.1111/j.1750-3841.2011.02417.x\n 0\n 1\n Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0 \n\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0 \n\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.</p>\n false\n false\n eng\n en\n 9\n \n Other\n Omit\n R157-R163\n R157-R163\n\nR157-R163]]>\n 2147483647\n 100\n 22416717\n 4\n JournalArticle\n Spink, Moyer 2011 – Defining the public health threat\n 0\n PubMed\n [\"b04843d7-7503-400f-98ac-48f6b9b81dfe\"]\n 0\n 0\n Defining the public health threat of food fraud\n 76\n 2011\n \n \n 506c8e72-ff94-480e-9267-3036d694b546\n _Jane Doe\n 2017-05-22T08:05:56\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n This paper introduces the topic of Food Fraud with translations to Russian, Korean, and Chinese. The concepts provide a system-wide focus leading to prevention. The goal is not to detect Food Fraud but to adjust entire food supply chains to reduce fraud opportunities. Food Fraud is a recently defined area of Food Protection between Food Safety (such as Salmonella or pesticide residue), and Food Defense (malicious intent to harm such as terrorism). Food Fraud is intentional with no intent to harm but only for economic gain. As with improving Food Safety and Food Defense, preventing Food Fraud is good for society and the economy. Society benefits through fewer public health threats from unauthorized acts. Society also benefits from increased consumer satisfaction and harmony. Food Security is increased through the production of more, higher-value products for consumers, commerce, and exporting. Food Fraud can reduce economic output because sickened citizens cannot work and it also reduces consumer confidence leading to less commerce.\n Spink.2015\n 0\n 2015-01-01T00:00:00\n 10.1016/j.foodchem.2014.09.106\n 0\n 0\n false\n false\n eng\n en\n \n 102\n true\n 102\n 102\n\n\n 107\n true\n 107\n 107\n\n102-7]]>\n 102\n 30\n 26190607\n 0\n JournalArticle\n Spink, Moyer et al. 2015 – Introducing food fraud including translation\n 0\n PubMed\n [\"209a8163-390b-479b-815c-64837ced9916\"]\n 0\n 0\n Introducing food fraud including translation and interpretation to Russian, Korean, and Chinese languages\n 189\n 2015\n \n \n 16b93298-3e3b-4cbe-95a3-46c388ae976b\n _Jane Doe\n 2017-05-22T08:26:04\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n [Description from publisher - J.S.] \nModern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially. \nDriving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 [Description from publisher - J.S.]}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql \n\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Modern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Driving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>[Description from publisher - J.S.]</p><p>Modern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially.</p><p>Driving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.</p>\n Tarnanidis.2017\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Tarnanidis, Vlachopoulou et al (Ed) 2017 - Driving agribusiness with technology innovations.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2017-01-01T00:00:00\n 0\n 0\n false\n false\n 9781522521075\n eng\n en\n Jane Doe, 2017-05-24\n -1\n Hershey, Pennsylvania\n 0\n BookEdited\n Tarnanidis, Vlachopoulou et al. (Ed.) 2017 – Driving agribusiness with technology innovations\n 0\n OriginalSource\n [\"6ec6a891-18c7-4e1c-936a-552eca647a4e\"]\n 0\n 1\n Driving agribusiness with technology innovations\n 2017\n \n \n abec8f64-7960-4c81-a220-72a849ff4bc2\n _Jane Doe\n 2017-05-22T08:07:31\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Coffee is a ubiquitous food product of considerable economic importance to the countries that produce and export it. The adulteration of roasted coffee is a strategy used to reduce costs. Conventional methods employed to identify adulteration in roasted and ground coffee involve optical and electron microscopy, which require pretreatment of samples and are time-consuming and subjective. Other analytical techniques have been studied that might be more reliable, reproducible, and widely applicable. The present review provides an overview of three analytical approaches (physical, chemical, and biological) to the identification of coffee adulteration. A total of 30 published articles are considered. It is concluded that despite the existence of a number of excellent studies in this area, there still remains a lack of a suitably sensitive and widely applicable methodology able to take into account the various different aspects of adulteration, considering coffee varieties, defective beans, and external agents.\n Toci.2016\n 0\n 2016-01-01T00:00:00\n 10.1080/10408347.2014.966185\n 0\n 0\n false\n false\n eng\n en\n 2\n \n 83\n true\n 83\n 83\n\n\n 92\n true\n 92\n 92\n\n83-92]]>\n 83\n 30\n 25633422\n 0\n JournalArticle\n Toci, Farah et al. 2016 – Coffee adulteration\n 0\n PubMed\n [\"2cbb47e0-a653-4cf6-bfaa-091267c24bd2\"]\n More than two decades of research\n 0\n 0\n Coffee adulteration\n 46\n 2016\n \n \n _Jane Doe\n 2017-05-23T15:45:39\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-23\n UnitedStatesCongress.20170104\n 0\n 2017-01-04\n 2017-01-04T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf\n <c>89</c> \n<in>true</in> \n<os>89</os> \n<ps>89</ps>\n -1\n 0\n StatuteOrRegulation\n United States Congress 2017-01-04 – FDA Food Safety Modernization Act\n 0\n [\"85e8a727-9877-450a-b022-ab229fa2544e\"]\n 21 USC 2201\n 0\n 0\n FDA Food Safety Modernization Act\n \n \n _Jane Doe\n 2017-05-22T11:48:54\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-22\n UnitedStatesSupremeCourt.19140224\n 0\n 1914-02-24\n 1914-02-24T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://supreme.justia.com/cases/federal/us/232/399/\n -1\n 0\n CourtDecision\n United States Supreme Court 1914-02-24 – United States v\n 0\n 232 U.S. 399\n Ruling\n [\"a2ed45ae-8d38-4a63-9b44-32009c481476\"]\n 0\n 0\n United States v. Lexington Mill & Elevator Co.\n \n \n e63abf5c-e6a1-4d1d-a611-c05d83e4fad1\n _Jane Doe\n 2017-05-22T12:35:14\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Uyttendaele.2016\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 1\n -1\n 0\n SpecialIssue\n Uyttendaele, Franz et al. (Ed.) 2016 – Food safety\n 0\n [\"6c9e36bb-f02c-439d-856c-dece1d39d8a9\"]\n 0\n 0\n Food safety\n 13\n 2016\n \n \n 87ec0bec-c333-4236-8a6e-9c01a30afb01\n _Jane Doe\n 2017-05-22T08:05:31\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Wang.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Wang, He et al 2016 - DNA barcoding reveals commercial fraud.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 10.1007/s11427-015-4979-0\n 0\n 1\n Example of how DNA barcode tests can be used to detect when another species of animal is used.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Example of how DNA barcode tests can be used to detect when another species of animal is used. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Example of how DNA barcode tests can be used to detect when another species of animal is used. </p>\n false\n false\n eng\n en\n 1\n \n 106\n true\n 106\n 106\n\n\n 108\n true\n 108\n 108\n\n106-8]]>\n 106\n 30\n 26758743\n 0\n JournalArticle\n Wang, He et al. 2016 – DNA barcoding reveals commercial fraud\n 0\n PubMed\n [\"dd370c61-685e-4abf-bdae-449aab92782a\"]\n 0\n 0\n DNA barcoding reveals commercial fraud related to yak jerky sold in China\n Letter to the editor\n 59\n 2016\n \n \n _Jane Doe\n 2017-05-23T11:02:22\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-23\n Wikipedia.20170522\n 0\n 2017-05-22\n 2017-05-22T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://en.wikipedia.org/w/index.php?oldid=781647563\n -1\n 0\n InternetDocument\n Wikipedia 2017-05-22 – 2008 Chinese milk scandal\n 0\n [\"65065a44-35ea-4024-b6dd-c656b0f597bf\"]\n 0\n 0\n 2008 Chinese milk scandal\n \n \n _Jane Doe\n 2017-05-22T12:44:27\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n 2017-05-22\n Winter.2008\n 0\n 2008-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html\n -1\n Davis, California\n 0\n MusicAlbum\n Winter 2008 – Still seems like food\n 0\n [\"f9b87794-01fa-420c-a7ac-3305c7534406\"]\n 0\n 0\n Still seems like food to me\n 2008\n \n \n 8efd2054-f646-4847-abfb-ba2bd171a5c9\n _Jane Doe\n 2017-05-22T08:22:13\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Yan.2012\n 0\n 2012-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 3\n \n 705\n true\n 705\n 705\n\n\n 729\n true\n 729\n 729\n\n705-729]]>\n 705\n 30\n 0\n JournalArticle\n Yan 2012 – Food safety and social risk\n 0\n EndNote Tagged Import Format\n [\"03e71533-1bd7-49db-a724-b50be5568662\"]\n 0\n 0\n Food safety and social risk in contemporary China\n 71\n 2012\n \n \n _Jane Doe\n 2017-05-24T12:56:43\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Yang.2016\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 978-1-5090-2842-9\n eng\n en\n -1\n Piscataway, NJ\n 0\n ConferenceProceedings\n Yang (Ed.) 2016 – 2016 13th International Conference\n 0\n WorldCat\n Kunming, China\n 2016 13th International Conference on Service Systems and Service Management (ICSSSM)\n [\"299148cd-198d-4e27-be59-d2d3b6600568\"]\n June 24-26, 2016, KUST, Kunming, China\n 0\n 0\n 2016 13th International Conference on Service Systems and Service Management (ICSSSM)\n 2016\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jkli14\n 2024-10-10T09:07:12\n 0\n 0\n Bitzios.Inpress\n Bitzios et al. [In press]\n 0\n TestFeldForBibtex\n 0\n 0\n false\n false\n eng\n en\n -1\n 0\n Contribution\n Bitzios, Jack et al. [In press] – Dissonance in the food traceability\n 0\n EndNote Tagged Import Format\n [\"237e20c1-eb0c-4fe3-8775-d0db944ab6a0\"]\n 0\n 0\n Dissonance in the food traceability regulatory environment and food fraud\n \n \n _Jane Doe\n 2017-05-23T13:59:14\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Fassam.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 659\n true\n 659\n 659\n\n\n 666\n true\n 666\n 666\n\n659-666]]>\n 659\n 30\n 0\n Contribution\n Fassam, Dani et al. 2015 – Supply Chain Food Crime & Fraud\n 1\n [\"0537ba4b-5e79-430c-b93f-2d329447bd62\"]\n A systematic literature review of food criminality\n 0\n 0\n Supply chain food crime & fraud\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Karipidis.2017\n 0\n 2017-01-01T00:00:00\n 10.4018/978-1-5225-2107-5.ch005\n 0\n 0\n false\n false\n eng\n en\n Jane Doe, 2017-05-24\n \n 70\n true\n 70\n 70\n\n\n 90\n true\n 90\n 90\n\n70-90]]>\n 70\n 30\n 0\n Contribution\n Karipidis, Tselempis et al. 2017 – Eco-certification and transparency in global\n 0\n OriginalSource\n [\"b20c68ba-f1bf-4abf-bd02-0474850b7b48\"]\n 0\n 0\n Eco-certification and transparency in global food supply chains\n \n \n _Jane Doe\n 2017-05-22T08:26:26\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Manning.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning 2016 - Food Integrity.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 2\n true\n 2\n 2\n\n\n 6\n true\n 6\n 6\n\n2-6]]>\n 2\n 30\n 0\n Contribution\n Manning 2016 – Food Integrity\n 0\n EndNote Tagged Import Format\n [\"4c5a0397-68e9-4d01-9900-f2ea39269954\"]\n 0\n 0\n Food Integrity\n Guest editorial\n 119\n \n \n _Jane Doe\n 2017-05-24T12:56:43\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Tian.2016\n 0\n 2016-01-01T00:00:00\n 10.1109/ICSSSM.2016.7538424\n 0\n 0\n false\n false\n eng\n en\n \n 1\n true\n 1\n 1\n\n\n 6\n true\n 6\n 6\n\n1-6]]>\n 1\n 30\n 0\n Contribution\n Tian 2016 – An agri-food supply chain traceability\n 0\n CrossRef\n [\"04fc0ae6-e5f0-4289-afce-a172e65947ac\"]\n 0\n 0\n An agri-food supply chain traceability system for China based on RFID & blockchain technology\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 0\n Uyttendaele.2016b\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Uyttendaele, Franz et al 2016 - Food safety.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 10.3390/ijerph13010067\n 0\n 0\n false\n false\n eng\n en\n Article number: 67\n \n Omit\n 1\n 1\n\n\n Omit\n 6\n 6\n\n1–6]]>\n 2147483647\n 100\n 0\n Contribution\n Uyttendaele, Franz et al. 2016 – Food safety\n 0\n CrossRef\n [\"f2bd722f-ef64-4402-85b0-282576cefe2c\"]\n 0\n 0\n Food safety, a global challenge\n 13\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jkli14\n 2024-10-10T07:55:48\n 0\n 1\n Purpose – The purpose of this paper is to describe the development of a comprehensive categorisation of food scares. \nDesign/methodology/approach – Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews. \nFindings – The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues). \nPractical implications – The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies. \nOriginality/value – The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Purpose \\u8211 The purpose of this paper is to describe the development of a comprehensive categorisation of food scares.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Design/methodology/approach \\u8211 Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Findings \\u8211 The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues).} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Practical implications \\u8211 The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Originality/value \\u8211 The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Purpose – The purpose of this paper is to describe the development of a comprehensive categorisation of food scares.</p><p>Design/methodology/approach – Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews.</p><p>Findings – The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues).</p><p>Practical implications – The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies.</p><p>Originality/value – The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.</p>\n Whitworth.2016\n 0\n 2016-01-01T00:00:00\n 10.1108/BFJ-06-2016-0263\n 0\n 0\n false\n false\n eng\n en\n \n 131\n true\n 131\n 131\n\n\n 142\n true\n 142\n 142\n\n131-142]]>\n 131\n 30\n 0\n Contribution\n Whitworth, Druckman et al. 2016 – Food scares\n 0\n CrossRef\n [\"8d051049-c47a-4530-916a-c5d3178e38e4\"]\n A comprehensive categorisation\n 0\n 0\n Food scares\n 119\n \n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33;c9d75a8e-d769-4139-99b7-3870f391145a;6bd54f95-2c0b-460d-9d33-caf496c18736;57bd2669-0137-44b1-b7a0-92e48219970a\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32;93bde32b-f267-444e-b9fb-bd07d193beb2;2f82c9f9-d1d0-4d88-94a6-8281e1fac790;0955c7e5-8357-421a-8857-91ab1e2da9a5;37b9ba83-abc4-4b8d-bb22-52ebd1f99b15;f48de064-9816-4b68-99bf-74cd651e32f5;b0478930-1384-4181-98b9-b40ca4ad2476;02e873f4-2938-4189-ab21-89a64f7da357;f5b15b96-78d6-4b3e-8d10-7a73fdedb117;b81b03f3-38e7-40e7-8dac-8176d10bbfa4;61e7f1c2-97f8-494a-a1ae-b413ff35da26;96d01d00-5f47-481f-bce7-1c9489ed0457\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;4912a898-3fe3-4c90-8102-b8f30e34c74b;f73871ea-2cc7-4416-b8f9-f63c80303284;78714884-e825-4bcb-822c-479e32307d6d;4e8597e2-732f-41d8-9701-1b3fb46fcf9d;71f1c601-24c8-47e9-aa27-070c5458581e;a712620d-9df9-46f7-a647-c5b9c030d276\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;2367d88b-a780-41a8-9840-e18e26563e6b\n 60accf57-c086-423f-9068-7c1afdc2de1d;cd06eb60-d682-49cc-9895-d81017ca6d8f\n 2485a5d8-95f5-437f-8911-05111eb7e25e;47f7fda0-7e1a-46d2-b3f2-47ba54f9d513;2ef2837d-0a4f-457c-b043-869f736c23bb;e8f4f758-096f-47ce-aa24-df31a9851a06;61ecb063-2cb9-4c03-8f12-5b0f5d6cafea;9638b127-a3e8-49da-be7c-96245bc368d1;b5388801-8474-4085-b34a-e7135ece3ca5\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38;e2233367-e146-4e7e-83c5-f0e96e2acac8;d6a83194-336b-48f2-bfdd-4024d3bb6dfc\n 27dd2250-00b8-4587-8456-c68d0ca5af8a;9acad0e6-6104-4c20-a884-a112539adfcc\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;8027e748-f588-488e-a38d-30d68a4ed859;0782a361-f350-4c5c-a925-e3659d5e9e76\n 43ecc385-004b-4af0-b1cb-2d14c240e032;0c368006-04f3-48c6-9e61-8cff75a68301\n 1810f594-4e9e-47b4-905f-445171ad46c6;e0d1768c-bf89-4f01-9529-fb323eec75c9\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9;20ef3760-25e0-4a46-9976-aa058e40b904;32460ffc-d33c-4860-bdbc-ba0e16473dfa;19ce8a5e-7f6a-46bd-8e69-f3415f29e6d8;534f8d73-f994-40e9-b62b-330a1ff701bf;9ef2ff3b-1842-4e48-8ffa-7d469722c6ee;06cdff90-b237-4c38-9469-7987dbd5c5d1;fd81ebd9-da73-441d-b263-d429c1537da5\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f;a534ff7d-2405-4653-ad89-4ae0ca8098bd;03314236-dd07-48f7-b2c8-464416ac2f7c;fd6c664f-2af6-4659-ac91-144c38783953\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb;41ceda41-a523-4532-9ef8-673c2bd73773\n 27384b10-b549-45fc-80c7-94688793e9fc;98d60973-99bd-42cc-92fa-f43762154bb1;05f87947-2c3f-4243-8a47-71005a9c3025\n bc5000cc-1af0-4d23-837f-422c907de172;8c00e094-dc2a-45c7-9a10-1f6f7f652124;cb2115d4-0787-4855-b0c2-34633c934f5f;f3141c00-2101-4a2c-a14d-d0615f2b767c;2bd5e471-002a-4595-920e-1b33ebf080ba;f1707b56-e8ba-4d1b-93f2-8afe25d06161;87f34a41-7fc9-4d58-91c3-fcec681ce042;a8137b23-8cfe-4dfb-8095-e5e5c6229b92;860f9886-89a1-416e-ab57-c2c1ca2c429d;6eca11d9-bdfe-4ae1-a97e-c90b6c76fd25\n 7d50376a-ef59-4b6a-804f-79e6880ebd42;4a3f90ee-0ad1-4f84-a8b1-87b23f341495\n f16b35ce-1d93-423c-909a-61d0d5f693f8;bf11462d-2b92-4742-bca3-9482c7c19f84;41bb7862-195a-44e3-b6e0-5cba038c6551;af7c5b71-fca0-4d13-9f42-e747d80a0862;0b52f2e2-a76e-46ab-b60e-65fc3ad8a86b\n e365933e-9b5b-4bb1-ae02-326f41d2833a;35996983-3808-4ae1-b01b-c92a783358a9\n d0abc9c9-e230-4a30-ac87-7847e7fa0789;aaedf869-7717-44bd-9961-a55ad310309d;5b2c8e0a-55b4-4658-8cbd-dda3a8e8a816;3b59d029-272c-40ca-9429-6297ca888fc6;20912ce4-8b70-4541-b488-9c71b645fffe\n 24cba909-5cee-4d53-ae8c-95938ad33f89;07fd7721-9909-4a82-be3b-19bbaecf79bf\n 92976b82-1442-47c0-a23d-dd1a0178ce0c;ff1140f2-d280-4359-b9d7-a5229f6c6d01\n 89c1b839-ce76-43f4-be84-84d394af9179;695a0520-21e3-4846-8ece-0ff331721d76\n 5c99255f-527b-4ab4-a482-10c4441d08f0;f064500d-23cb-4e41-8e39-7d541ec17c96\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;31d76fbc-69f8-4860-afaf-821e88076602;f34a32c6-c26d-4bdc-a731-fc5c24edf84c\n d69a676f-1c2b-425b-bc36-ea52e1409bb2;a91ead06-d1e7-4226-b6b6-67526c201176\n 0d576b32-d148-4660-9d3c-05e19c6b7691;c7399cdd-9772-4a4e-96a6-c30c83ac9194\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;c7399cdd-9772-4a4e-96a6-c30c83ac9194;fba9bcc3-0c9a-4025-8b93-4eb0f9012353\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;c7399cdd-9772-4a4e-96a6-c30c83ac9194;fba9bcc3-0c9a-4025-8b93-4eb0f9012353;60fb854e-0061-4986-8ae2-869d00cc5362;22573de6-316a-4694-b0db-14793a798f62;963ca047-c1e2-42be-b196-8d39d8e1a25a;1bc42489-068e-454d-abf8-cc10bc27ea09;bb2ba502-8136-4dcf-87f4-4f9d376b4012;aac84b40-65c3-43f6-a9be-8bea001cc54d;a1992082-7358-4c74-9fd6-f50450925cd1\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;ae92db15-3070-4f5a-b265-6ff1140c772d;db3c00be-a7ee-4f64-a41b-f84e92a8b9ab;d3a15ce1-ef41-420b-978e-9ba7f26aedfe;11b980d3-c539-4169-82b4-67ed0b5a0467\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;6f14def1-b6fc-45ac-9dea-543ce0f82a8a;e4bb7295-65fb-41d4-8d55-d12f2bc81398;7b60f215-38b4-44a3-8678-ea81cc58d115;dfaf0ad4-db06-47c7-90d0-d619d1db69e8;c0bcaf9c-c4ef-457a-963e-1a0876e59425;fa651857-027b-4b7c-9cae-a2a77aa84d66;65d50ae2-b221-42f0-8ad3-f72273a994e8;968c4bdd-6f78-49f5-96ec-3077891b0705\n 57e829e1-dc28-4a02-956f-04d36967db37;a273d73a-27c9-4f78-8174-e6739eec07cb\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b;80acf8dc-9292-41bd-a033-800f931fd43f\n b213355e-df97-4b43-9e69-8a185817ce57;e1606424-50f4-410c-aa65-48466b299f46;37fa6c8e-f8b0-43bd-b758-a50a6e39cfa5;60d942c8-48a6-46b4-aa12-4fff8966c86c;e08e2cd2-602b-4ed9-b321-5cc7706a46d2\n 5fb48a7c-65db-4581-ab2c-7197305a0811;68a56870-e74a-4eed-9bbb-a31ed774ba11;02eaf2ee-8c67-4c3b-afc3-03e8d889418a;d560939c-c19b-4e59-8b70-d4f5c9166511\n cb44c440-80f8-4486-bf68-af79d9d716e2;2c27a537-7c52-4d90-a7c4-12172e99c7eb;9b2bc353-f12d-451d-ba12-14717ae4e0b6;404d7675-8ee4-451d-9a86-7e1cc76b8416\n 3012ebe2-c183-4d12-9851-5ab7b6d2421c;69a05370-5520-45b7-8043-6517fa20c97f\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa;885679a0-061d-4ed2-96c9-29431dd2f4fa\n d0c8a959-aa18-4a58-a996-96af08a09256;830c0ae9-16a8-4ba6-a3dc-fef48b1ee034;84ece7e8-f3d5-4b7a-a668-64524a235c02;42832498-f178-4e25-b572-da57fb3370f7\n 31cd5301-52f8-4c11-98f8-765ec869a45d;142121f0-c806-46d3-9b97-2126ad7fe4e4;db9b3dbc-0095-4487-bede-8dfc2fdb6ddc;675a90ee-5959-4841-9e2b-265e8c38c3e6\n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33;f1ba83e7-fdda-4bb8-bbe1-e84af8112dfa\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32;ddb219dd-dfc6-4f0b-b61b-cf5c1b179ae5\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;c8122f49-7dc9-49e0-8919-eefad7f416a9\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;ac5840bd-bca9-4faa-be65-b59301e55ff1;6aaba073-4a78-4cfc-b277-a12ecde05560\n 60accf57-c086-423f-9068-7c1afdc2de1d;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906\n 2485a5d8-95f5-437f-8911-05111eb7e25e;530cb647-c5aa-46b6-bb8f-d49dab51a26a\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 27dd2250-00b8-4587-8456-c68d0ca5af8a;d3100956-91ed-4965-ac76-7b66f51d147a\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d\n 43ecc385-004b-4af0-b1cb-2d14c240e032;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;fc506b83-b591-4183-b9a9-0041d2242545\n 3ab6253b-74b7-4701-9431-acfe6df2d2be;6aaba073-4a78-4cfc-b277-a12ecde05560\n 436a30e7-3930-4333-8204-e1bae37af76e;6aaba073-4a78-4cfc-b277-a12ecde05560\n 1810f594-4e9e-47b4-905f-445171ad46c6;de4970f8-9818-44d8-88cc-53d9ad4885a3\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8;721654e5-7ac1-42ac-9c9c-69111c7e8b90\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d\n ddf7203d-0229-46d5-badc-e6c35789df3f;de4970f8-9818-44d8-88cc-53d9ad4885a3\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8;fb23b54d-bb22-492a-b6a3-a60a2a1288f3\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f;55496d4d-9f92-44aa-89ce-3b30e5c437d7\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 27384b10-b549-45fc-80c7-94688793e9fc;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;73aa7410-7c17-4acc-83af-249657be15e6\n bc5000cc-1af0-4d23-837f-422c907de172;4afcfa69-74cc-4a95-8aba-4a6aadaf59c5;d3100956-91ed-4965-ac76-7b66f51d147a\n 7d50376a-ef59-4b6a-804f-79e6880ebd42;de4970f8-9818-44d8-88cc-53d9ad4885a3\n f16b35ce-1d93-423c-909a-61d0d5f693f8;c5730108-95c7-4468-a834-88a85d582130\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1;4bbd6753-30f2-4e3b-9e32-3c65b5037589\n e365933e-9b5b-4bb1-ae02-326f41d2833a;c8122f49-7dc9-49e0-8919-eefad7f416a9\n d0abc9c9-e230-4a30-ac87-7847e7fa0789;a5607a6f-cc37-4e62-968b-bb5deada2317\n 24cba909-5cee-4d53-ae8c-95938ad33f89;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906\n 92976b82-1442-47c0-a23d-dd1a0178ce0c;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;adbb0c87-4c1c-4156-844b-3bb40145b49a\n 0293a42d-151c-4ca2-9091-4e1dd5400666;145b6eba-876a-46a4-b946-75ddf0389eda\n 89c1b839-ce76-43f4-be84-84d394af9179;de4970f8-9818-44d8-88cc-53d9ad4885a3\n 5c99255f-527b-4ab4-a482-10c4441d08f0;f1ba83e7-fdda-4bb8-bbe1-e84af8112dfa\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;145b6eba-876a-46a4-b946-75ddf0389eda\n d69a676f-1c2b-425b-bc36-ea52e1409bb2;a5607a6f-cc37-4e62-968b-bb5deada2317\n 0d576b32-d148-4660-9d3c-05e19c6b7691;721654e5-7ac1-42ac-9c9c-69111c7e8b90\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;145b6eba-876a-46a4-b946-75ddf0389eda;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;fab7624c-e13e-4fc5-9991-758d7e0fdbf6\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc;6aaba073-4a78-4cfc-b277-a12ecde05560\n 03798623-1bd2-422e-bb17-0f77830aff20;ac5840bd-bca9-4faa-be65-b59301e55ff1;6aaba073-4a78-4cfc-b277-a12ecde05560\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;530cb647-c5aa-46b6-bb8f-d49dab51a26a;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 57e829e1-dc28-4a02-956f-04d36967db37;4a05cca9-2d0d-4ea5-8440-5a09c4f40249\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 5fb48a7c-65db-4581-ab2c-7197305a0811;fab7624c-e13e-4fc5-9991-758d7e0fdbf6\n cb44c440-80f8-4486-bf68-af79d9d716e2;adbb0c87-4c1c-4156-844b-3bb40145b49a\n 3012ebe2-c183-4d12-9851-5ab7b6d2421c;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa;de4970f8-9818-44d8-88cc-53d9ad4885a3;55496d4d-9f92-44aa-89ce-3b30e5c437d7;93fe40ba-b05c-4d30-8855-f546b7388d2a\n d0c8a959-aa18-4a58-a996-96af08a09256;721654e5-7ac1-42ac-9c9c-69111c7e8b90\n 31cd5301-52f8-4c11-98f8-765ec869a45d;fab7624c-e13e-4fc5-9991-758d7e0fdbf6\n \n \n 60accf57-c086-423f-9068-7c1afdc2de1d;46ba2844-da6b-4949-92d6-2f2dad753fc4;cd6f9fe5-4adb-4bbd-b279-d72ce4c54e7f;9df23599-26e9-4745-84d0-a714f84b5b37;c2a05de9-6128-470a-bef8-b2ae70dc035c;8280c9ea-bdf0-4f9b-b492-3c695e7e608a;597f86fa-2e78-45df-92ca-725714eb4282;9c67e3ed-0fd6-47aa-83c8-85fbeaee4c9c;b48da91f-cfc9-40c5-bb23-84048a539d1d\n 27dd2250-00b8-4587-8456-c68d0ca5af8a;936b3fa2-060e-4e74-a234-ab5aa85c3861\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;1e1bb2a5-6863-4ebe-b809-e1235f456f29\n 43ecc385-004b-4af0-b1cb-2d14c240e032;87905475-fdfa-4e31-aa00-bf1fe93bcc02\n ddf7203d-0229-46d5-badc-e6c35789df3f;793415f8-111c-4582-bd67-74ea9e0488dc\n \n \n 515c0c9b-1bbe-4706-aa5e-f62aeaf73271;a0fcbfd6-d965-410a-93dd-d92c40376f4f\n e245ae31-ac6d-42fa-aca4-3435cb4bf378;b3754582-b3cc-4f65-a24d-3e7a2fedbcf7;8f61fa70-6006-4a83-a760-32bfaf9277c7;1a166434-62e2-4192-9d79-88db09ff76e1;f24b7566-0b83-463b-b473-68e180e41ec1;f29d7406-7fd7-4784-848a-a32d271653da\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;757cbe66-4b2e-4ed1-ba43-13e9c443c060;3b370f13-6828-4acc-a844-07cc64bd3956\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;ad7a565d-93b6-4f12-818a-924b328ae087;9321e9e8-106a-40a2-a996-8ada12c4329f\n 30642deb-def4-40a6-86a2-b9ad1c335df6;98d60973-99bd-42cc-92fa-f43762154bb1\n 0293a42d-151c-4ca2-9091-4e1dd5400666;e4855c5b-60bd-4592-bd19-883f420415a7;851b72ed-14ee-47c0-94d4-3ace6af19302;3db63a4c-63d9-46ae-9aea-61110bd43a25\n b3b260b4-1492-4b1c-81c8-436cdedebaad;52028500-53e9-410d-80f1-9a8b581dd984;070e314a-9bc6-40d0-a0a8-9ad588d37a4e;578474ff-3c91-49a1-854e-463ae6d5c909\n 9735e0ee-c250-4570-b2b9-6388450b3dae;830c0ae9-16a8-4ba6-a3dc-fef48b1ee034;84ece7e8-f3d5-4b7a-a668-64524a235c02;42832498-f178-4e25-b572-da57fb3370f7\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;ec74ae3c-ab7f-40b6-8304-d5b2b631dd47\n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33;20e8c689-ea77-4c27-938a-7392c9dd8841\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32;20e8c689-ea77-4c27-938a-7392c9dd8841\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;138f13cd-bc93-4bff-9cbc-97f064086c24\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;20e8c689-ea77-4c27-938a-7392c9dd8841\n e245ae31-ac6d-42fa-aca4-3435cb4bf378;20e8c689-ea77-4c27-938a-7392c9dd8841\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;138f13cd-bc93-4bff-9cbc-97f064086c24\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;20e8c689-ea77-4c27-938a-7392c9dd8841\n 3ab6253b-74b7-4701-9431-acfe6df2d2be;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n 436a30e7-3930-4333-8204-e1bae37af76e;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9;20e8c689-ea77-4c27-938a-7392c9dd8841\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;20e8c689-ea77-4c27-938a-7392c9dd8841\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f;20e8c689-ea77-4c27-938a-7392c9dd8841\n 30642deb-def4-40a6-86a2-b9ad1c335df6;20e8c689-ea77-4c27-938a-7392c9dd8841\n 27384b10-b549-45fc-80c7-94688793e9fc;20e8c689-ea77-4c27-938a-7392c9dd8841\n bc5000cc-1af0-4d23-837f-422c907de172;20e8c689-ea77-4c27-938a-7392c9dd8841\n f16b35ce-1d93-423c-909a-61d0d5f693f8;20e8c689-ea77-4c27-938a-7392c9dd8841\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n d0abc9c9-e230-4a30-ac87-7847e7fa0789;20e8c689-ea77-4c27-938a-7392c9dd8841\n 24cba909-5cee-4d53-ae8c-95938ad33f89;138f13cd-bc93-4bff-9cbc-97f064086c24\n 92976b82-1442-47c0-a23d-dd1a0178ce0c;20e8c689-ea77-4c27-938a-7392c9dd8841\n 0293a42d-151c-4ca2-9091-4e1dd5400666;20e8c689-ea77-4c27-938a-7392c9dd8841\n 5c99255f-527b-4ab4-a482-10c4441d08f0;20e8c689-ea77-4c27-938a-7392c9dd8841\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;138f13cd-bc93-4bff-9cbc-97f064086c24\n 0d576b32-d148-4660-9d3c-05e19c6b7691;138f13cd-bc93-4bff-9cbc-97f064086c24\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;20e8c689-ea77-4c27-938a-7392c9dd8841\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;20e8c689-ea77-4c27-938a-7392c9dd8841\n b3b260b4-1492-4b1c-81c8-436cdedebaad;20e8c689-ea77-4c27-938a-7392c9dd8841\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;20e8c689-ea77-4c27-938a-7392c9dd8841\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc;8ab20b28-5742-483a-ba66-20b6078c0b62\n 03798623-1bd2-422e-bb17-0f77830aff20;8ab20b28-5742-483a-ba66-20b6078c0b62\n 9735e0ee-c250-4570-b2b9-6388450b3dae;20e8c689-ea77-4c27-938a-7392c9dd8841\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;20e8c689-ea77-4c27-938a-7392c9dd8841\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01;b8e192e1-3a0e-4f12-97ea-361c33eaea6c\n 57e829e1-dc28-4a02-956f-04d36967db37;138f13cd-bc93-4bff-9cbc-97f064086c24\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b;20e8c689-ea77-4c27-938a-7392c9dd8841\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;20e8c689-ea77-4c27-938a-7392c9dd8841\n b213355e-df97-4b43-9e69-8a185817ce57;20e8c689-ea77-4c27-938a-7392c9dd8841\n 5fb48a7c-65db-4581-ab2c-7197305a0811;20e8c689-ea77-4c27-938a-7392c9dd8841\n cb44c440-80f8-4486-bf68-af79d9d716e2;20e8c689-ea77-4c27-938a-7392c9dd8841\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa;20e8c689-ea77-4c27-938a-7392c9dd8841\n d0c8a959-aa18-4a58-a996-96af08a09256;20e8c689-ea77-4c27-938a-7392c9dd8841\n 31cd5301-52f8-4c11-98f8-765ec869a45d;20e8c689-ea77-4c27-938a-7392c9dd8841\n \n \n 08c4afc4-6416-4b23-8046-dd47c21ccaec;1daa0cd2-5790-41a8-b51a-e1bdfa42da53;ea079d52-17ce-4746-8c95-2356a1f9b38c;8465dfc1-e41f-4be5-a9ac-aca7510e673e;8d18452a-35af-43b5-947e-e4237075a71c;3975e2c6-2bed-4088-afda-19059d7dc90f;d97e281c-35cd-4076-a571-92fb24ec9890;42c24c74-5d0d-4254-a419-dd33bc8ace1a\n 60accf57-c086-423f-9068-7c1afdc2de1d;d43bed11-a65d-4885-b093-c68e15b16d79\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99;a7a245b8-7bce-485d-82c2-c74effa8b4e1;5b256307-1522-4bec-9ccb-c16870e43d1f\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;bd03d0aa-1df2-4487-b304-75f5ed88bef5\n 43ecc385-004b-4af0-b1cb-2d14c240e032;a2dea300-9539-4a47-b93d-530fdddc982f;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;0acf267d-20d2-4eb8-b51f-5fea2f6811e3;c2c611de-36e7-4013-97af-1d24484678a1\n 436a30e7-3930-4333-8204-e1bae37af76e;1edf30ce-913d-4138-a962-bf182291a3b2;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;a7a245b8-7bce-485d-82c2-c74effa8b4e1;3975e2c6-2bed-4088-afda-19059d7dc90f;12f721b3-d642-4cdd-985c-9c965ea285ef;5f15b255-bab9-4864-b6fb-19b889dbe46d;2520fdfa-0155-42fb-91a8-1e55d9201b98\n ddf7203d-0229-46d5-badc-e6c35789df3f;0c4e80e7-ee54-4d2e-88ec-53541ad08b04;559abbb3-53e6-4ee6-bf48-17b5e56a0cd7;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;984b5e01-d021-4381-8161-98ec1e78cd3b;60f12d0e-c7ae-461e-94c4-ddab2d03f786;1af43651-d73e-4c1f-abbe-d6d8f88ac711;31feb041-5a63-432d-a1a3-d0907021756c\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;ea079d52-17ce-4746-8c95-2356a1f9b38c;8465dfc1-e41f-4be5-a9ac-aca7510e673e\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb;9545e837-af5b-41ee-adad-c1c0c2932155;3d482503-f306-41a2-b5ed-c808fa8d6011;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;34149888-6c19-4c8e-9f78-cebc46455709;f7eb2f43-91f4-4101-83e8-a84912100c34;5b256307-1522-4bec-9ccb-c16870e43d1f;8b72bc37-af32-4f7f-8381-b386d44b107d;3c0c21e4-eeaa-4cb4-8f4d-63d8157e928b;988cc0d1-c014-4751-bb33-6f00972ed469\n 27384b10-b549-45fc-80c7-94688793e9fc;91a389bb-12c1-4667-9429-6d784ae5f97a;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99;a7a245b8-7bce-485d-82c2-c74effa8b4e1;e213f459-ed5d-4fe0-adad-fa17125c3450\n 7d50376a-ef59-4b6a-804f-79e6880ebd42;0c4e80e7-ee54-4d2e-88ec-53541ad08b04;1d5c2bf9-943f-4863-91a7-6dd93d457123;df73c80e-4d37-4725-bbc2-8ff83f07bea6;7588197c-3535-46f8-ba5f-658b2ef59310\n 24cba909-5cee-4d53-ae8c-95938ad33f89;49d67f33-3783-4ca6-9bc2-a407ea8fd95a;073bcd98-64ae-4634-94eb-185e900c215c;9e73a213-5047-428f-aee2-fa0550bc75c7;416f01f6-2ec5-4684-96b5-904a0fe35ed8;7414bc37-18b4-4d73-8012-dd3fc662bd99;f5429526-470c-436c-bb58-9cae3964f8f5;7dc5b8c8-22b8-4047-a51f-d3d706303aee\n 5c99255f-527b-4ab4-a482-10c4441d08f0;ea079d52-17ce-4746-8c95-2356a1f9b38c;d6782bb2-c971-4a98-aa24-3847ee143895;3975e2c6-2bed-4088-afda-19059d7dc90f;2520fdfa-0155-42fb-91a8-1e55d9201b98\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;3d482503-f306-41a2-b5ed-c808fa8d6011;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;5fe71ba9-94e3-486f-8a45-2a0ca6981eaf;34149888-6c19-4c8e-9f78-cebc46455709;3c0c21e4-eeaa-4cb4-8f4d-63d8157e928b\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;3b351781-0b1f-4b21-bccb-9ea29e7932a2;25687b84-4550-48cb-bea7-4eb626fae8c4;7414bc37-18b4-4d73-8012-dd3fc662bd99;e213f459-ed5d-4fe0-adad-fa17125c3450;a34414c2-9669-4f7f-a3d4-5752536b5eba;ad0222b8-be14-4d9b-bb8d-59ffe559a1f5\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;3f0ea640-5c09-4cb4-8f19-fb5fbae2d0b1;64245294-c22d-46c2-8ad6-746d666e8868;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;58b0d02a-d2ac-498b-b6ca-9bbf752d8f68;3420e4bf-76be-4222-874b-d7aaa8adf120;1c6153c3-9b06-4475-ac66-ab5168d9b448;19be1760-2f48-46f4-9826-94ab329e5772;e0a6c457-2f61-4fd1-9ac9-111505678402\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;0d8aa489-ba02-44ba-9ab1-12420dcb200b;83cb67dd-d6a7-4070-9164-0c5aedf6174b;c084501a-a75d-41f4-914c-5d0a7049c6bc\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;d688f4f9-d82f-4e43-a756-fc3920a60220;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;1db9120c-b80d-4b2b-998d-cd7e03f2409d;8465dfc1-e41f-4be5-a9ac-aca7510e673e;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99;0248fe18-2a62-440a-9991-e90fe2343be7;5b256307-1522-4bec-9ccb-c16870e43d1f;2e217af7-da91-47cd-9063-3713dfa3af69;bf938725-aae2-40e8-a65f-486422497333\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;8c342252-ebd3-4548-a6bb-9e8a36ba8387;dcb312ac-4bb0-4b88-b681-492f4b8e0fef;14b33d32-bf7f-458d-a48b-55a5da05d882\n 31cd5301-52f8-4c11-98f8-765ec869a45d;f50d2630-738a-42fd-b2fa-f7664a90716a;9d618f41-533f-4aad-9c41-353a2a788324;675601b8-7348-4172-b59b-31430dca68b3;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;a14a5847-0f4a-49a3-a234-00aefeff084f\n \n \n f8870bd1-4f3f-4b48-b29b-a7cf3d461475;52052788-e8ca-402c-9d27-fbb85823e647\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d;da24dece-40e5-4886-b225-d92b6884e984\n 43ecc385-004b-4af0-b1cb-2d14c240e032;48ac70f5-b6cf-4517-8471-fd3c7b90c964\n 3ab6253b-74b7-4701-9431-acfe6df2d2be;889ad4b4-64a9-439c-9932-699f5f3878ad\n 436a30e7-3930-4333-8204-e1bae37af76e;889ad4b4-64a9-439c-9932-699f5f3878ad\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8;23d961e4-3993-4ac5-990b-f26896edb650\n ddf7203d-0229-46d5-badc-e6c35789df3f;676f3a30-2aea-4860-8e27-83405e03edeb\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8;8d70c3b3-4980-4866-9efe-1394a51cc5bc\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1;40885ed5-e6e8-432c-a755-8e46dcc41cf7\n 0293a42d-151c-4ca2-9091-4e1dd5400666;95892647-2ad0-4d43-93de-c86e854cb5ac\n 89c1b839-ce76-43f4-be84-84d394af9179;676f3a30-2aea-4860-8e27-83405e03edeb\n 0d576b32-d148-4660-9d3c-05e19c6b7691;b0240fc6-2cc6-4fb1-9e38-f511c7724575\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc;f115bfdf-3d79-40f6-812a-27b8a9afb7d2\n 03798623-1bd2-422e-bb17-0f77830aff20;5ad8fad3-518c-4c14-8838-a7cb3caee20d\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01;2fe7b5dd-b6ec-4f3d-b1d2-f2e193107f6b\n \n \n 515c0c9b-1bbe-4706-aa5e-f62aeaf73271;a85e90b8-b053-4dc1-aa61-6b7ea0f58f7f\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;06059828-2a96-4352-80a9-1abafb422ae7\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;e182783d-3907-4e12-a8d9-dd4037c7c63d\n 60accf57-c086-423f-9068-7c1afdc2de1d;98ea327a-1348-4ab1-af17-55632a26aad2\n e245ae31-ac6d-42fa-aca4-3435cb4bf378;9de3e2ad-4fec-4cb4-a52e-6f54ca933f95\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;f4c370d5-a112-4d11-92e7-c6685741e79a\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;a17f80e8-76e4-4245-b7b1-c8a6d7a7235e\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8;547fb64b-ffbc-4e77-9f4e-117db63563d8\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;1cbaf789-56f9-4286-bf17-556c2e08005b\n 24cba909-5cee-4d53-ae8c-95938ad33f89;bbb324fc-6795-4f4d-b193-fc5f57df7e8c\n 0293a42d-151c-4ca2-9091-4e1dd5400666;890d151a-8b4c-4c09-96be-33715ccc07f4\n 5c99255f-527b-4ab4-a482-10c4441d08f0;24bf0155-d87e-44f7-aabc-49e362270b5f\n b3b260b4-1492-4b1c-81c8-436cdedebaad;81be0346-d1ec-4a69-ab05-687055d9bade\n 57e829e1-dc28-4a02-956f-04d36967db37;d6f5e8dc-6373-4533-820a-1149d38cbfb9\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;e48245dd-1d2d-4401-b639-122b3a82753b\n \n \n e245ae31-ac6d-42fa-aca4-3435cb4bf378;b213355e-df97-4b43-9e69-8a185817ce57\n 0293a42d-151c-4ca2-9091-4e1dd5400666;5fb48a7c-65db-4581-ab2c-7197305a0811\n b3b260b4-1492-4b1c-81c8-436cdedebaad;cb44c440-80f8-4486-bf68-af79d9d716e2\n 30642deb-def4-40a6-86a2-b9ad1c335df6;3012ebe2-c183-4d12-9851-5ab7b6d2421c;31cd5301-52f8-4c11-98f8-765ec869a45d\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;3c9fc64a-c430-4733-a4a1-1e9103e4f8fa\n 9735e0ee-c250-4570-b2b9-6388450b3dae;d0c8a959-aa18-4a58-a996-96af08a09256\n \n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n HMNTS YK.2017.a.1845\n 1389a042-91f8-428a-9349-c5fd166ad96b\n 2\n 0\n 7d6705ad-48de-4613-b9f9-94a06f701cb4\n \n \n _Jane Doe\n 2017-11-09T09:39:30\n _Jane Doe\n 2017-11-09T09:39:30\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Europol 4 25 2017 - EUR 230 million worth.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n
\n \n _Jane Doe\n 2017-11-09T09:43:18\n _Jane Doe\n 2017-11-09T09:43:18\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Millward 3 24 2017 - Alibaba to use blockchain.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n
\n \n _Jane Doe\n 2017-11-09T09:55:27\n _Jane Doe\n 2017-11-09T09:55:27\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/861472798\",\"UriString\":\"http://www.worldcat.org/oclc/861472798\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 60accf57-c086-423f-9068-7c1afdc2de1d\n
\n \n _Jane Doe\n 2017-11-09T09:55:40\n _Jane Doe\n 2017-11-09T10:00:14\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.google.com/patents/US20100216136\",\"UriString\":\"https://www.google.com/patents/US20100216136\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 2485a5d8-95f5-437f-8911-05111eb7e25e\n
\n \n _Jane Doe\n 2017-11-09T09:58:19\n _Jane Doe\n 2017-11-09T09:59:55\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/\",\"UriString\":\"https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 27dd2250-00b8-4587-8456-c68d0ca5af8a\n
\n \n _Jane Doe\n 2017-11-09T09:58:39\n _Jane Doe\n 2017-11-09T09:58:39\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/967319191\",\"UriString\":\"http://www.worldcat.org/oclc/967319191\",\"LinkedResourceStatus\":8}
\n 0\n 0\n e245ae31-ac6d-42fa-aca4-3435cb4bf378\n
\n \n _Jane Doe\n 2017-11-09T09:58:54\n _Jane Doe\n 2017-11-09T09:59:36\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf\",\"UriString\":\"https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n
\n \n _Jane Doe\n 2017-11-09T09:59:10\n _Jane Doe\n 2017-11-09T09:59:15\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud\",\"UriString\":\"https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n
\n \n _Jane Doe\n 2017-11-09T10:00:48\n _Jane Doe\n 2017-11-09T10:00:48\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/935194461\",\"UriString\":\"http://www.worldcat.org/oclc/935194461\",\"LinkedResourceStatus\":8}
\n 0\n 0\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4\n
\n \n _Jane Doe\n 2017-11-09T10:01:00\n _Jane Doe\n 2017-11-09T10:01:00\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://hdl.handle.net/11299/153189\",\"UriString\":\"http://hdl.handle.net/11299/153189\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 43ecc385-004b-4af0-b1cb-2d14c240e032\n
\n \n _Jane Doe\n 2017-11-09T10:01:15\n _Jane Doe\n 2017-11-09T10:01:15\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf\",\"UriString\":\"https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 3ab6253b-74b7-4701-9431-acfe6df2d2be\n
\n \n _Jane Doe\n 2017-11-09T10:01:57\n _Jane Doe\n 2017-11-09T10:01:57\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf\",\"UriString\":\"https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 436a30e7-3930-4333-8204-e1bae37af76e\n
\n \n _Jane Doe\n 2017-11-09T10:02:07\n _Jane Doe\n 2017-11-09T10:02:07\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"27236872\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/27236872\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 436a30e7-3930-4333-8204-e1bae37af76e\n
\n \n _Jane Doe\n 2017-11-09T10:02:20\n _Jane Doe\n 2017-11-09T10:02:20\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/\",\"UriString\":\"http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 1810f594-4e9e-47b4-905f-445171ad46c6\n
\n \n _Jane Doe\n 2017-11-09T10:02:33\n _Jane Doe\n 2017-11-09T10:02:33\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf\",\"UriString\":\"http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n
\n \n _Jane Doe\n 2017-11-09T10:02:49\n _Jane Doe\n 2017-11-09T10:02:49\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Némorin 07 2014 - GFSI Position on Mitigating the Public.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n
\n \n _Jane Doe\n 2017-11-09T10:03:12\n _Jane Doe\n 2017-11-09T10:03:12\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www-03.ibm.com/press/us/en/pressrelease/50816.wss\",\"UriString\":\"https://www-03.ibm.com/press/us/en/pressrelease/50816.wss\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n ddf7203d-0229-46d5-badc-e6c35789df3f\n
\n \n _Jane Doe\n 2017-11-09T10:03:33\n _Jane Doe\n 2017-11-09T10:03:33\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.iso.org/standard/35466.html\",\"UriString\":\"https://www.iso.org/standard/35466.html\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8\n
\n \n _Jane Doe\n 2017-11-09T10:04:09\n _Jane Doe\n 2017-11-09T10:04:09\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.iso.org/standard/35466.html\",\"UriString\":\"https://www.iso.org/standard/35466.html\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3\n
\n \n _Jane Doe\n 2017-11-09T10:04:39\n _Jane Doe\n 2017-11-09T10:04:39\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.4018/978-1-5225-2107-5.ch005\",\"UriString\":\"https://doi.org/10.4018/978-1-5225-2107-5.ch005\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n cb44c440-80f8-4486-bf68-af79d9d716e2\n
\n \n _Jane Doe\n 2017-11-09T10:05:04\n _Jane Doe\n 2017-11-09T10:05:04\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1108/02635570710723804\",\"UriString\":\"https://doi.org/10.1108/02635570710723804\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f\n
\n \n _Jane Doe\n 2017-11-09T10:05:27\n _Jane Doe\n 2017-11-09T10:05:27\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide\",\"UriString\":\"https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb\n
\n \n _Jane Doe\n 2017-11-09T10:05:51\n _Jane Doe\n 2017-11-09T10:05:51\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food Safety.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n
\n \n _Jane Doe\n 2017-11-09T10:06:34\n _Jane Doe\n 2017-11-09T10:06:34\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1111/1750-3841.13256\",\"UriString\":\"https://doi.org/10.1111/1750-3841.13256\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n
\n \n _Jane Doe\n 2017-11-09T10:06:43\n _Jane Doe\n 2017-11-09T10:06:43\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"26934423\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/26934423\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n
\n \n _Jane Doe\n 2017-11-09T10:07:12\n _Jane Doe\n 2017-11-09T10:07:12\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1186/s12889-017-4118-x\",\"UriString\":\"https://doi.org/10.1186/s12889-017-4118-x\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n bc5000cc-1af0-4d23-837f-422c907de172\n
\n \n _Jane Doe\n 2017-11-09T10:07:19\n _Jane Doe\n 2017-11-09T10:07:19\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"28193265\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/28193265\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n bc5000cc-1af0-4d23-837f-422c907de172\n
\n \n _Jane Doe\n 2017-11-09T10:07:40\n _Jane Doe\n 2017-11-09T10:07:40\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.techinasia.com/alibaba-fake-food-detection-blockchain\",\"UriString\":\"https://www.techinasia.com/alibaba-fake-food-detection-blockchain\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n
\n \n _Jane Doe\n 2017-11-09T10:07:51\n _Jane Doe\n 2017-11-09T10:07:51\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"27979084\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/27979084\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n f16b35ce-1d93-423c-909a-61d0d5f693f8\n
\n \n _Jane Doe\n 2017-11-09T10:08:01\n _Jane Doe\n 2017-11-09T10:08:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf\",\"UriString\":\"http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n
\n \n _Jane Doe\n 2017-11-09T10:08:18\n _Jane Doe\n 2017-11-09T10:08:18\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU\",\"UriString\":\"https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n e365933e-9b5b-4bb1-ae02-326f41d2833a\n
\n \n _Jane Doe\n 2017-11-09T10:08:32\n _Jane Doe\n 2017-11-09T10:08:32\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"28231211\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/28231211\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n d0abc9c9-e230-4a30-ac87-7847e7fa0789\n
\n \n _Jane Doe\n 2017-11-09T10:08:37\n _Jane Doe\n 2017-11-09T10:08:37\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"PMC5224536\",\"UriString\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5224536\",\"LinkedResourceStatus\":8}
\n 0\n PmcId\n 0\n d0abc9c9-e230-4a30-ac87-7847e7fa0789\n
\n \n _Jane Doe\n 2017-11-09T10:09:42\n _Jane Doe\n 2017-11-09T10:09:42\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://gso.gbv.de/DB=2.1/PPNSET?PPN=859218589\",\"UriString\":\"http://gso.gbv.de/DB=2.1/PPNSET?PPN=859218589\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 24cba909-5cee-4d53-ae8c-95938ad33f89\n
\n \n _Jane Doe\n 2017-11-09T10:09:57\n _Jane Doe\n 2017-11-09T10:09:57\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf\",\"UriString\":\"http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 0293a42d-151c-4ca2-9091-4e1dd5400666\n
\n \n _Jane Doe\n 2017-11-09T10:10:19\n _Jane Doe\n 2017-11-09T10:10:19\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/\",\"UriString\":\"https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 89c1b839-ce76-43f4-be84-84d394af9179\n
\n \n _Jane Doe\n 2017-11-09T10:10:35\n _Jane Doe\n 2017-11-09T10:10:35\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Ramamurthy 11 16 2016 - Leveraging blockchain to improve food.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 89c1b839-ce76-43f4-be84-84d394af9179\n
\n \n _Jane Doe\n 2017-11-09T10:10:44\n _Jane Doe\n 2017-11-09T10:10:44\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast\",\"UriString\":\"https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n
\n \n _Jane Doe\n 2017-11-09T10:10:54\n _Jane Doe\n 2017-11-09T10:10:54\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://sciex.com/products/software/markerview-software\",\"UriString\":\"https://sciex.com/products/software/markerview-software\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n d69a676f-1c2b-425b-bc36-ea52e1409bb2\n
\n \n _Jane Doe\n 2017-11-09T10:11:01\n _Jane Doe\n 2017-11-09T10:11:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/\",\"UriString\":\"http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 0d576b32-d148-4660-9d3c-05e19c6b7691\n
\n \n _Jane Doe\n 2017-11-09T10:11:09\n _Jane Doe\n 2017-11-09T10:11:09\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"22416717\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/22416717\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n
\n \n _Jane Doe\n 2017-11-09T10:11:21\n _Jane Doe\n 2017-11-09T10:11:21\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defining the public health threat.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n
\n \n _Jane Doe\n 2017-11-09T10:11:34\n _Jane Doe\n 2017-11-09T10:11:34\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"26190607\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/26190607\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d\n
\n \n _Jane Doe\n 2017-11-09T10:12:01\n _Jane Doe\n 2017-11-09T10:12:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1016/j.foodchem.2014.09.106\",\"UriString\":\"https://doi.org/10.1016/j.foodchem.2014.09.106\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d\n
\n \n _Jane Doe\n 2017-11-09T10:12:30\n _Jane Doe\n 2017-11-09T10:12:30\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1109/ICSSSM.2016.7538424\",\"UriString\":\"https://doi.org/10.1109/ICSSSM.2016.7538424\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa\n
\n \n _Jane Doe\n 2017-11-09T10:13:04\n _Jane Doe\n 2017-11-09T10:13:04\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1080/10408347.2014.966185\",\"UriString\":\"https://doi.org/10.1080/10408347.2014.966185\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf\n
\n \n _Jane Doe\n 2017-11-09T10:13:09\n _Jane Doe\n 2017-11-09T10:13:09\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"25633422\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/25633422\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf\n
\n \n _Jane Doe\n 2017-11-09T10:13:24\n _Jane Doe\n 2017-11-09T10:13:24\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf\",\"UriString\":\"https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc\n
\n \n _Jane Doe\n 2017-11-09T10:13:32\n _Jane Doe\n 2017-11-09T10:13:32\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"United States Congress 1 4 2017 - FDA Food Safety Modernization Act.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc\n
\n \n _Jane Doe\n 2017-11-09T10:13:40\n _Jane Doe\n 2017-11-09T10:13:40\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://supreme.justia.com/cases/federal/us/232/399/\",\"UriString\":\"https://supreme.justia.com/cases/federal/us/232/399/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 03798623-1bd2-422e-bb17-0f77830aff20\n
\n \n _Jane Doe\n 2017-11-09T10:14:02\n _Jane Doe\n 2017-11-09T10:14:02\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.3390/ijerph13010067\",\"UriString\":\"https://doi.org/10.3390/ijerph13010067\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n d0c8a959-aa18-4a58-a996-96af08a09256\n
\n \n _Jane Doe\n 2017-11-09T10:14:21\n _Jane Doe\n 2017-11-09T10:14:21\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"26758743\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/26758743\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n
\n \n _Jane Doe\n 2017-11-09T10:14:18\n _Jane Doe\n 2017-11-09T10:14:18\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1007/s11427-015-4979-0\",\"UriString\":\"https://doi.org/10.1007/s11427-015-4979-0\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n
\n \n _Jane Doe\n 2017-11-09T10:14:29\n _Jane Doe\n 2017-11-09T10:14:29\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Wang, He et al.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n
\n \n _Jane Doe\n 2017-11-09T10:14:45\n _Jane Doe\n 2017-11-09T10:14:45\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1108/BFJ-06-2016-0263\",\"UriString\":\"https://doi.org/10.1108/BFJ-06-2016-0263\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 31cd5301-52f8-4c11-98f8-765ec869a45d\n
\n \n _Jane Doe\n 2017-11-09T10:15:06\n _Jane Doe\n 2017-11-09T10:15:06\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://en.wikipedia.org/w/index.php?oldid=781647563\",\"UriString\":\"https://en.wikipedia.org/w/index.php?oldid=781647563\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01\n
\n \n _Jane Doe\n 2017-11-09T10:15:12\n _Jane Doe\n 2017-11-09T10:15:12\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://en.wikipedia.org/wiki/2008_Chinese_milk_scandal\",\"UriString\":\"https://en.wikipedia.org/wiki/2008_Chinese_milk_scandal\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01\n
\n \n _Jane Doe\n 2017-11-09T10:15:21\n _Jane Doe\n 2017-11-09T10:15:21\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html\",\"UriString\":\"http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 57e829e1-dc28-4a02-956f-04d36967db37\n
\n \n _Jane Doe\n 2017-11-09T10:15:33\n _Jane Doe\n 2017-11-09T10:15:33\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.journals.cambridge.org/abstract_S0021911812000678\",\"UriString\":\"http://www.journals.cambridge.org/abstract_S0021911812000678\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b\n
\n \n _Jane Doe\n 2017-11-09T10:15:46\n _Jane Doe\n 2017-11-09T10:15:46\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/958898445\",\"UriString\":\"http://www.worldcat.org/oclc/958898445\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 26c0c55a-7828-45c1-a29c-f85a34eb8676\n
\n \n _Jane Doe\n 2017-11-09T10:16:38\n _Jane Doe\n 2017-11-09T10:16:38\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1136/bmj.f3385\",\"UriString\":\"https://doi.org/10.1136/bmj.f3385\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n
\n \n _Jane Doe\n 2017-11-09T10:16:42\n _Jane Doe\n 2017-11-09T10:16:42\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"23716434\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/23716434\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n
\n \n _Jane Doe\n 2017-11-09T10:17:17\n _Jane Doe\n 2017-11-09T10:17:17\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1002/jsfa.8364\",\"UriString\":\"https://doi.org/10.1002/jsfa.8364\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n
\n \n _Jane Doe\n 2017-11-09T10:52:16\n _Jane Doe\n 2018-07-12T11:35:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1016/j.tifs.2015.10.007\",\"UriString\":\"https://doi.org/10.1016/j.tifs.2015.10.007\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n
\n \n _Jane Doe\n 2019-04-25T11:16:46\n _Jane Doe\n 2019-04-25T11:16:47\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Agbaraji, Ochulor et al.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n
\n \n _Jennifer Schultz\n 2020-01-10T08:24:49\n _Jennifer Schultz\n 2020-01-10T08:24:50\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede&region=caption&pgtype=article\",\"UriString\":\"https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede&region=caption&pgtype=article\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 09bd55a6-be76-417d-9682-f1a5a07d28d7\n
\n
\n \n \n _Jane Doe\n 2017-11-09T11:30:15\n _Jane Doe\n 2017-11-09T11:30:15\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":141.12840000000003,\"X2\":569.5451065,\"Y1\":698.0221889723075,\"Y2\":707.04677186461527},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.5759866599999,\"Y1\":686.07005897230772,\"Y2\":695.09464186461548},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.51421854000046,\"Y1\":674.10895897230773,\"Y2\":683.13354186461549},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.5550652,\"Y1\":662.15682897230761,\"Y2\":671.18141186461537},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.55506519999983,\"Y1\":650.2046989723076,\"Y2\":659.22928186461536},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57897544000025,\"Y1\":638.24359897230761,\"Y2\":647.26818186461537},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.58893804,\"Y1\":626.2914689723076,\"Y2\":635.31605186461536},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57997170000021,\"Y1\":614.33933897230759,\"Y2\":623.36392186461535},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57299788000023,\"Y1\":602.37823897230771,\"Y2\":611.40282186461548},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57598666000013,\"Y1\":590.42610897230759,\"Y2\":599.45069186461535},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.5191998400004,\"Y1\":578.4739789723078,\"Y2\":587.49856186461557},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57698292000009,\"Y1\":566.51287897230748,\"Y2\":575.53746186461524},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.53514072951384,\"Y1\":554.56074897230758,\"Y2\":563.59514119384608},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3089,\"X2\":569.58296422,\"Y1\":542.59964897230759,\"Y2\":551.62423186461535},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3089,\"X2\":183.85201368000003,\"Y1\":532.85461804923079,\"Y2\":539.67210186461546},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.58893804,\"Y1\":532.85461804923079,\"Y2\":707.04677186461527}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:04:22\n _Jane Doe\n 2017-11-09T11:04:22\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":521.88480879680026,\"Y1\":561.00753686153871,\"Y2\":569.45010455384613},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":506.708816,\"Y1\":547.4827518769232,\"Y2\":555.9003045538459},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":500.74675224224052,\"Y1\":533.9079368615387,\"Y2\":542.35050455384612},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":462.26533650200031,\"Y1\":520.35813686153847,\"Y2\":528.80070455384634},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":521.88480879680026,\"Y1\":520.35813686153847,\"Y2\":569.45010455384613}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:04:34\n _Jane Doe\n 2017-11-09T11:04:34\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":162.77703927872,\"X2\":515.38081807807953,\"Y1\":449.98672941538484,\"Y2\":458.34174455384596},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":68.237298839840008,\"Y1\":438.11710461538473,\"Y2\":443.95394153846178},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":162.77703927872,\"X2\":515.38081807807953,\"Y1\":449.98672941538484,\"Y2\":458.34174455384596},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":68.237298839840008,\"Y1\":438.11710461538473,\"Y2\":443.95394153846178}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:04:45\n _Jane Doe\n 2017-11-09T11:04:45\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":519.71662400000048,\"Y1\":336.08085686153845,\"Y2\":344.5234245538461},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":519.716488502,\"Y1\":322.53105686153845,\"Y2\":330.97362455384609},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":510.50264076176006,\"Y1\":308.95207267692308,\"Y2\":317.42382455384609},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":139.78025367968004,\"Y1\":295.45647187692293,\"Y2\":303.786472},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":519.71662400000048,\"Y1\":295.45647187692293,\"Y2\":344.5234245538461}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:05:47\n _Jane Doe\n 2017-11-09T11:05:47\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":157.12401935936003,\"Y1\":177.47210952307682,\"Y2\":187.39368999999988},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":517.00666400000023,\"Y1\":160.0210094153847,\"Y2\":168.37602455384604},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":488.28097960160051,\"Y1\":146.38365686153861,\"Y2\":154.82622455384603},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":517.00695125576021,\"Y1\":132.8588718769231,\"Y2\":141.27642455384603},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":522.42684415615986,\"Y1\":119.37160941538468,\"Y2\":127.72662455384602},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":514.83876645896,\"Y1\":105.7342568615386,\"Y2\":114.17682455384602},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":229.75092567967997,\"Y1\":92.272009415384673,\"Y2\":100.62702455384601},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":204.27724748048004,\"Y1\":61.540281296153807,\"Y2\":71.511370657692169},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":196.68929444144004,\"Y1\":45.714896615384532,\"Y2\":52.3021839999999},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":498.03686270119994,\"Y1\":812.01840886153855,\"Y2\":820.46097655384619},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":508.87700079679985,\"Y1\":798.46860886153854,\"Y2\":806.91117655384619},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":519.71658064064047,\"Y1\":784.91880886153854,\"Y2\":793.36137655384618},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":443.83785239840006,\"Y1\":771.36900886153876,\"Y2\":779.81157655384618},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":296.41592000000009,\"Y1\":740.67037352307693,\"Y2\":750.69592265769234},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":523.5588026822694,\"Y1\":722.9941382769232,\"Y2\":731.89531458461556},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":512.12875767967989,\"Y1\":709.58192086153872,\"Y2\":718.02448855384614},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":521.88436436336,\"Y1\":696.03212086153871,\"Y2\":704.47468855384614},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":490.99083120320034,\"Y1\":682.48232086153871,\"Y2\":690.92488855384613},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":518.632775498,\"Y1\":668.93252086153871,\"Y2\":677.37508855384613},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":503.99885600000033,\"Y1\":655.3827208615387,\"Y2\":663.82528855384612},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":144.11621135936,\"Y1\":643.60064861538467,\"Y2\":650.27548855384612},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":40.978710906559996,\"X2\":115.39054864064002,\"Y1\":472.92632552307691,\"Y2\":482.84790600000019},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":512.128465004,\"Y1\":455.25009027692317,\"Y2\":464.15126658461554},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":501.28904775775976,\"Y1\":441.70029027692317,\"Y2\":450.60146658461554},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":493.1592598963997,\"Y1\":428.31308787692319,\"Y2\":436.73064055384611},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":526.22057135935984,\"Y1\":414.73827286153869,\"Y2\":423.18084055384611},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":117.55859793943999,\"Y1\":401.27602541538477,\"Y2\":409.543488},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":106.17677135935999,\"Y1\":370.48983752307686,\"Y2\":380.41141800000014},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":514.29642216416,\"Y1\":352.81360227692335,\"Y2\":361.71477858461549},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":524.5945194804799,\"Y1\":339.26380227692334,\"Y2\":348.16497858461548},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":494.24286992191981,\"Y1\":325.87659987692314,\"Y2\":334.29415255384629},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":512.12873600000012,\"Y1\":312.32679987692313,\"Y2\":320.74435255384628},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":481.77743873623979,\"Y1\":298.75198486153863,\"Y2\":307.19455255384628},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":515.38057960160018,\"Y1\":285.22719987692312,\"Y2\":293.64475255384627},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":471.47933599999971,\"Y1\":271.65238486153839,\"Y2\":280.00740000000019},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.0525600000002,\"Y1\":806.9923508615384,\"Y2\":815.43491855384616},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":521.34273007808,\"Y1\":793.467565876923,\"Y2\":801.797566},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":511.58642964463991,\"Y1\":779.89275086153839,\"Y2\":788.33531855384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.96859767967987,\"Y1\":766.34295086153838,\"Y2\":774.78551855384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":516.4649971952,\"Y1\":752.818165876923,\"Y2\":761.23571855384614},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":233.00293729880002,\"Y1\":739.268365876923,\"Y2\":747.68591855384614},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":148.45212567968,\"Y1\":708.59917529615382,\"Y2\":718.46629599999994},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":516.46480749799957,\"Y1\":691.00606286153845,\"Y2\":699.4486305538461},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":512.12875767968012,\"Y1\":677.45626286153845,\"Y2\":685.811278},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":514.29659560160007,\"Y1\":663.90646286153844,\"Y2\":672.34903055384609},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":268.2322059219199,\"Y1\":650.219080276923,\"Y2\":659.12025658461539},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":151.16206400000002,\"Y1\":619.7619961807693,\"Y2\":629.579608},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.42677911712008,\"Y1\":601.981792276923,\"Y2\":610.88296858461536},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.59448696096024,\"Y1\":588.5695748615384,\"Y2\":597.012142553846},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":507.2506670820801,\"Y1\":575.01977486153839,\"Y2\":583.462342553846},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.96877111711979,\"Y1\":561.46997486153839,\"Y2\":569.91254255384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":230.83484464064003,\"Y1\":547.92017486153838,\"Y2\":556.36274255384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":40.959643628,\"X2\":66.06932,\"Y1\":519.32071623076922,\"Y2\":527.14312},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":525.13637056256039,\"Y1\":499.68288686153852,\"Y2\":508.12545455384617},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":503.45708079680008,\"Y1\":486.13308686153852,\"Y2\":494.57565455384616},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.42631300399989,\"Y1\":472.60830187692312,\"Y2\":481.02585455384622},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":511.58644048448036,\"Y1\":459.03348686153851,\"Y2\":467.47605455384621},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":369.58487793944,\"Y1\":445.4836868615385,\"Y2\":453.92625455384621},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":183.68158400000004,\"Y1\":22.585433296153951,\"Y2\":32.452554000000077},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":522.42684415615986,\"Y1\":92.272009415384673,\"Y2\":187.39368999999988},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":204.27724748048004,\"Y1\":45.714896615384532,\"Y2\":71.511370657692169},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":519.71658064064047,\"Y1\":771.36900886153876,\"Y2\":820.46097655384619},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":523.5588026822694,\"Y1\":643.60064861538467,\"Y2\":750.69592265769234},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":526.22057135935984,\"Y1\":401.27602541538477,\"Y2\":482.84790600000019},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":524.5945194804799,\"Y1\":271.65238486153839,\"Y2\":380.41141800000014},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":183.68158400000004,\"Y1\":22.585433296153951,\"Y2\":32.452554000000077},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.0525600000002,\"Y1\":739.268365876923,\"Y2\":815.43491855384616},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":516.46480749799957,\"Y1\":650.219080276923,\"Y2\":718.46629599999994},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.59448696096024,\"Y1\":547.92017486153838,\"Y2\":629.579608},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":525.13637056256039,\"Y1\":445.4836868615385,\"Y2\":527.14312}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:06:41\n _Jane Doe\n 2017-11-09T11:06:41\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":54.056990781939788,\"X2\":395.614537633432,\"Y1\":320.39400621960817,\"Y2\":562.66204751728492},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":54.056990781939788,\"X2\":395.614537633432,\"Y1\":320.39400621960817,\"Y2\":562.66204751728492}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:07:01\n _Jane Doe\n 2017-11-09T11:07:01\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":528.34608000000014,\"X2\":545.36976000000016,\"Y1\":689.45242187499991,\"Y2\":698.966875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.35872000000006,\"Y1\":673.9724218749999,\"Y2\":683.48687499999994},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.71976,\"Y1\":658.612421875,\"Y2\":668.126875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.63143999999988,\"Y1\":643.132421875,\"Y2\":652.646875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.7796,\"Y1\":627.652421875,\"Y2\":637.166875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":432.75071999999994,\"Y1\":612.292421875,\"Y2\":621.806875},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.7796,\"Y1\":612.292421875,\"Y2\":698.966875}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:07:16\n _Jane Doe\n 2017-11-09T11:07:16\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.79112,\"Y1\":709.1378125,\"Y2\":718.646875},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.7316,\"Y1\":693.652421875,\"Y2\":703.166875},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.6655199999999,\"Y1\":678.17242187499994,\"Y2\":687.686875},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":302.54495999999989,\"Y1\":662.812421875,\"Y2\":672.32687500000009},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.79112,\"Y1\":662.812421875,\"Y2\":718.646875}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:07:47\n _Jane Doe\n 2017-11-09T11:07:47\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":304.52983,\"X2\":539.64315320000026,\"Y1\":459.617692533077,\"Y2\":468.19107345615396},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.63179375,\"Y1\":448.6559025330771,\"Y2\":457.22928345615406},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64693695000017,\"Y1\":437.702642533077,\"Y2\":446.27602345615395},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64315115,\"Y1\":428.8376033023078,\"Y2\":435.314233456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65356210000016,\"Y1\":417.87582330230777,\"Y2\":424.35245345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65166920000013,\"Y1\":406.92255330230779,\"Y2\":413.399183456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66018725,\"Y1\":393.86402253307705,\"Y2\":402.437403456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64788340000018,\"Y1\":383.71182130230784,\"Y2\":391.47562345615404},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66870530000017,\"Y1\":371.94897253307704,\"Y2\":380.522353456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6573479000001,\"Y1\":360.987192533077,\"Y2\":369.560573456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6422047,\"Y1\":350.025402533077,\"Y2\":358.59878345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6497763000001,\"Y1\":339.072142533077,\"Y2\":347.64552345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":404.2790328,\"Y1\":330.20710330230776,\"Y2\":336.68373345615396},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66870530000017,\"Y1\":330.20710330230776,\"Y2\":468.19107345615396}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:08:04\n _Jane Doe\n 2017-11-09T11:08:04\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":304.52983,\"X2\":539.64504610000006,\"Y1\":317.148572533077,\"Y2\":325.721953456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65261565,\"Y1\":306.19530253307704,\"Y2\":314.768683456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.63652599999978,\"Y1\":295.233522533077,\"Y2\":303.806903456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64220470000009,\"Y1\":284.27173253307694,\"Y2\":292.84511345615391},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64220470000009,\"Y1\":273.47980585615392,\"Y2\":281.89185345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65072275,\"Y1\":262.51801585615397,\"Y2\":270.930063456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64504405,\"Y1\":251.39490253307704,\"Y2\":259.968283456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6497763000001,\"Y1\":240.44163253307707,\"Y2\":249.01501345615398},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.68100915000014,\"Y1\":229.47985253307709,\"Y2\":238.053233456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.61286475,\"Y1\":218.52658253307703,\"Y2\":227.09996345615394},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66113370000016,\"Y1\":207.56480253307703,\"Y2\":216.13818345615394},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6478834,\"Y1\":196.60302253307705,\"Y2\":205.17640345615396},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.63368665000007,\"Y1\":185.64975253307711,\"Y2\":194.22313345615402},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66208015000007,\"Y1\":174.68797253307704,\"Y2\":183.26135345615396},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6488298500002,\"Y1\":163.72618253307704,\"Y2\":172.29956345615395},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6374724499999,\"Y1\":152.77292253307706,\"Y2\":161.34630345615398},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6516692,\"Y1\":141.81113253307703,\"Y2\":150.38451345615394},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6516692,\"Y1\":130.84935253307708,\"Y2\":139.422733456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":540.99278885000012,\"Y1\":119.89608253307705,\"Y2\":128.469463456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":424.2983432,\"Y1\":108.93430253307703,\"Y2\":117.50768345615396},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":295.566,\"X2\":540.99278885000012,\"Y1\":108.93430253307703,\"Y2\":325.721953456154}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:08:23\n _Jane Doe\n 2017-11-09T11:08:23\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":304.52983,\"X2\":539.64220675,\"Y1\":97.97252253307704,\"Y2\":106.54590345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6573479000001,\"Y1\":87.019252533077037,\"Y2\":95.592633456153962},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.62138279999988,\"Y1\":76.057472533077046,\"Y2\":84.630853456153972},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6573479000001,\"Y1\":76.057472533077046,\"Y2\":106.54590345615397}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:12\n _Jane Doe\n 2017-11-09T11:09:12\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":248.14699909999996,\"X2\":288.77336535,\"Y1\":511.11637252307685,\"Y2\":519.68975344615376},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78188340000008,\"Y1\":500.1545825230769,\"Y2\":508.72796344615386},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78472275000018,\"Y1\":489.19280252307686,\"Y2\":497.76618344615383},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":237.70103045000013,\"Y1\":478.23953252307683,\"Y2\":486.8129134461538},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78472275000018,\"Y1\":478.23953252307683,\"Y2\":519.68975344615376}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:24\n _Jane Doe\n 2017-11-09T11:09:24\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":239.70466510000011,\"X2\":288.79513370000012,\"Y1\":478.23953252307683,\"Y2\":486.8129134461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78093695000007,\"Y1\":467.2777525230768,\"Y2\":475.85113344615377},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78850855000019,\"Y1\":456.31597252307688,\"Y2\":464.88935344615385},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.7733673,\"Y1\":445.3627025230769,\"Y2\":453.93608344615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.79134790000006,\"Y1\":434.40092252307693,\"Y2\":442.9743034461539},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.76200795000017,\"Y1\":423.43913252307692,\"Y2\":432.01251344615389},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77999050000005,\"Y1\":412.48587252307692,\"Y2\":421.05925344615389},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77715115000012,\"Y1\":401.52408252307691,\"Y2\":410.09746344615388},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.79891950000012,\"Y1\":390.56230252307694,\"Y2\":399.13568344615391},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.7790440500001,\"Y1\":379.60903252307691,\"Y2\":388.18241344615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77620470000011,\"Y1\":368.64725252307693,\"Y2\":377.2206334461539},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78661565000004,\"Y1\":357.6939825230769,\"Y2\":366.26736344615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77715115000007,\"Y1\":346.73220252307692,\"Y2\":355.30558344615389},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78472275000007,\"Y1\":335.77042252307689,\"Y2\":344.34380344615386},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":177.02033515000005,\"Y1\":324.81715252307686,\"Y2\":333.39053344615382},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.79891950000012,\"Y1\":324.81715252307686,\"Y2\":486.8129134461538}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:42\n _Jane Doe\n 2017-11-09T11:09:42\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":481.35072445000014,\"X2\":540.85025015000019,\"Y1\":149.01963252307695,\"Y2\":157.59301344615386},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.75417,\"X2\":540.94868095000015,\"Y1\":138.06637252307689,\"Y2\":146.6397534461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.75417,\"X2\":540.84078565,\"Y1\":127.1045825230769,\"Y2\":135.67796344615383},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.75417,\"X2\":494.26124890000011,\"Y1\":116.14280252307691,\"Y2\":124.71618344615383},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":296.75417,\"X2\":540.94868095000015,\"Y1\":116.14280252307691,\"Y2\":157.59301344615386}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:59\n _Jane Doe\n 2017-11-09T11:09:59\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.908456409196525,\"X2\":547.08673055365909,\"Y1\":431.62871105012982,\"Y2\":754.91036047448233},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.908456409196525,\"X2\":547.08673055365909,\"Y1\":431.62871105012982,\"Y2\":754.91036047448233}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:10:20\n _Jane Doe\n 2017-11-09T11:10:20\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":304.52983,\"X2\":539.6355816,\"Y1\":244.38514252307692,\"Y2\":252.95852344615383},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":295.566,\"X2\":539.62611505000007,\"Y1\":233.42336252307695,\"Y2\":241.99674344615386},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":295.566,\"X2\":539.64031180000006,\"Y1\":222.47009252307691,\"Y2\":231.04347344615383},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":295.566,\"X2\":465.83140855,\"Y1\":211.50831252307691,\"Y2\":220.08169344615382},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":295.566,\"X2\":539.64031180000006,\"Y1\":211.50831252307691,\"Y2\":252.95852344615383}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:10:42\n _Jane Doe\n 2017-11-09T11:10:42\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":41.61513163766238,\"X2\":546.41006174654274,\"Y1\":334.73451460435217,\"Y2\":743.23266575981006},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":41.61513163766238,\"X2\":546.41006174654274,\"Y1\":334.73451460435217,\"Y2\":743.23266575981006}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:11:26\n _Jane Doe\n 2017-11-09T11:11:26\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":454.5964006,\"X2\":539.6406118,\"Y1\":94.39025252307691,\"Y2\":102.96363344615384},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.64061180000022,\"Y1\":83.436982523076921,\"Y2\":92.010363446153846},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.6406118,\"Y1\":72.4752025230769,\"Y2\":81.048583446153827},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.63209375000008,\"Y1\":61.51341252307693,\"Y2\":70.086793446153848},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":44.7,\"X2\":288.79229435000008,\"Y1\":372.16400129230766,\"Y2\":379.92780344615386},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":44.7,\"X2\":120.09136765000001,\"Y1\":360.39264252307692,\"Y2\":368.96602344615388},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.64061180000022,\"Y1\":61.51341252307693,\"Y2\":102.96363344615384},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":44.7,\"X2\":288.79229435000008,\"Y1\":360.39264252307692,\"Y2\":379.92780344615386}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:11:44\n _Jane Doe\n 2017-11-09T11:11:44\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":38.231787602080068,\"X2\":548.440068167892,\"Y1\":56.405941423992317,\"Y2\":270.79983863637653},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":38.231787602080068,\"X2\":548.440068167892,\"Y1\":56.405941423992317,\"Y2\":270.79983863637653}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:12:23\n _Jane Doe\n 2017-11-09T11:12:23\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":7,\"X1\":304.53011999999995,\"X2\":539.63303225,\"Y1\":686.45570252307687,\"Y2\":695.02908344615378},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64818339999988,\"Y1\":675.50243252307689,\"Y2\":684.0758134461538},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.67563045,\"Y1\":664.54065252307691,\"Y2\":673.11403344615383},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.66143370000009,\"Y1\":653.578862523077,\"Y2\":662.15224344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64912985000012,\"Y1\":642.62560252307685,\"Y2\":651.19898344615376},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63398664999988,\"Y1\":631.6638125230769,\"Y2\":640.23719344615381},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63020084999994,\"Y1\":620.70203252307681,\"Y2\":629.27541344615372},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.66711240000006,\"Y1\":609.74876252307683,\"Y2\":618.32214344615375},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64629050000008,\"Y1\":598.78698252307686,\"Y2\":607.36036344615377},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":414.15932434999996,\"Y1\":587.986525846154,\"Y2\":596.39857344615393},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63020085,\"Y1\":562.99413252307693,\"Y2\":571.56751344615384},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64818340000011,\"Y1\":552.04087252307693,\"Y2\":560.61425344615384},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.6311473,\"Y1\":541.07908252307686,\"Y2\":549.65246344615377},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":427.83552684999995,\"Y1\":530.11730252307689,\"Y2\":538.6906834461538},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":304.53011999999995,\"X2\":539.65953285,\"Y1\":506.28569252307688,\"Y2\":514.85907344615384},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64723695000009,\"Y1\":495.3324225230769,\"Y2\":503.90580344615387},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.75323935000006,\"Y1\":484.37064252307692,\"Y2\":492.94402344615389},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63777245000017,\"Y1\":473.40885252307692,\"Y2\":481.98223344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64912985000012,\"Y1\":462.45559252307692,\"Y2\":471.02897344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.6708982,\"Y1\":451.49380252307691,\"Y2\":460.06718344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.6481834,\"Y1\":440.53202252307693,\"Y2\":449.1054034461539},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":367.31099579999994,\"Y1\":429.57875252307684,\"Y2\":438.15213344615381},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.67563045,\"Y1\":587.986525846154,\"Y2\":695.02908344615378},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64818340000011,\"Y1\":530.11730252307689,\"Y2\":571.56751344615384},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.75323935000006,\"Y1\":429.57875252307684,\"Y2\":514.85907344615384}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:12:38\n _Jane Doe\n 2017-11-09T11:12:38\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":8,\"X1\":53.664,\"X2\":288.76785870000009,\"Y1\":530.69952252307689,\"Y2\":539.2729034461538},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.70017205,\"X2\":288.79246640000008,\"Y1\":519.73773862307689,\"Y2\":528.3111195461538},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.70017205,\"X2\":273.25175740000003,\"Y1\":508.77595472307689,\"Y2\":517.3493356461538},{\"IsContainer\":true,\"PageIndex\":8,\"X1\":44.70017205,\"X2\":288.79246640000008,\"Y1\":508.77595472307689,\"Y2\":539.2729034461538}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:13:08\n _Jane Doe\n 2017-11-09T11:13:08\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":246.58437939999993,\"X2\":287.6025759499999,\"Y1\":324.57370252307692,\"Y2\":333.14708344615389},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59500435000018,\"Y1\":313.62044252307692,\"Y2\":322.19382344615389},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.57228954999994,\"Y1\":302.65865252307691,\"Y2\":311.23203344615388},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58837920000019,\"Y1\":291.69687252307688,\"Y2\":300.27025344615384},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.57418245,\"Y1\":280.7436025230769,\"Y2\":289.31698344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58459339999985,\"Y1\":269.78182252307687,\"Y2\":278.35520344615384},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":208.66675305000007,\"Y1\":258.82003252307686,\"Y2\":267.39341344615383},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.6025759499999,\"Y1\":258.82003252307686,\"Y2\":333.14708344615389}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:13:14\n _Jane Doe\n 2017-11-09T11:13:14\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":172.6609557,\"X2\":287.59595080000008,\"Y1\":423.2042025230769,\"Y2\":431.77758344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59973660000014,\"Y1\":412.2509425230769,\"Y2\":420.82432344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.60352240000009,\"Y1\":401.45048584615375,\"Y2\":409.8625334461538},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.6035224000002,\"Y1\":392.42412329230763,\"Y2\":398.90075344615383},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.57891470000015,\"Y1\":379.37410252307694,\"Y2\":387.94748344615391},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59121855,\"Y1\":368.41232252307691,\"Y2\":376.98570344615388},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58648630000016,\"Y1\":357.4505325230769,\"Y2\":366.02391344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61014755000008,\"Y1\":346.4972725230769,\"Y2\":355.07065344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59027210000016,\"Y1\":335.53548252307695,\"Y2\":344.10886344615392},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":243.86144274999995,\"Y1\":324.57370252307692,\"Y2\":333.14708344615389},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61014755000008,\"Y1\":324.57370252307692,\"Y2\":431.77758344615387}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:13:34\n _Jane Doe\n 2017-11-09T11:13:34\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":180.9821441,\"X2\":287.57891470000004,\"Y1\":532.796492523077,\"Y2\":541.36987344615386},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.60825465000016,\"Y1\":521.83470252307688,\"Y2\":530.4080834461538},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.6035224000002,\"Y1\":510.88144252307688,\"Y2\":519.4548234461538},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58553985000015,\"Y1\":499.91965252307688,\"Y2\":508.49303344615385},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61109400000004,\"Y1\":491.05462329230767,\"Y2\":497.53125344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":142.4237711,\"Y1\":478.00460252307687,\"Y2\":486.57798344615384},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61109400000004,\"Y1\":478.00460252307687,\"Y2\":541.36987344615386}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:14:05\n _Jane Doe\n 2017-11-09T11:14:05\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":167.99272326,\"X2\":527.74420178,\"Y1\":633.18292898230777,\"Y2\":642.20751187461553},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":55.46416,\"X2\":527.73423918000015,\"Y1\":621.22182898230767,\"Y2\":630.24641187461543},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":55.46416,\"X2\":140.59856204,\"Y1\":609.26969898230777,\"Y2\":618.29428187461554},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":55.46416,\"X2\":527.74420178,\"Y1\":609.26969898230777,\"Y2\":642.20751187461553}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:14:48\n _Jane Doe\n 2017-11-09T11:14:48\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":308.48998,\"X2\":542.16469920000009,\"Y1\":475.90802252307691,\"Y2\":484.48140344615388},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":540.83493694999993,\"Y1\":464.946242523077,\"Y2\":473.51962344615396},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":540.82357955,\"Y1\":453.98445252307687,\"Y2\":462.55783344615384},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":540.85197305000008,\"Y1\":443.03119252307687,\"Y2\":451.60457344615384},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":480.78363090000016,\"Y1\":432.06940252307692,\"Y2\":440.64278344615389},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":296.754,\"X2\":542.16469920000009,\"Y1\":432.06940252307692,\"Y2\":484.48140344615388}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:15:18\n _Jane Doe\n 2017-11-09T11:15:18\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":52.476,\"X2\":287.59973415000013,\"Y1\":408.76742252307685,\"Y2\":417.34080344615381},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":43.502710000000008,\"X2\":124.24530595000002,\"Y1\":397.96697584615384,\"Y2\":406.37902344615389},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":43.502710000000008,\"X2\":287.59973415000013,\"Y1\":397.96697584615384,\"Y2\":417.34080344615381}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:15:36\n _Jane Doe\n 2017-11-09T11:15:36\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":53.664,\"X2\":200.41012605000009,\"Y1\":83.480422523076911,\"Y2\":92.053803446153836},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":53.664,\"X2\":200.41012605000009,\"Y1\":83.480422523076911,\"Y2\":92.053803446153836}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:15:57\n _Jane Doe\n 2017-11-09T11:15:57\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":7,\"X1\":88.842687250000012,\"X2\":287.57447245000014,\"Y1\":642.62370252307676,\"Y2\":651.19708344615367},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.61043755000003,\"Y1\":631.6619225230769,\"Y2\":640.23530344615381},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.60191950000012,\"Y1\":621.50972129230774,\"Y2\":629.27352344615383},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.5792047,\"Y1\":609.74687252307683,\"Y2\":618.32025344615374},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":168.22334165,\"Y1\":598.785092523077,\"Y2\":607.35847344615388},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.61043755000003,\"Y1\":598.785092523077,\"Y2\":651.19708344615367}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:16:11\n _Jane Doe\n 2017-11-09T11:16:11\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":8,\"X1\":53.663827950000005,\"X2\":288.78377630000017,\"Y1\":610.79080617307682,\"Y2\":619.36418709615373},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.7,\"X2\":288.76484730000004,\"Y1\":599.82902227307682,\"Y2\":608.40240319615373},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.7,\"X2\":288.79418725000016,\"Y1\":588.87575642307684,\"Y2\":597.44913734615375},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.7,\"X2\":167.79812635000002,\"Y1\":577.91397252307684,\"Y2\":586.48735344615375},{\"IsContainer\":true,\"PageIndex\":8,\"X1\":44.7,\"X2\":288.79418725000016,\"Y1\":577.91397252307684,\"Y2\":619.36418709615373}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:22:22\n _Jane Doe\n 2017-11-09T11:22:22\n f0382d41-3a6a-42d2-86f5-e5f2497898fe\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":26.562771135875096,\"X2\":569.20223862589523,\"Y1\":244.56036314714515,\"Y2\":664.83558102450468},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":26.562771135875096,\"X2\":569.20223862589523,\"Y1\":244.56036314714515,\"Y2\":664.83558102450468}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:23:05\n _Jane Doe\n 2017-11-09T11:23:05\n fa809b85-0dc0-4b81-8e82-1950cc0a51e7\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":339.23342891792,\"Y1\":120.4344141558156,\"Y2\":128.40933447384646},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":343.56928903904009,\"Y1\":106.34262215581566,\"Y2\":114.31754247384629},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":352.78292540239983,\"Y1\":92.25083015581572,\"Y2\":100.22575047384635},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":337.0652658008002,\"Y1\":78.159038155815551,\"Y2\":86.1339584738464},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":352.78292540239983,\"Y1\":78.159038155815551,\"Y2\":128.40933447384646}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:23:12\n _Jane Doe\n 2017-11-09T11:23:12\n fa809b85-0dc0-4b81-8e82-1950cc0a51e7\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":251.23861043359992,\"X2\":345.19519999999989,\"Y1\":757.47196703458485,\"Y2\":765.31881047384627},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":42.763664000000006,\"X2\":327.85135844143997,\"Y1\":743.2520981558157,\"Y2\":751.22701847384633},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":42.763664000000006,\"X2\":341.40119638088,\"Y1\":729.16030615581576,\"Y2\":737.13522647384639},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":42.763664000000006,\"X2\":345.19519999999989,\"Y1\":729.16030615581576,\"Y2\":765.31881047384627}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:06\n _Jane Doe\n 2017-11-09T11:24:06\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":162.82121410000002,\"X2\":329.42291470000009,\"Y1\":279.72875252307682,\"Y2\":288.30213344615379},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.4096644,\"Y1\":268.76697252307684,\"Y2\":277.34035344615381},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42102180000029,\"Y1\":258.61476129230766,\"Y2\":266.37856344615386},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":181.5987821,\"Y1\":248.94867329230769,\"Y2\":255.42530344615383},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42291470000009,\"Y1\":248.94867329230769,\"Y2\":288.30213344615379}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:19\n _Jane Doe\n 2017-11-09T11:24:19\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":183.60241675,\"X2\":329.5402745,\"Y1\":248.94867329230769,\"Y2\":255.42530344615383},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42102180000012,\"Y1\":235.89014252307695,\"Y2\":244.46352344615386},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42007534999993,\"Y1\":224.92835252307694,\"Y2\":233.50173344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":202.00140475000003,\"Y1\":213.97509252307691,\"Y2\":222.54847344615382},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.5402745,\"Y1\":213.97509252307691,\"Y2\":255.42530344615383}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:36\n _Jane Doe\n 2017-11-09T11:24:36\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":180.29193745000003,\"X2\":330.7178611,\"Y1\":663.83058887307686,\"Y2\":672.40396979615377},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.60996580000005,\"Y1\":652.86880497307686,\"Y2\":661.44218589615377},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":220.70345955000005,\"Y1\":641.91553912307688,\"Y2\":650.48892004615379},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.7178611,\"Y1\":641.91553912307688,\"Y2\":672.40396979615377}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:44\n _Jane Doe\n 2017-11-09T11:24:44\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.63930575000006,\"Y1\":532.99807312307678,\"Y2\":541.5714540461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.6345735000001,\"Y1\":522.03628922307678,\"Y2\":530.6096701461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61469805000007,\"Y1\":511.07450532307678,\"Y2\":519.64788624615369},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61469805000007,\"Y1\":500.1212394730768,\"Y2\":508.69462039615371},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":104.57404455,\"Y1\":489.1594555730768,\"Y2\":497.73283649615371},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.63930575000006,\"Y1\":489.1594555730768,\"Y2\":541.5714540461538}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:00\n _Jane Doe\n 2017-11-09T11:25:00\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":333.16403646011497,\"X2\":588.54921492181984,\"Y1\":91.6163665230979,\"Y2\":211.9411232191062},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":333.16403646011497,\"X2\":588.54921492181984,\"Y1\":91.6163665230979,\"Y2\":211.9411232191062}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:19\n _Jane Doe\n 2017-11-09T11:25:19\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":309.11806640000003,\"X2\":329.65129915000006,\"Y1\":546.61537087307693,\"Y2\":555.18875179615384},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.52352840000015,\"Y1\":535.65358697307693,\"Y2\":544.23628678846148},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.43361565000009,\"Y1\":524.70032112307683,\"Y2\":533.27370204615386},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.43550855,\"Y1\":513.73853722307683,\"Y2\":522.31191814615386},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":225.34777690000004,\"Y1\":502.78527137307685,\"Y2\":511.36797118846147},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.65129915000006,\"Y1\":502.78527137307685,\"Y2\":555.18875179615384}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:34\n _Jane Doe\n 2017-11-09T11:25:34\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":227.76027795000002,\"X2\":329.43077630000005,\"Y1\":502.78527137307685,\"Y2\":511.36797118846147},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.44686595000007,\"Y1\":491.82348747307685,\"Y2\":500.39686839615382},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.42888340000013,\"Y1\":480.86170357307685,\"Y2\":489.43508449615382},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.44686595000007,\"Y1\":469.90843772307687,\"Y2\":478.48181864615378},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.54340385,\"Y1\":458.94665382307687,\"Y2\":467.52003474615384},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":119.05197740000001,\"Y1\":447.98486992307687,\"Y2\":456.56756973846154},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.54340385,\"Y1\":447.98486992307687,\"Y2\":511.36797118846147}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:42\n _Jane Doe\n 2017-11-09T11:25:42\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":123.55140070000002,\"X2\":329.51784969999994,\"Y1\":447.98486992307687,\"Y2\":456.56756973846154},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.42604405000009,\"Y1\":437.03160407307689,\"Y2\":445.6049849961538},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":325.07805275000004,\"Y1\":426.06982017307689,\"Y2\":434.6432010961538},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.51784969999994,\"Y1\":426.06982017307689,\"Y2\":456.56756973846154}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:00\n _Jane Doe\n 2017-11-09T11:26:00\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":278.34161055000004,\"X2\":330.64338399999997,\"Y1\":700.03775522307694,\"Y2\":708.61113614615385},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.6159369500001,\"Y1\":689.084489373077,\"Y2\":697.65787029615387},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.62066920000012,\"Y1\":678.12270547307685,\"Y2\":686.69608639615387},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.62161565000008,\"Y1\":667.16092157307685,\"Y2\":675.73430249615387},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.62066920000018,\"Y1\":656.20765572307687,\"Y2\":664.78103664615378},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63013370000004,\"Y1\":647.30534702307693,\"Y2\":653.81925274615378},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63486595000012,\"Y1\":634.28408792307687,\"Y2\":642.85746884615378},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63013370000016,\"Y1\":623.33082207307689,\"Y2\":631.9042029961538},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.61972275000005,\"Y1\":612.36903817307689,\"Y2\":620.9424190961538},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.64054465000004,\"Y1\":601.40725427307689,\"Y2\":609.9806351961538},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63202660000013,\"Y1\":590.45398842307691,\"Y2\":599.02736934615382},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.71436775000006,\"Y1\":579.49220452307691,\"Y2\":588.06558544615382},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":186.25391845000001,\"Y1\":568.53042062307691,\"Y2\":576.76832142307694},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.71436775000006,\"Y1\":568.53042062307691,\"Y2\":708.61113614615385}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:18\n _Jane Doe\n 2017-11-09T11:26:18\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":80.453048348794511,\"X2\":589.886310097012,\"Y1\":283.92661585820258,\"Y2\":493.15799833515064},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":80.453048348794511,\"X2\":589.886310097012,\"Y1\":283.92661585820258,\"Y2\":493.15799833515064}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:37\n _Jane Doe\n 2017-11-09T11:26:37\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":346.37429244999993,\"X2\":582.82400305,\"Y1\":689.084489373077,\"Y2\":697.65787029615387},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":581.50086595,\"Y1\":678.12270547307685,\"Y2\":686.69608639615387},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":581.4999195,\"Y1\":667.16092157307685,\"Y2\":675.73430249615387},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":406.05932235,\"Y1\":658.26713092307693,\"Y2\":664.78103664615378},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":582.82400305,\"Y1\":658.26713092307693,\"Y2\":697.65787029615387}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:59\n _Jane Doe\n 2017-11-09T11:26:59\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":95.507999999999981,\"X2\":330.61375160000006,\"Y1\":188.45177042307682,\"Y2\":197.02515134615379},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":86.534707549999979,\"X2\":278.3186033,\"Y1\":177.48998652307682,\"Y2\":186.06336744615373},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":86.534707549999979,\"X2\":330.61375160000006,\"Y1\":177.48998652307682,\"Y2\":197.02515134615379}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:27:13\n _Jane Doe\n 2017-11-09T11:27:13\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":458.26636360000003,\"X2\":582.66775160000009,\"Y1\":309.2668547230769,\"Y2\":317.84023564615381},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.6866806,\"Y1\":298.31358887307692,\"Y2\":306.88696979615383},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.68762705000017,\"Y1\":287.35180497307692,\"Y2\":295.92518589615383},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.66964450000012,\"Y1\":276.39002107307692,\"Y2\":284.96340199615383},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.68951995000009,\"Y1\":265.43675522307694,\"Y2\":274.01013614615385},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.71128830000021,\"Y1\":254.47497132307689,\"Y2\":263.0576711384615},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":432.62987245,\"Y1\":243.51318742307689,\"Y2\":252.08656834615383},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.71128830000021,\"Y1\":243.51318742307689,\"Y2\":317.84023564615381}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:27:23\n _Jane Doe\n 2017-11-09T11:27:23\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":414.8754169,\"X2\":582.71128830000009,\"Y1\":133.92942062307688,\"Y2\":142.50280154615382},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.69046640000022,\"Y1\":122.96763672307688,\"Y2\":131.54101764615382},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":563.78985990000012,\"Y1\":112.01437087307687,\"Y2\":120.58775179615381},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.71128830000009,\"Y1\":112.01437087307687,\"Y2\":142.50280154615382}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:10\n _Jane Doe\n 2017-11-09T11:28:10\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":218.14405595000002,\"X2\":329.42480294999996,\"Y1\":192.05152252307693,\"Y2\":200.62490344615384},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42575415,\"Y1\":181.09825252307695,\"Y2\":189.68095233846157},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":358.71694689999993,\"Y1\":358.1544225230769,\"Y2\":366.72780344615387},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42575415,\"Y1\":181.09825252307695,\"Y2\":200.62490344615384},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":358.71694689999993,\"Y1\":358.1544225230769,\"Y2\":366.72780344615387}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:18\n _Jane Doe\n 2017-11-09T11:28:18\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":540.83948105000013,\"X2\":581.47720470000013,\"Y1\":259.52392252307686,\"Y2\":268.09730344615383},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.49708015,\"Y1\":248.56214252307691,\"Y2\":257.13552344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.4980266,\"Y1\":237.60887252307694,\"Y2\":246.18225344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.48099050000019,\"Y1\":226.64709252307694,\"Y2\":235.22047344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.4734189,\"Y1\":215.68530252307693,\"Y2\":224.25868344615384},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":509.4750745,\"Y1\":204.73204252307693,\"Y2\":213.30542344615384},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.4980266,\"Y1\":204.73204252307693,\"Y2\":268.09730344615383}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:39\n _Jane Doe\n 2017-11-09T11:28:39\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":205.67478,\"X2\":330.61280515000016,\"Y1\":371.03492397307673,\"Y2\":379.6083048961537},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.62321610000009,\"Y1\":360.08165812307675,\"Y2\":368.65503904615372},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":245.92635205,\"Y1\":349.11987422307675,\"Y2\":357.69325514615372},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.62321610000009,\"Y1\":349.11987422307675,\"Y2\":379.6083048961537}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:48\n _Jane Doe\n 2017-11-09T11:28:48\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":198.88210834999995,\"X2\":330.61564450000009,\"Y1\":305.28977472307673,\"Y2\":313.8631556461537},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61280515000021,\"Y1\":294.32799082307673,\"Y2\":302.9013717461537},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61564450000009,\"Y1\":294.32799082307673,\"Y2\":313.8631556461537}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:29:14\n _Jane Doe\n 2017-11-09T11:29:14\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":544.2729092,\"X2\":581.4797516,\"Y1\":184.73430402307685,\"Y2\":193.30768494615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.50057350000009,\"Y1\":173.78103817307684,\"Y2\":182.35441909615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.4797516000001,\"Y1\":162.81925427307684,\"Y2\":171.39263519615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.47123355000008,\"Y1\":151.85747037307684,\"Y2\":160.43085129615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.50719865000019,\"Y1\":140.90420452307683,\"Y2\":149.47758544615377},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":475.4830303,\"Y1\":129.94242062307683,\"Y2\":138.51580154615377},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.50719865000019,\"Y1\":129.94242062307683,\"Y2\":193.30768494615378}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:31:03\n _Jane Doe\n 2017-11-09T11:31:03\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":250.09765800000008,\"X2\":287.61855,\"Y1\":229.74695692307694,\"Y2\":238.76977423076926},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.61454199999991,\"Y1\":217.55781961538463,\"Y2\":226.58545423076922},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.69169599999992,\"Y1\":205.37349961538462,\"Y2\":214.40113423076923},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.7728580000001,\"Y1\":193.1891796153846,\"Y2\":202.21681423076922},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":288.15774161538468,\"Y1\":181.0649796153846,\"Y2\":190.09261423076921},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":254.35515599999991,\"Y1\":169.64179423076919,\"Y2\":177.9082942307692},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":45.36,\"X2\":288.15774161538468,\"Y1\":169.64179423076919,\"Y2\":238.76977423076926}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:31:31\n _Jane Doe\n 2017-11-09T11:31:31\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":485.04962399999994,\"X2\":549.97020599999973,\"Y1\":375.75357961538458,\"Y2\":384.78121423076919},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":307.6836,\"X2\":362.2074300000001,\"Y1\":364.33039423076917,\"Y2\":372.59689423076918},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":367.32264000000004,\"X2\":550.07167776923029,\"Y1\":363.56925961538457,\"Y2\":372.59689423076918},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":307.6836,\"X2\":405.723288,\"Y1\":351.38493961538455,\"Y2\":360.41257423076917},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":485.04962399999994,\"X2\":549.97020599999973,\"Y1\":375.75357961538458,\"Y2\":384.78121423076919},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":307.6836,\"X2\":405.723288,\"Y1\":351.38493961538455,\"Y2\":372.59689423076918},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":367.32264000000004,\"X2\":550.07167776923029,\"Y1\":363.56925961538457,\"Y2\":372.59689423076918}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:32:05\n _Jane Doe\n 2017-11-09T11:32:05\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":549.96519599999988,\"Y1\":151.71109961538468,\"Y2\":160.7387342307693},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.03834200000028,\"Y1\":139.60135153846159,\"Y2\":148.61453423076927},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":549.95016599999951,\"Y1\":127.52281961538466,\"Y2\":136.55045423076928},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.00227,\"Y1\":115.86339346153849,\"Y2\":124.49600884615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.0036188461537,\"Y1\":103.33453961538464,\"Y2\":112.36217423076926},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.64660600000008,\"Y1\":756.85251153846161,\"Y2\":765.86569423076924},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.770854,\"Y1\":744.71385961538465,\"Y2\":753.74149423076926},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.69069399999995,\"Y1\":732.73649115384615,\"Y2\":741.67741423076927},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":64.566336,\"Y1\":720.58569961538467,\"Y2\":729.61333423076928},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.03834200000028,\"Y1\":103.33453961538464,\"Y2\":160.7387342307693},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.770854,\"Y1\":720.58569961538467,\"Y2\":765.86569423076924}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:32:12\n _Jane Doe\n 2017-11-09T11:32:12\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":69.566315999999972,\"X2\":287.65361999999988,\"Y1\":708.4614996153847,\"Y2\":717.53730730769234},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.349979999999967,\"X2\":287.649612,\"Y1\":696.39741961538471,\"Y2\":705.42505423076932},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.349979999999967,\"X2\":160.934688,\"Y1\":684.3333396153846,\"Y2\":693.36097423076922},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":45.349979999999967,\"X2\":287.65361999999988,\"Y1\":684.3333396153846,\"Y2\":717.53730730769234}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:33:02\n _Jane Doe\n 2017-11-09T11:33:02\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":215.33928000000003,\"X2\":287.74079400000011,\"Y1\":302.78793961538457,\"Y2\":311.81557423076919},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.77813776923085,\"Y1\":290.60361961538462,\"Y2\":299.63125423076923},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.70472200000012,\"Y1\":278.4192996153846,\"Y2\":287.44693423076922},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":168.02483999999998,\"Y1\":266.23979692307694,\"Y2\":275.26261423076926},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.77813776923085,\"Y1\":266.23979692307694,\"Y2\":311.81557423076919}]\n false\n \n \n _Jane Doe\n 2019-04-25T11:17:04\n _Jane Doe\n 2019-04-25T11:17:07\n 1cca0ebd-cbd5-4c4a-9e79-662d408985b3\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":518.65541601085931,\"Y1\":419.07905145251129,\"Y2\":424.3144782033109},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":518.59699380566519,\"Y1\":407.31431008312569,\"Y2\":412.55313413953547},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":335.23456083308008,\"Y1\":395.31903244451132,\"Y2\":400.55445919531087},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":518.65541601085931,\"Y1\":395.31903244451132,\"Y2\":424.3144782033109}]\n false\n \n \n _Jane Doe\n 2019-04-25T11:17:26\n _Jane Doe\n 2019-04-25T11:17:27\n 1cca0ebd-cbd5-4c4a-9e79-662d408985b3\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.5968475178928,\"Y1\":396.03430105912582,\"Y2\":401.27312511553561},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.7889650308399,\"Y1\":384.03429145912582,\"Y2\":389.27311551553561},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.64497856615185,\"Y1\":372.51901420451139,\"Y2\":377.754440955311},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.92772645662774,\"Y1\":360.51427264312582,\"Y2\":365.7530966995356},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":175.63422825412886,\"Y1\":350.19124525311054,\"Y2\":354.22608208183891},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.92772645662774,\"Y1\":350.19124525311054,\"Y2\":401.27312511553561}]\n false\n \n \n _Jane Doe\n 2019-04-25T11:23:03\n _Jane Doe\n 2019-04-25T11:24:10\n 1cca0ebd-cbd5-4c4a-9e79-662d408985b3\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":89.667140825035574,\"X2\":538.00284495021344,\"Y1\":350.82185802908361,\"Y2\":638.99262732335683},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":89.667140825035574,\"X2\":538.00284495021344,\"Y1\":350.82185802908361,\"Y2\":638.99262732335683}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:07\n _Jane Doe\n 2017-11-09T11:18:07\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":537.750728017274,\"Y1\":716.04654049846147,\"Y2\":721.912528436923},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":537.750728017274,\"Y1\":716.04654049846147,\"Y2\":721.912528436923}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:20\n _Jane Doe\n 2017-11-09T11:18:20\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.86424505000014,\"Y1\":626.39177049846148,\"Y2\":632.257758436923},{\"IsContainer\":false,\"PageIndex\":12,\"X1\":303.72799999999995,\"X2\":368.34965786999993,\"Y1\":618.92205049846154,\"Y2\":624.7880384369231},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.86424505000014,\"Y1\":618.92205049846154,\"Y2\":632.257758436923}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:31\n _Jane Doe\n 2017-11-09T11:18:31\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85453150000012,\"Y1\":603.97355049846158,\"Y2\":609.83953843692314},{\"IsContainer\":false,\"PageIndex\":12,\"X1\":303.72799999999995,\"X2\":518.84622057612819,\"Y1\":596.50383049846153,\"Y2\":602.36981843692308},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85453150000012,\"Y1\":596.50383049846153,\"Y2\":609.83953843692314}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:40\n _Jane Doe\n 2017-11-09T11:18:40\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.89921332489553,\"Y1\":708.57682049846153,\"Y2\":714.44280843692309},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.89921332489553,\"Y1\":708.57682049846153,\"Y2\":714.44280843692309}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:48\n _Jane Doe\n 2017-11-09T11:18:48\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85906448999992,\"Y1\":701.10710049846159,\"Y2\":706.97308843692315},{\"IsContainer\":false,\"PageIndex\":12,\"X1\":303.72799999999995,\"X2\":389.61391395999993,\"Y1\":693.63738049846154,\"Y2\":699.5033684369231},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85906448999992,\"Y1\":693.63738049846154,\"Y2\":706.97308843692315}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:19:00\n _Jane Doe\n 2017-11-09T11:19:00\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":295.566,\"X2\":539.65196982,\"Y1\":480.48204049846146,\"Y2\":486.34802843692296},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":302.53190999999993,\"X2\":381.71417931999991,\"Y1\":473.01232049846152,\"Y2\":478.878308436923},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":295.566,\"X2\":539.65196982,\"Y1\":473.01232049846152,\"Y2\":486.34802843692296}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:21:14\n _Jane Doe\n 2017-11-09T11:21:14\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":119.01600000000002,\"X2\":366.25680000000006,\"Y1\":239.99023437500003,\"Y2\":249.49929687500003},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":119.01600000000002,\"X2\":366.25680000000006,\"Y1\":239.99023437500003,\"Y2\":249.49929687500003}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:32:32\n _Jane Doe\n 2017-11-09T11:32:32\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":307.68654000000009,\"X2\":549.8994899999999,\"Y1\":291.17094807692308,\"Y2\":298.36062115384618},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":319.02612,\"X2\":549.96732000000009,\"Y1\":281.02836807692313,\"Y2\":288.21804115384617},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":319.02612,\"X2\":541.70642399999986,\"Y1\":271.55580115384618,\"Y2\":278.17766653846155},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":307.68654000000009,\"X2\":549.96732000000009,\"Y1\":271.55580115384618,\"Y2\":298.36062115384618}]\n false\n \n \n \n \n _Jane Doe\n 2017-05-23T11:49:29\n _Jane Doe\n 2017-05-23T11:49:29\n Difficulty of defining key terms\n 1\n 0\n -1\n 0\n 0\n difficulty of defining key terms\n [\"7ffc45bb-55b4-4eab-a211-03bf72d10b34\"]\n 1\n A number of papers attempt to delineate key concepts and define them. It seems a major problem with defining processes for avoiding food fraud lies in the fact that there are no agreed-upon terms.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{ \n\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 A number of papers attempt to delineate key concepts and define them. It seems a major problem with defining processes for avoiding food fraud lies in the fact that there are no agreed-upon terms. }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>A number of papers attempt to delineate key concepts and define them. It seems a major problem with defining processes for avoiding food fraud lies in the fact that there are no agreed-upon terms. </p>\n \n \n _Jane Doe\n 2017-05-29T16:25:16\n _Jane Doe\n 2017-05-29T16:25:16\n Terminological difficulties\n 0\n 2\n -1\n 0\n 0\n terminological difficulties\n [\"8f27e6f7-4e9a-4262-9ea9-da1a3d5b1ea7\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-29T16:25:56\n _Jane Doe\n 2017-05-29T16:25:56\n Food fraud and food crime\n 0\n 2\n -1\n 0\n 0\n food fraud and food crime\n [\"d236ea39-11df-4710-97c8-15808d9c1f40\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-29T16:26:55\n _Jane Doe\n 2017-05-29T16:26:55\n Other important terms\n 0\n 2\n -1\n 0\n 0\n other important terms\n [\"6a244c60-7afc-48ed-b768-31cb9aa126dd\"]\n 0\n 0\n \n \n _Jane Doe\n 2019-04-25T11:02:20\n _Jane Doe\n 2019-04-25T11:03:12\n Food counterfeiting similar to drug counterfeiting\n 1\n 0\n \n 24\n true\n 24\n 24\n\n24]]>\n 24\n 30\n 0\n 1\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n 0\n food counterfeiting similar to drug counterfeiting\n [\"19713072-f8dd-41ce-8e7d-45a53012a7dd\"]\n 0\n \"Counterfeited drugs are drugs that are not authentic and have been manufactured using incorrect quantities, or incorrect ingredients, to either reduce the potency, or nullify the potency of drugs altogether, and the same is applicable to food counterfeit.\"\n 0\n \n \n _Jane Doe\n 2019-04-25T11:00:18\n _Jane Doe\n 2019-04-25T11:01:46\n Advantages of RFID\n 1\n 0\n \n 27\n true\n 27\n 27\n\n27]]>\n 27\n 30\n 1\n 1\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n 0\n advantages of rfid\n [\"0180c2d0-17c4-4853-83e3-1f108fc54f78\"]\n 0\n \"With RFID, drugs can be tracked at the item level throughout the supply chain. Individual packages are tagged at manufacturing and then read serially, in-bulk throughout the distribution chain. The read points include tag application, case packaging, total tracking throughout distribution and item level tracking and authentication at the pharmacy. With RFID, the entire drug supply chain becomes more efficient and secure.\"\n 0\n \n \n _Jane Doe\n 2019-04-25T11:23:03\n _Jane Doe\n 2019-04-25T11:24:10\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Agbaraji, Ochulor et al.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Digital mass serialization in the supply chain\n 1\n 1\n \n 28\n true\n 28\n 28\n\n28]]>\n 28\n 30\n 2\n 0\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n 0\n digital mass serialization in the supply chain\n [\"a1da867b-e0a0-4c2b-9c19-7baf6923dc3e\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-10-16T09:10:34\n _Jane Doe\n 2018-07-12T11:35:01\n It's unrealistic to aim for completely risk-free food\n 1\n 0\n \n 176\n true\n 176\n 176\n\n176]]>\n 176\n 30\n 0\n 1\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n 0\n it's unrealistic to aim for completely risk-free food\n [\"2c396f83-5260-47c2-bbe3-98ed2f429fd0\"]\n 1\n \"…zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.\"\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0 \"\\u8230 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.\"}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>&quot;…zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.&quot;</p>\n \n \n _Jane Doe\n 2017-05-23T15:26:26\n _Jane Doe\n 2017-05-23T15:26:26\n Sweeney Todd = fictional work with food fraud in the plot\n 1\n 0\n -1\n 0\n 4\n 60accf57-c086-423f-9068-7c1afdc2de1d\n 0\n sweeney todd = fictional work with food fraud in the plot\n [\"5fcbe42a-facb-420a-bfac-61fd5a6b0d4e\"]\n 1\n I wonder if there's any way to work this into the paper? Perhaps in the introduction?\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 I wonder if there's any way to work this into the paper? Perhaps in the introduction?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>I wonder if there&#39;s any way to work this into the paper? Perhaps in the introduction?</p>\n \n \n _Jane Doe\n 2017-05-23T14:42:36\n _Jane Doe\n 2017-05-23T14:42:36\n Situation in China\n 1\n 0\n \n Omit\n f3385\n f3385\n\nf3385]]>\n 2147483647\n 100\n 0\n 1\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n 0\n situation in china\n [\"e8eeac4d-0a61-4287-a051-3b030b855e5b\"]\n 1\n “Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.”</p>\n \n \n _Jane Doe\n 2017-05-23T14:29:15\n _Jane Doe\n 2017-05-23T14:29:15\n The 2013 horsemeat scandal --> Europe-wide process for information exchange related to food fraud.\n 1\n 0\n \n 1\n true\n 1\n 1\n\n1]]>\n 1\n 30\n 0\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n the 2013 horsemeat scandal --> europe-wide process for information exchange related to food fraud.\n [\"60905ce3-5073-45f1-af6d-5a1dccfb849d\"]\n 1\n “In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.”</p>\n \n \n _Jane Doe\n 2017-05-23T14:29:59\n _Jane Doe\n 2017-05-23T14:29:59\n 2015 statistics - European Food Fraud Network\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 1\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n 2015 statistics - european food fraud network\n [\"62cbd1b2-388a-4126-b442-9f93a71f5ce8\"]\n 1\n “In 2015, 108 cases were exchanged by the Food Fraud Network.”\n 0\n {\\rtf1 \n\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman \n;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 In 2015, 108 cases were exchanged by the Food Fraud Network.\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“In 2015, 108 cases were exchanged by the Food Fraud Network.”</p>\n \n \n _Jane Doe\n 2017-05-23T14:30:09\n _Jane Doe\n 2017-05-23T14:30:09\n Types of violations\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 2\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n types of violations\n [\"b87ee68b-3275-41a0-bc0c-c21e64d7d2c5\"]\n 1\n “...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 ...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).”</p>\n \n \n _Jane Doe\n 2017-05-23T14:30:29\n _Jane Doe\n 2017-05-23T14:30:29\n Illegal exports and exchanges on fish products most common incidents (2015 Food Fraud Network)\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 3\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n illegal exports and exchanges on fish products most common incidents (2015 food fraud network)\n [\"7af8d596-89ee-4ae8-9512-ae79efbdfd6d\"]\n 1\n “The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential \"food fraud\" cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential \"food fraud\" cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential &quot;food fraud&quot; cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:35:05\n _Jane Doe\n 2017-05-23T10:35:05\n Results of recent 61-country operation to check for food fraud (12/1/2016 - 03/31/2017)\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 0\n 1\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n results of recent 61-country operation to check for food fraud (12/1/2016 - 03/31/2017)\n [\"ddc38a60-4730-4f32-b362-0967ccf78acc\"]\n 1\n “Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:35:45\n _Jane Doe\n 2017-05-23T10:35:45\n Summary of number and location of checks\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 1\n 1\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n summary of number and location of checks\n [\"34603694-05f6-48b8-a45a-93c88890a532\"]\n 1\n “More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10 \n\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.\\u8221 }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:36:12\n _Jane Doe\n 2017-05-23T10:36:12\n Quote from Françoise Dorcier, Coordinator of INTERPOL’s Illicit Goods and Global Health Programme\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 2\n 1\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n quote from françoise dorcier, coordinator of interpol’s illicit goods and global health programme\n [\"e64baa2d-e301-4232-83a9-8a48f6c55305\"]\n 1\n “This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:42:07\n _Jennifer Schultz\n 2020-01-10T08:18:38\n Findings in Europe\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 3\n 3\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n findings in europe\n [\"1ac0e3e9-0baa-4b90-a931-fdd8ad034c98\"]\n 1\n Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent.\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI \n;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent. } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent. </p>\n \n \n _Jane Doe\n 2017-05-23T14:07:53\n _Jane Doe\n 2017-05-23T14:07:53\n Research not having any effect on food fraud incidents\n 1\n 0\n \n 660\n true\n 660\n 660\n\n660]]>\n 660\n 30\n 0\n 1\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n research not having any effect on food fraud incidents\n [\"ab553cad-13ee-4dbb-840d-c1bacad6f7ad\"]\n 1\n “Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....”</p>\n \n \n _Jane Doe\n 2017-11-09T10:26:49\n _Jane Doe\n 2017-11-09T10:26:49\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"jpg (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Disconnect between academic and public interest in food fraud\n 1\n 1\n \n 662\n true\n 662\n 662\n\n662]]>\n 662\n 30\n 1\n 0\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n disconnect between academic and public interest in food fraud\n [\"24c61537-ef6d-470f-8b26-4c3b834a46b3\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-11-09T10:17:53\n _Jane Doe\n 2017-11-09T10:17:53\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"jpg (3).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Factors leading to food fraud in the supply chain\n 1\n 1\n \n 664\n true\n 664\n 664\n\n664]]>\n 664\n 30\n 2\n 0\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n factors leading to food fraud in the supply chain\n [\"f7d3ecde-fd9c-44ab-9c0b-6bed17e9a3f7\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T14:12:50\n _Jane Doe\n 2017-05-23T14:12:50\n Another problem of terminology: US uses \"food fraud\" and UK and Europe use \"food crime\" in the research\n 1\n 0\n \n 665\n true\n 665\n 665\n\n665]]>\n 665\n 30\n 3\n 1\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n another problem of terminology: us uses \"food fraud\" and uk and europe use \"food crime\" in the resea\n [\"d4f4135c-a563-44fa-8c71-f9d6bb8aae4f\"]\n 1\n “Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of ‘fraud’ and European based research adopts ‘crime’, which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term ‘food crime’ in order to build and strengthen a coherent body of knowledge.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of \\u8216 fraud\\u8217 and European based research adopts \\u8216 crime\\u8217 , which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term \\u8216 food crime\\u8217 in order to build and strengthen a coherent body of knowledge.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of ‘fraud’ and European based research adopts ‘crime’, which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term ‘food crime’ in order to build and strengthen a coherent body of knowledge.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:38:31\n _Jane Doe\n 2017-05-23T11:38:31\n Food fraud definition (GFSI)\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 0\n 1\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n 0\n food fraud definition (gfsi)\n [\"db04fcd6-ddcc-417a-a41b-d7a2e6e468db\"]\n 1\n “It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers’ health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters’ part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers\\u8217 health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters\\u8217 part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers’ health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters’ part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:18:37\n _Jane Doe\n 2017-11-09T10:18:37\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Némorin 07 2014 - GFSI Po.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Different topic areas and how they relate intentional and unintentional food fraud\n 1\n 1\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 1\n 0\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n 0\n different topic areas and how they relate intentional and unintentional food fraud\n [\"0c03c952-6df5-4c97-881d-1c94be6f9e1a\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T11:41:13\n _Jane Doe\n 2017-05-23T11:41:13\n GFSI's recommendations to food industry to mitigate risk of food fraud\n 1\n 0\n \n 3\n true\n 3\n 3\n\n3]]>\n 3\n 30\n 2\n 1\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n 0\n gfsi's recommendations to food industry to mitigate risk of food fraud\n [\"f68c8e2d-20fc-4566-ac17-6866463d808e\"]\n 1\n “Secondly, appropriate control measures shall be put in place to reduce the risks from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Secondly, }{\\rtlch\\af0\\afs24\\ltrch\\b\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 appropriate control measures shall be put in place to reduce the risks } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Secondly, <strong>appropriate control measures shall be put in place to reduce the risks </strong>from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:19:50\n _Jane Doe\n 2017-05-23T13:19:50\n Definition of food fraud (Hong et al)\n 1\n 0\n -1\n 0\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n definition of food fraud (hong et al)\n [\"3af0c525-b411-459c-8606-feb17b53dee7\"]\n 1\n “The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:24:24\n _Jane Doe\n 2017-05-23T13:24:24\n Typical kinds of adulterated foods\n 1\n 0\n -1\n 1\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n typical kinds of adulterated foods\n [\"c53c93a1-09d5-48b4-9079-f0111e37c6b5\"]\n 1\n “In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:31:25\n _Jane Doe\n 2017-05-23T13:31:25\n Mass spectrometry is the type of testing used for most types of food\n 1\n 0\n -1\n 2\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n mass spectrometry is the type of testing used for most types of food\n [\"e6b65286-04b5-4c1e-af74-687d0cd825f3\"]\n 1\n “A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:32:15\n _Jane Doe\n 2017-05-23T13:32:15\n Most common detection method by food category\n 1\n 0\n -1\n 3\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n most common detection method by food category\n [\"5d769f10-489a-4887-9fb0-c48fe171055b\"]\n 1\n “Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:39:56\n _Jane Doe\n 2017-05-23T13:39:56\n Four categories used when authenticating meat\n 1\n 0\n -1\n 4\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n four categories used when authenticating meat\n [\"b65417c3-b00a-4191-86a8-8d99d4584d9f\"]\n 1\n “Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).”</p>\n \n \n _Jane Doe\n 2017-05-23T13:41:11\n _Jane Doe\n 2017-05-23T13:41:11\n DNA-based techniques most popular for meat authentication testing\n 1\n 0\n -1\n 5\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n dna-based techniques most popular for meat authentication testing\n [\"cf8966e1-942f-405d-8df0-ad4ce55c1897\"]\n 1\n “The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:42:15\n _Jane Doe\n 2017-05-23T13:42:15\n Meat usually adulterated with pork and testing can be an issue to detect if the meat is minced or processed\n 1\n 0\n -1\n 6\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n meat usually adulterated with pork and testing can be an issue to detect if the meat is minced or pr\n [\"47c42fcc-9316-4057-b2ee-deda28c40029\"]\n 1\n “A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:46:16\n _Jane Doe\n 2017-05-23T13:46:16\n How fish and seafood are typically adulterated\n 1\n 0\n -1\n 7\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n how fish and seafood are typically adulterated\n [\"cf0f900f-358d-493d-9c6e-945f9e6f1b82\"]\n 1\n “Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.”</p>\n \n \n _Jane Doe\n 2017-05-24T12:26:50\n _Jane Doe\n 2017-05-24T12:26:50\n Difficulty: not yet enough academic literature since the field of food integrity is still developing\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 0\n 1\n 3012ebe2-c183-4d12-9851-5ab7b6d2421c\n 0\n difficulty: not yet enough academic literature since the field of food integrity is still developing\n [\"04bcaed3-68a1-4e41-b7aa-d2b71f662a0e\"]\n 1\n “The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang1033\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...”</p>\n \n \n _Jane Doe\n 2017-05-23T06:51:31\n _Jane Doe\n 2017-05-23T06:51:31\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 0\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"9a3e17a4-26a8-4968-bc43-69dff760b6db\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T06:54:07\n _Jane Doe\n 2017-05-23T06:54:07\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 1\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"902c9e2d-a6a1-461a-8302-0a6f55ac01c2\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:49\n _Jane Doe\n 2017-11-09T11:13:49\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 2\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"e6f6ec26-a3bf-45d7-bc26-9eb10374cbc0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:56\n _Jane Doe\n 2017-11-09T11:13:56\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 3\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"6ec1cd25-88fd-414f-a13f-baa51bb6b6a2\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:14:05\n _Jane Doe\n 2017-11-09T11:14:05\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 4\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"e51c887b-254e-459e-b3dd-66b9403ae409\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:07:48\n _Jane Doe\n 2017-05-23T07:07:48\n 0\n 0\n \n 824\n true\n 824\n 824\n\n824]]>\n 824\n 30\n 5\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"6ec86026-8bb5-4430-9257-524891c81d97\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:14:40\n _Jane Doe\n 2017-11-09T11:14:40\n 0\n 0\n \n 824\n true\n 824\n 824\n\n824]]>\n 824\n 30\n 6\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"3d70963d-5e78-4c42-b75e-98955a8032c1\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:14:48\n _Jane Doe\n 2017-11-09T11:14:48\n 0\n 0\n \n 824\n true\n 824\n 824\n\n824]]>\n 824\n 30\n 7\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"4e8990fb-2b37-4b8f-8053-4441113fd9f7\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:11:21\n _Jane Doe\n 2017-05-23T07:11:21\n 0\n 0\n \n 825\n true\n 825\n 825\n\n825]]>\n 825\n 30\n 8\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"b17d227a-5d6d-4946-bdd4-df8fdc8e1e80\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:13\n _Jane Doe\n 2017-11-09T11:15:13\n 0\n 0\n \n 825\n true\n 825\n 825\n\n825]]>\n 825\n 30\n 9\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"e836a05c-5b0e-4c44-9010-e7b6c07adf9c\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:18\n _Jane Doe\n 2017-11-09T11:15:18\n 0\n 0\n \n 825\n true\n 825\n 825\n\n825]]>\n 825\n 30\n 10\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"f2b27600-221f-49fd-9e9e-9abc397834d1\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:19:05\n _Jane Doe\n 2017-05-23T07:19:05\n 0\n 0\n \n 826\n true\n 826\n 826\n\n826]]>\n 826\n 30\n 11\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"d879a1f5-6fec-42e0-85a2-40bc147c12b0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:36\n _Jane Doe\n 2017-11-09T11:15:36\n 0\n 0\n \n 826\n true\n 826\n 826\n\n826]]>\n 826\n 30\n 12\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"27619d70-5d06-4014-af20-20be6670feaf\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:25:12\n _Jane Doe\n 2017-05-23T07:25:12\n 0\n 0\n \n 829\n true\n 829\n 829\n\n829]]>\n 829\n 30\n 13\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"200c35b7-1b10-492d-b171-fbabba5e7885\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:57\n _Jane Doe\n 2017-11-09T11:15:57\n 0\n 0\n \n 829\n true\n 829\n 829\n\n829]]>\n 829\n 30\n 14\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"d0b8f6be-e223-48e5-8c79-8eb44d67616c\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:30:19\n _Jane Doe\n 2017-05-23T07:30:19\n 0\n 0\n \n 830\n true\n 830\n 830\n\n830]]>\n 830\n 30\n 15\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"0d0609fe-0e80-4e96-8983-e8fc74bb8e99\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:30:26\n _Jane Doe\n 2017-05-23T07:30:26\n 0\n 0\n \n 830\n true\n 830\n 830\n\n830]]>\n 830\n 30\n 16\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"582d3a38-a296-47b5-8a92-6f3be692d787\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:16:11\n _Jane Doe\n 2017-11-09T11:16:11\n 0\n 0\n \n 830\n true\n 830\n 830\n\n830]]>\n 830\n 30\n 17\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"132fbe78-044d-44d1-ac8d-42c84b77b9de\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:35:25\n _Jane Doe\n 2017-05-23T07:35:25\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 18\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"2c5edbf5-4c3b-4b11-acb0-aaf22a987d73\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:35:52\n _Jane Doe\n 2017-05-23T07:35:52\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 19\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"f07a7a4e-d09d-4fee-80e6-6ab5018f1e3e\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:36:15\n _Jane Doe\n 2017-05-23T07:36:15\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 20\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"357157b5-f382-43fa-b8e5-141e9cb9e7b8\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:19\n _Jane Doe\n 2017-11-09T11:13:19\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 21\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"29f8f96b-7ca4-48ec-9df4-bd872e2235b0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:34\n _Jane Doe\n 2017-11-09T11:13:34\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 22\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"494a0e50-b408-4e6a-8b45-404d84412a57\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:17:04\n _Jane Doe\n 2017-11-09T11:17:04\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 23\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"461d13e8-c315-439f-a4a7-09a0e0492f22\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T06:55:26\n _Jane Doe\n 2017-05-23T06:55:26\n Terminological difficulties - contamination vs. adulteration\n 1\n 0\n \n Other\n Omit\n R823\n R823\n\nR823]]>\n 2147483647\n 100\n 24\n 2\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n terminological difficulties - contamination vs. adulteration\n [\"cee55399-c332-44c0-b511-7eb738168acf\"]\n 1\n Sometimes in U.S. literature \"contamination\" = unintentional, while \"adulteration\" = intentional\n 0\n {\\rtf1\\ansi \n\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto \n\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Sometimes in U.S. literature \"contamination\" = unintentional, while \"adulteration\" = intentional}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Sometimes in U.S. literature &quot;contamination&quot; = unintentional, while &quot;adulteration&quot; = intentional</p>\n \n \n _Jane Doe\n 2017-05-23T06:58:59\n _Jane Doe\n 2017-05-23T06:58:59\n Concept of food safety is changing\n 1\n 0\n \n Other\n Omit\n R823\n R823\n\nR823]]>\n 2147483647\n 100\n 25\n 3\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n concept of food safety is changing\n [\"f7d2094c-d5b2-4889-b24d-66998c90bbdf\"]\n 1\n Unintentional and intentional contamination used to be considered together, now they are often looked at separately.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Unintentional and intentional contamination used to be considered together, now they are often looked at separately.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Unintentional and intentional contamination used to be considered together, now they are often looked at separately.</p>\n \n \n _Jane Doe\n 2017-05-23T06:59:55\n _Jane Doe\n 2017-05-23T06:59:55\n High demand and low supply can create the conditions for food fraud\n 1\n 0\n \n Other\n Omit\n R823\n R823\n\nR823]]>\n 2147483647\n 100\n 26\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n high demand and low supply can create the conditions for food fraud\n [\"48c0f246-4561-47fd-a928-3236c20e6ac0\"]\n 1\n “The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.”</p>\n \n \n _Jane Doe\n 2017-05-23T07:03:33\n _Jennifer Schultz\n 2020-01-10T08:16:29\n Definition of food crime (Manning & Soon)\n 1\n 0\n \n Other\n Omit\n R824\n R824\n\nR824]]>\n 2147483647\n 100\n 27\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n definition of food crime (manning & soon)\n [\"8ff83742-4311-46ac-801a-5a76f57c493c\"]\n 1\n “...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang8192\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 ...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.”</p>\n \n \n _Jane Doe\n 2017-05-23T07:04:21\n _Jane Doe\n 2017-05-23T07:04:21\n Example of food crime through intentional neglect\n 1\n 0\n \n Other\n Omit\n R824\n R824\n\nR824]]>\n 2147483647\n 100\n 28\n 4\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n example of food crime through intentional neglect\n [\"d13876cc-e992-43cc-8e87-24fc604ecc0b\"]\n 1\n See PDF\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman \n;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 See PDF}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>See PDF</p>\n \n \n _Jane Doe\n 2017-05-23T07:09:54\n _Jane Doe\n 2017-05-23T07:09:54\n Definition of food defense (Manning & Soon)\n 1\n 0\n \n Other\n Omit\n R824\n R824\n\nR824]]>\n 2147483647\n 100\n 29\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n definition of food defense (manning & soon)\n [\"1208da8f-0b6a-4243-b51c-b6bf3a1a4a8d\"]\n 1\n “Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:19:29\n _Jane Doe\n 2017-11-09T10:19:29\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Types of food crime\n 1\n 1\n \n Other\n Omit\n R825\n R825\n\nR825]]>\n 2147483647\n 100\n 30\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n types of food crime\n [\"4c289bfd-d38d-46ed-9093-2bbace8fd212\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T07:15:12\n _Jane Doe\n 2017-05-23T07:15:12\n Definition of crime vulnerability\n 1\n 0\n \n Other\n Omit\n R825\n R825\n\nR825]]>\n 2147483647\n 100\n 31\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n definition of crime vulnerability\n [\"ddae3e2f-79d0-4b69-8b22-6291258c0f42\"]\n 1\n “Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:20:06\n _Jane Doe\n 2017-11-09T10:20:06\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food (3).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Drivers behind food crime and food defense\n 1\n 1\n \n Other\n Omit\n R826\n R826\n\nR826]]>\n 2147483647\n 100\n 32\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n drivers behind food crime and food defense\n [\"7d384726-bdd1-4000-84d9-ca5e09e381eb\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T07:24:14\n _Jane Doe\n 2017-05-23T07:24:14\n There needs to be a better understanding of what motivates food criminals\n 1\n 0\n \n Other\n Omit\n R827–R828\n R827–R828\n\nR827–R828]]>\n 2147483647\n 100\n 33\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n there needs to be a better understanding of what motivates food criminals\n [\"77698f1c-1bc4-4517-9440-ca6fcc0fd650\"]\n 1\n “Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:20:39\n _Jane Doe\n 2017-11-09T10:20:39\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food (4).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Intentional and unintentional adulteration\n 1\n 1\n \n Other\n Omit\n R828\n R828\n\nR828]]>\n 2147483647\n 100\n 34\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n intentional and unintentional adulteration\n [\"abd167e6-169f-4da5-b89c-14ba7330f00f\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T07:29:40\n _Jane Doe\n 2017-05-23T07:29:40\n Differences between GFSI (2014) and FSIS (2014) and FAO (2003)\n 1\n 0\n \n Other\n Omit\n R829\n R829\n\nR829]]>\n 2147483647\n 100\n 35\n 3\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n differences between gfsi (2014) and fsis (2014) and fao (2003)\n [\"f387329c-2154-48b6-b54c-45d799274dda\"]\n 1\n See PDF\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman \n;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 See PDF}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>See PDF</p>\n \n \n _Jane Doe\n 2017-05-23T07:31:23\n _Jane Doe\n 2017-05-23T07:31:23\n Both scientific and social scientific criteria needed for risk assessment\n 1\n 0\n \n Other\n Omit\n R830\n R830\n\nR830]]>\n 2147483647\n 100\n 36\n 6\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n both scientific and social scientific criteria needed for risk assessment\n [\"179bc094-578b-4ad6-965c-a571dc5ce4e7\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:37:28\n _Jennifer Schultz\n 2020-01-10T08:16:06\n Plurality of food crime makes it difficult to define which in turn makes it difficult to create policies to fight it\n 1\n 0\n \n Other\n Omit\n R833\n R833\n\nR833]]>\n 2147483647\n 100\n 37\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n plurality of food crime makes it difficult to define which in turn makes it difficult to create poli\n [\"401e36ec-dc1e-461f-b23d-3e2f69ff6ca0\"]\n 1\n “Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang8192\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:21:16\n _Jane Doe\n 2017-11-09T10:21:16\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Alibaba to use blockchain.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Fake egg found on sale in China in 2012\n 1\n Original photo source: China Daily\n 1\n -1\n 0\n 0\n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n 0\n fake egg found on sale in china in 2012\n [\"16df04bd-2d53-4db7-b239-96b11888a736\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T11:19:01\n _Jane Doe\n 2017-05-23T11:19:01\n 0\n 0\n -1\n 0\n 5\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n _\n [\"bbdbc5cb-8820-4885-a040-00fb9771b379\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T11:19:16\n _Jane Doe\n 2017-05-23T11:19:16\n 0\n 0\n -1\n 1\n 5\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n _\n [\"7f88c6a8-50e7-4bec-93b3-a09b732a283a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T11:19:29\n _Jane Doe\n 2017-05-23T11:19:29\n 0\n 0\n -1\n 2\n 5\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n _\n [\"9ceec2ea-2850-4c77-b8f3-dd5b42f0536f\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T11:20:45\n _Jane Doe\n 2017-05-23T11:20:45\n Most often food fraud is not likely to cause health problems, but it does lead to lower quality food\n 1\n 0\n \n 4\n true\n 4\n 4\n\n4]]>\n 4\n 30\n 3\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n most often food fraud is not likely to cause health problems, but it does lead to lower quality food\n [\"1d77854e-8ffc-4b4d-a3c4-6602287da082\"]\n 1\n “The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:21:56\n _Jane Doe\n 2017-05-23T11:21:56\n Steps for prevention\n 1\n 0\n \n 6\n true\n 6\n 6\n\n6]]>\n 6\n 30\n 4\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n steps for prevention\n [\"88712cb7-bf94-4953-a038-7e5e8bf3a37c\"]\n 1\n “A general approach to prevent food fraud can be summarised as follows: \n• Conduct vulnerability assessment, including: \n– Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); \n– Know your suppliers (manufacturer, broker, history); \n – Know your supply chain (length, complexity, supply & demand arrangements, ease of access); \n – Know your existing control measures. \n• Design mitigation strategy and implement mitigation measures. \n• Validate and verify mitigation measures, continually review food fraud management system.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 A general approach to prevent food fraud can be summarised as follows: }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Conduct vulnerability assessment, including: } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your suppliers (manufacturer, broker, history);}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your supply chain (length, complexity, supply & demand arrangements, ease of access);} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your existing control measures. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Design mitigation strategy and implement mitigation measures. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Validate and verify mitigation measures, continually review food fraud management system.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“A general approach to prevent food fraud can be summarised as follows: </p><p>• Conduct vulnerability assessment, including: </p><p>– Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); </p><p>– Know your suppliers (manufacturer, broker, history);</p><p> – Know your supply chain (length, complexity, supply &amp; demand arrangements, ease of access);</p><p> – Know your existing control measures. </p><p>• Design mitigation strategy and implement mitigation measures. </p><p>• Validate and verify mitigation measures, continually review food fraud management system.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:22:32\n _Jane Doe\n 2017-05-23T11:22:32\n Factors that can contribute to fraud\n 1\n 0\n \n 6\n true\n 6\n 6\n\n6]]>\n 6\n 30\n 5\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n factors that can contribute to fraud\n [\"2b813a6c-9cdd-4749-afa1-73a2ffe7aa2f\"]\n 1\n “Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:23:03\n _Jane Doe\n 2017-05-23T11:23:03\n Increases in prices for an ingredient and rarity are good conditions for fraud\n 1\n 0\n \n 8\n true\n 8\n 8\n\n8]]>\n 8\n 30\n 6\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n increases in prices for an ingredient and rarity are good conditions for fraud\n [\"d37b518d-3d2a-44fe-9f35-3464ca8067ff\"]\n 1\n “Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:23:13\n _Jane Doe\n 2017-05-23T11:23:13\n Geopolitical considerations\n 1\n 0\n \n 8\n true\n 8\n 8\n\n8]]>\n 8\n 30\n 7\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n geopolitical considerations\n [\"69816a84-eab2-4db9-ab37-21ff0f9875c1\"]\n 1\n “Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).”</p>\n \n \n _Jane Doe\n 2017-11-09T10:22:01\n _Jane Doe\n 2017-11-09T10:22:01\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"jpg.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Vulnerability factors vs. control measures\n 1\n 1\n \n 8\n true\n 8\n 8\n\n8]]>\n 8\n 30\n 8\n 0\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n vulnerability factors vs. control measures\n [\"104e414d-6d21-4cc5-93c9-2203486944db\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T11:23:27\n _Jane Doe\n 2017-05-23T11:23:27\n What's needed to judge food fraud risk\n 1\n 0\n \n 9\n true\n 9\n 9\n\n9]]>\n 9\n 30\n 9\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n what's needed to judge food fraud risk\n [\"ecfc28ae-4044-4dfd-9084-83b7151b92ac\"]\n 1\n “In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:26:56\n _Jane Doe\n 2017-05-23T11:26:56\n Two types of raw material monitoring\n 1\n 0\n \n 10\n true\n 10\n 10\n\n10]]>\n 10\n 30\n 10\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n two types of raw material monitoring\n [\"15e98949-c2c5-4a59-bb64-1eb9d2f2c566\"]\n 1\n “Raw material monitoring should be performed using appropriate analytical methods for the verification of authenticity. The methods must be selective, specific, and of appropriate sensitivity to verify that the food authenticity process is efficient. There are 2 approaches: \n • Targeted analyses (linked to parameters specified in raw material specifications); \n • Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Raw material monitoring should}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 be performed using appropriate}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 analytical methods for the verification} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 of authenticity. The methods must be}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 selective, specific, and of appropriate}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1 \n\\dbch\\af1\\hich\\f1 sensitivity to verify that the food}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 authenticity process is efficient. There}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 are 2 approaches:}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Targeted analyses (linked to parameters specified in raw material specifications);} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Raw material monitoring should be performed using appropriate analytical methods for the verification of authenticity. The methods must be selective, specific, and of appropriate sensitivity to verify that the food authenticity process is efficient. There are 2 approaches:</p><p> • Targeted analyses (linked to parameters specified in raw material specifications);</p><p> • Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:27:48\n _Jane Doe\n 2017-05-23T11:27:48\n Businesses should use suppliers they can trust and who will share processes with them\n 1\n 0\n \n 11\n true\n 11\n 11\n\n11]]>\n 11\n 30\n 11\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n businesses should use suppliers they can trust and who will share processes with them\n [\"887b8976-32dd-4d0d-9cc8-cf6900e8f2c9\"]\n 1\n “Confidence is increased with a supplier’s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Confidence is increased with a supplier\\u8217 s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Confidence is increased with a supplier’s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:29:03\n _Jane Doe\n 2017-05-23T11:29:03\n Auditing examples\n 1\n 0\n \n 14\n true\n 14\n 14\n\n14]]>\n 14\n 30\n 12\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n auditing examples\n [\"7fa97a46-02c3-47af-834e-2e0b44ce28e9\"]\n 1\n “More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site – auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site – auditors may look for the presence of equipment used to inject brine.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site \\u8211 auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site \\u8211 auditors may look for the presence of equipment used to inject brine.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site – auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site – auditors may look for the presence of equipment used to inject brine.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:30:09\n _Jane Doe\n 2017-05-23T11:30:09\n Definition of EMA (economically-motivated adulteration)\n 1\n 0\n \n 16\n true\n 16\n 16\n\n16]]>\n 16\n 30\n 13\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n definition of ema (economically-motivated adulteration)\n [\"950f7112-c76c-49b2-86a3-1d110a70450a\"]\n 1\n “EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).”</p>\n \n \n _Jane Doe\n 2017-05-23T11:32:06\n _Jane Doe\n 2017-05-23T11:32:06\n Recommendations for consumers for avoiding food fraud\n 1\n 0\n \n 18\n true\n 18\n 18\n\n18]]>\n 18\n 30\n 14\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n recommendations for consumers for avoiding food fraud\n [\"d0bbd7f9-b7da-47b6-a9e8-891375dcb566\"]\n 1\n “Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:57:59\n _Jane Doe\n 2017-05-23T09:57:59\n 0\n 0\n -1\n 0\n 5\n 89c1b839-ce76-43f4-be84-84d394af9179\n 0\n _\n [\"d0ca8bfe-538f-4434-90f1-790d137e5c3a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:23:12\n _Jane Doe\n 2017-11-09T11:23:12\n 0\n 0\n -1\n 1\n 5\n 89c1b839-ce76-43f4-be84-84d394af9179\n 0\n _\n [\"80f331b9-7f22-4123-afb3-f2230ed49982\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:57:38\n _Jane Doe\n 2017-05-23T09:57:38\n How blockchain works when applied to the food supply chain\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 2\n 1\n 89c1b839-ce76-43f4-be84-84d394af9179\n 0\n how blockchain works when applied to the food supply chain\n [\"3f81552b-1c60-4551-ba85-5ea03651cf23\"]\n 1\n “When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:09:20\n _Jane Doe\n 2017-05-23T11:09:20\n Adulteration usually not complete subsitution but attempt to cover up something in the food\n 1\n 0\n \n Other\n]]>\n 2147483647\n 30\n 0\n 2\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n 0\n adulteration usually not complete subsitution but attempt to cover up something in the food\n [\"b08f5281-59ae-4579-83f8-87e17055a1b6\"]\n 1\n Usually it's an attempt to mask something in the food and is not an outright 100% substitution.\n 0\n {\\rtf1\\ansi \n\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto \n\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Usually it's an attempt to mask something in the food and is not an outright 100% substitution.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Usually it&#39;s an attempt to mask something in the food and is not an outright 100% substitution.</p>\n \n \n _Jane Doe\n 2017-05-23T11:13:34\n _Jane Doe\n 2017-05-23T11:13:34\n Adulteration can occur with almost all types of food\n 1\n 0\n \n 0\n Other\n Omit\n 0:25\n 0:25\n\n0:25]]>\n 0\n 100\n 1\n 1\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n 0\n adulteration can occur with almost all types of food\n [\"33438200-3449-4979-a4a2-94d78443f721\"]\n 1\n “Pretty much every food is vulnerable. ”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Pretty much every food is vulnerable. \\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Pretty much every food is vulnerable. ”</p>\n \n \n _Jane Doe\n 2017-05-23T11:06:39\n _Jane Doe\n 2017-05-23T11:06:39\n Testing in UK has revealed widespread adulteration or misrepresentation of ingredients\n 1\n 0\n \n 1\n Other\n Omit\n 1:25\n 1:25\n\n1:25]]>\n 1\n 100\n 2\n 1\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n 0\n testing in uk has revealed widespread adulteration or misrepresentation of ingredients\n [\"91029301-0fb8-400f-8904-5a0b7479e03d\"]\n 1\n “Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:22:43\n _Jane Doe\n 2017-11-09T10:22:43\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"GFSI Direction on Food Fr (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n GFSI Approach to Food Fraud Prevention\n 1\n 1\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 0\n 0\n 0d576b32-d148-4660-9d3c-05e19c6b7691\n 0\n gfsi approach to food fraud prevention\n [\"6b9f3fb9-2757-4b76-a91b-54cf4adbf2d6\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-11-09T10:23:28\n _Jane Doe\n 2017-11-09T10:23:28\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"GFSI Direction on Food Fr.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n GFSI Terminology Comparison\n 1\n 1\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 1\n 0\n 0d576b32-d148-4660-9d3c-05e19c6b7691\n 0\n gfsi terminology comparison\n [\"ff577b32-02d1-403c-aad5-169a570efc4c\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T08:13:39\n _Jane Doe\n 2017-05-23T08:13:39\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 0\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"75759000-02d3-4229-955d-3fa103ef77d9\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:16:01\n _Jane Doe\n 2017-05-23T08:16:01\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 1\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"833f82a9-7682-4070-a24c-67cc0c60a877\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:17:34\n _Jane Doe\n 2017-05-23T08:17:34\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 2\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"2901446f-4cd7-4524-982d-0e9ebaecd200\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:17:46\n _Jane Doe\n 2017-05-23T08:17:46\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 3\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"838bc2f9-b197-40c4-b442-9e0546cbedf0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-29T14:15:17\n _Jane Doe\n 2017-05-29T14:15:17\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 4\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"aa5972e5-c352-4caa-8064-19f7060d71fa\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:42\n _Jane Doe\n 2017-11-09T11:27:42\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 5\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"4d738d10-e999-4a07-9ca2-97fbff09a1da\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:47\n _Jane Doe\n 2017-11-09T11:27:47\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 6\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"d9295af9-fc58-4131-b4d6-f9067464ccf4\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:48\n _Jane Doe\n 2017-11-09T11:27:48\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 7\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"d7e9694b-4087-4aef-8de9-e357f81fd32d\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:10\n _Jane Doe\n 2017-11-09T11:28:10\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 8\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"534c0a89-52c8-4b41-9e3a-00f197734cc3\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:18\n _Jane Doe\n 2017-11-09T11:28:18\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 9\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"714b6601-4fc6-47e4-b28d-1c9968cac18a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:23:38\n _Jane Doe\n 2017-05-23T08:23:38\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 10\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"d247950e-4fd2-47fd-a55e-155c395a7df4\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:23:54\n _Jane Doe\n 2017-05-23T08:23:54\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 11\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"2b94ecf8-4d24-41ef-a5e5-b3eaa002a207\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:39\n _Jane Doe\n 2017-11-09T11:28:39\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 12\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"29779eaa-3bf1-4661-9e40-6feffe0ecdbc\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:48\n _Jane Doe\n 2017-11-09T11:28:48\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 13\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"88cf00f5-d509-4b86-9966-a22bbff4e2a9\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:51:04\n _Jane Doe\n 2017-05-23T08:51:04\n 0\n 0\n \n 160\n true\n 160\n 160\n\n160]]>\n 160\n 30\n 14\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"597078db-2267-43b1-a870-a3ff4a9aac7f\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:58:40\n _Jane Doe\n 2017-05-23T08:58:40\n 0\n 0\n \n 161\n true\n 161\n 161\n\n161]]>\n 161\n 30\n 15\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"00ad08db-228d-4b0c-8b28-5cc0103eeb58\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:29:14\n _Jane Doe\n 2017-11-09T11:29:14\n 0\n 0\n \n 161\n true\n 161\n 161\n\n161]]>\n 161\n 30\n 16\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"ae95820b-c373-4967-86e5-7ee906623819\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:06:47\n _Jane Doe\n 2017-05-23T09:06:47\n 0\n 0\n \n 162\n true\n 162\n 162\n\n162]]>\n 162\n 30\n 17\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"649227b5-bbd8-4d3d-ba0c-5d6050a7322a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:23\n _Jane Doe\n 2017-11-09T11:27:23\n 0\n 0\n \n 162\n true\n 162\n 162\n\n162]]>\n 162\n 30\n 18\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"f1789cf9-f873-49c7-b5b4-0e683419b4d6\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:15:48\n _Jane Doe\n 2017-05-23T08:15:48\n Definitions of food fraud, food safety incidents, and food defense incidents\n 1\n 0\n \n Other\n Omit\n R157\n R157\n\nR157]]>\n 2147483647\n 100\n 19\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n definitions of food fraud, food safety incidents, and food defense incidents\n [\"7e636a94-6870-4475-b3cc-f85fd4f32ed5\"]\n 1\n “Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:16:50\n _Jane Doe\n 2017-05-23T08:16:50\n Where food fraud fits as a term\n 1\n 0\n \n Other\n Omit\n R157\n R157\n\nR157]]>\n 2147483647\n 100\n 20\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n where food fraud fits as a term\n [\"c83ae611-504e-4bd3-98a6-b46508938b1a\"]\n 1\n “Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:20:56\n _Jane Doe\n 2017-05-23T08:20:56\n Difference between fraud in ancient and contemporary times\n 1\n 0\n \n Other\n Omit\n R158\n R158\n\nR158]]>\n 2147483647\n 100\n 21\n 2\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n difference between fraud in ancient and contemporary times\n [\"ea6d5b15-c147-4abd-8b0f-59622cc8dbf2\"]\n 1\n Although fraud existed, it was geographically limited. Today the scale can be vast.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Although fraud existed, it was geographically limited. Today the scale can be vast.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Although fraud existed, it was geographically limited. Today the scale can be vast.</p>\n \n \n _Jane Doe\n 2017-05-23T08:23:14\n _Jane Doe\n 2017-05-23T08:23:14\n Definition of food fraud (Spink & Moyer)\n 1\n 0\n \n Other\n Omit\n R158\n R158\n\nR158]]>\n 2147483647\n 100\n 22\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n definition of food fraud (spink & moyer)\n [\"b6f46a8f-a710-4874-8691-06d114a1ea57\"]\n 1\n “Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:24:01\n _Jane Doe\n 2017-11-09T10:24:01\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defin.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Components of a food protection plan\n 1\n 1\n \n Other\n Omit\n R158\n R158\n\nR158]]>\n 2147483647\n 100\n 23\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n components of a food protection plan\n [\"106e81a9-5250-4629-98e5-0755cdcb9614\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T08:48:43\n _Jane Doe\n 2017-05-23T08:48:43\n Direct food fraud risk definition\n 1\n 0\n \n Other\n Omit\n R159\n R159\n\nR159]]>\n 2147483647\n 100\n 24\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n direct food fraud risk definition\n [\"275dc314-72e9-4954-ab97-0317ae045d6e\"]\n 1\n “Direct food fraud risk occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Direct food fraud risk }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“<em>Direct food fraud risk </em>occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:48:59\n _Jennifer Schultz\n 2020-01-10T08:17:21\n Indirect food fraud risk - definition\n 1\n 0\n \n Other\n Omit\n R159\n R159\n\nR159]]>\n 2147483647\n 100\n 25\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n indirect food fraud risk - definition\n [\"9134e593-8630-4080-a438-1816ad0e4af5\"]\n 1\n “Indirect food fraud risk occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang8192\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Indirect food fraud risk }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“<em>Indirect food fraud risk </em>occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:49:11\n _Jane Doe\n 2017-05-23T08:49:11\n Technical food fraud risk - definition\n 1\n 0\n \n Other\n Omit\n R159\n R159\n\nR159]]>\n 2147483647\n 100\n 26\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n technical food fraud risk - definition\n [\"99a3e2b3-dff3-474b-9283-a90e0f15436b\"]\n 1\n “Technical food fraud risk is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Technical food fraud risk }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“<em>Technical food fraud risk </em>is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:52:55\n _Jane Doe\n 2017-05-23T08:52:55\n Differences between food fraud and food defense\n 1\n 0\n \n Other\n Omit\n R160\n R160\n\nR160]]>\n 2147483647\n 100\n 27\n 2\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n differences between food fraud and food defense\n [\"8c6a1fb5-75dd-4200-ae3d-2b502d797f18\"]\n 1\n Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{ \n\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055 \n\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.</p>\n \n \n _Jane Doe\n 2017-11-09T10:24:39\n _Jane Doe\n 2017-11-09T10:24:39\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defin (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Food protection risk matrix\n 1\n 1\n \n Other\n Omit\n R160\n R160\n\nR160]]>\n 2147483647\n 100\n 28\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n food protection risk matrix\n [\"14479497-bccb-40f9-b62f-90f3dd02f52b\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T08:56:25\n _Jane Doe\n 2017-05-23T08:56:25\n How to reduce likelihood of food fraud\n 1\n 0\n \n Other\n Omit\n R161\n R161\n\nR161]]>\n 2147483647\n 100\n 29\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n how to reduce likelihood of food fraud\n [\"909a5b8d-1d99-482f-9ff9-b8d6daee7b99\"]\n 1\n “Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:05:11\n _Jane Doe\n 2017-05-23T09:05:11\n Reasons enforcing food fraud laws is difficult\n 1\n 0\n \n Other\n Omit\n R162\n R162\n\nR162]]>\n 2147483647\n 100\n 30\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n reasons enforcing food fraud laws is difficult\n [\"d4430d73-5837-4de9-9a44-a0af91d9db9f\"]\n 1\n “Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{ \n\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.\\u8221 }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:06:18\n _Jane Doe\n 2017-05-23T09:06:18\n What is needed to prevent food fraud\n 1\n 0\n \n Other\n Omit\n R162\n R162\n\nR162]]>\n 2147483647\n 100\n 31\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n what is needed to prevent food fraud\n [\"26060f67-337d-4748-aad1-b5af19998a0f\"]\n 1\n “Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe crime triangle provides insights to the motivations for seeking food fraud opportunities.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{ \n\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe } \n{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 crime triangle }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 provides insights to the motivations for seeking food fraud opportunities.\\u8221 }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe <em>crime triangle </em>provides insights to the motivations for seeking food fraud opportunities.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:12:50\n _Jane Doe\n 2017-05-23T09:12:50\n 0\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 0\n 5\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n _\n [\"c8488669-d188-4e65-a387-620f08957e7f\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:13:28\n _Jane Doe\n 2017-05-23T09:13:28\n Why identifying species in certain food products is difficult\n 1\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 1\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n why identifying species in certain food products is difficult\n [\"bc4dc18d-e654-4b70-a596-5bab3e9e8778\"]\n 1\n “Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:15:31\n _Jane Doe\n 2017-05-23T09:15:31\n DNA barcoding use\n 1\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 2\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n dna barcoding use\n [\"20cafe17-26a7-4691-a126-2ffd07e33dfe\"]\n 1\n “DNA barcoding uses a short, standardized region to distinguish different taxa at the species level.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{ \n\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 DNA barcoding}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1 \n\\hich\\f1 uses a short,}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 standardized region to distinguish different taxa at the species level.\\u8221 }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“DNA barcoding uses a short, standardized region to distinguish different taxa at the species level.”</p>\n \n \n _Jane Doe\n 2017-11-09T11:33:02\n _Jane Doe\n 2017-11-09T11:33:02\n 0\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 3\n 5\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n _\n [\"af9e36cb-b013-4359-b579-c3dc4fb82606\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:16:54\n _Jane Doe\n 2017-05-23T09:16:54\n Example of food adulteration in a test of yak meat jerky\n 1\n 0\n \n 107\n true\n 107\n 107\n\n\n 108\n true\n 108\n 108\n\n107-108]]>\n 107\n 30\n 4\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n example of food adulteration in a test of yak meat jerky\n [\"f8279d06-8a98-478f-b60f-06303b3dab54\"]\n 1\n “Only nine yak jerky samples were identified as yak (Bos grunniens) samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat (Bos taurus), buffalo beef (Bubalus bubalis), or pig meat (Sus scrofa). The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew (Sorex bedfordiae) and the Chinese mole shrew (Anourosorex squamipes).”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Only nine yak jerky samples were identified as yak }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1 \n\\hich\\f1 (Bos grunniens) }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat }{\\rtlch\\af0\\afs24 \n\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Bos taurus), }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 buffalo beef }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Bubalus bubalis), } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 or pig meat }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Sus scrofa). }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew } \n{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Sorex bedfordiae) }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 and the Chinese mole shrew }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1 (Anourosorex squamipes).\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Only nine yak jerky samples were identified as yak <em>(Bos grunniens) </em>samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat <em>(Bos taurus), </em>buffalo beef <em>(Bubalus bubalis), </em>or pig meat <em>(Sus scrofa). </em>The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew <em>(Sorex bedfordiae) </em>and the Chinese mole shrew <em>(Anourosorex squamipes).”</em></p>\n \n \n _Jane Doe\n 2017-05-23T09:17:22\n _Jane Doe\n 2017-05-23T09:17:22\n Percentage of yak jerky products that were adulterated\n 1\n 0\n \n 108\n true\n 108\n 108\n\n108]]>\n 108\n 30\n 5\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n percentage of yak jerky products that were adulterated\n [\"18c45abf-7455-4147-9b01-797b11030640\"]\n 1\n “...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 ...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.”</p>\n \n
\n \n fd96e97f-aba7-4f66-bc38-c7df583fffab;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:1\n b8ff3685-382c-4f19-b7e3-18121d8a9200;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:0\n 7271b0f1-1ed2-4533-b0c2-aedebf3e52fc;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:5\n 74427b9f-fbd4-40bd-823d-657670f76c90;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:13\n 6fb75b29-ae6b-4e6f-ba73-37a077fc397c;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906:1\n 749aae33-cbb7-4aac-9092-7b33e9736eec;55496d4d-9f92-44aa-89ce-3b30e5c437d7:0\n f1774289-5526-4343-9b1b-1157c6654acb;7c3bf245-d473-41fa-952c-22ccb3bf3f8e:0\n 3579306e-3aa8-442f-ae86-5692bacb6116;73aa7410-7c17-4acc-83af-249657be15e6:1\n f5429955-7a99-4225-ba19-0344b7e896b7;93fe40ba-b05c-4d30-8855-f546b7388d2a:0\n 55cd0676-3d1d-4f38-b63f-6cbc66e768a1;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:0\n de69f6c2-af03-47f9-aab9-713e08fc183b;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:1\n e1773aeb-d73d-4793-957c-a0ed87c04720;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:2\n ce68b450-438e-4c2c-9a21-9a1671985cb4;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:3\n 36ca71e4-b319-448c-83da-b6fbbc7c8e43;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:4\n 293ec858-03d9-4cbe-9826-8689dcdb9d5a;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:5\n a3c8b5d4-6350-4814-899f-141f4fb089fa;4a05cca9-2d0d-4ea5-8440-5a09c4f40249:0\n d7702e6d-03df-440c-99f4-23e4d5bbc2a7;8b2dd3a7-2643-425a-9009-4e63647ea860:1\n 9308f85e-7559-453b-a155-70db3f5521e2;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:3\n 0c63766b-d983-4645-90fe-948b397adc9a;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:11\n 1e7c3c78-9d0b-469d-863a-15b4b3927022;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:23\n 99c418c4-6caf-420c-95a1-bacd2272b3f9;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:10\n e5b8a39a-7be3-4000-b3e6-523ffde0625a;c8122f49-7dc9-49e0-8919-eefad7f416a9:0\n c127a352-34d7-4706-b563-ef8542f62f38;a5607a6f-cc37-4e62-968b-bb5deada2317:0\n 260fee07-d706-4715-8972-16e260e38b6a;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:0\n 1ba1b273-f3e7-49fc-bbc3-0b016f298e49;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:1\n e17842b4-ccdb-42f8-8da3-ece6d3b5a337;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:2\n c0d8e13e-ca6c-4a82-af14-372cb8929c81;c8122f49-7dc9-49e0-8919-eefad7f416a9:1\n a3f90c51-7ce7-4b6e-a434-a804f3c014e9;c8122f49-7dc9-49e0-8919-eefad7f416a9:2\n a7263495-1753-4d6b-a5bd-035c37cf9eac;8b2dd3a7-2643-425a-9009-4e63647ea860:0\n d6aaba2e-1f43-4318-9964-b6c73e08e3a7;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:4\n 5864463d-f6e2-4c11-9afd-cc501af9cacb;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:15\n 8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:8\n e728e158-8b56-48d0-88ab-da1926c92c69;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:16\n 44c817de-9ee2-45c5-8ea3-3f776b023b48;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:18\n a2c5b4b0-cdff-471f-b8d4-dc499012dc6a;a83e3adf-a16b-4864-82ef-0efc1dbaa236:2\n e1b7152f-30d5-4886-8a4a-4a647c580fb7;73aa7410-7c17-4acc-83af-249657be15e6:0\n df067b95-5685-4a74-88ec-6aac3bf7e58f;ddb219dd-dfc6-4f0b-b61b-cf5c1b179ae5:0\n 89e1a961-14e1-43b1-baa9-84b685ad3244;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:2\n ae0faadc-51ef-4d95-9f4c-5826b39a10df;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:12\n e4ed0f18-4972-43a6-bd1b-ea7e963cd7e6;4bbd6753-30f2-4e3b-9e32-3c65b5037589:0\n 3b1f0ca4-aed9-41ad-a41e-8f84170f11d8;a83e3adf-a16b-4864-82ef-0efc1dbaa236:0\n 4a0f720f-8088-4031-b20d-cee01582c736;a83e3adf-a16b-4864-82ef-0efc1dbaa236:1\n e8789c0d-bcc7-426c-bc79-4ae45fe123be;4bbd6753-30f2-4e3b-9e32-3c65b5037589:1\n d41db08f-6c2e-4724-899d-f5934846a3b2;4bbd6753-30f2-4e3b-9e32-3c65b5037589:2\n b64ad7df-383b-4606-b5f9-4725c6056945;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:7\n 8756bc78-f317-444a-b13c-7a3a35207b67;fabfd984-d738-4459-8a45-1699b4959a4c:0\n 5683b7c1-2eac-4d95-b72b-65f003284ec8;de4970f8-9818-44d8-88cc-53d9ad4885a3:0\n cbb0de87-e45f-48db-899b-5ebbab2f93bb;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:14\n 07650771-fff2-4109-94f6-1c7bd608768e;c8122f49-7dc9-49e0-8919-eefad7f416a9:3\n bf18bd03-1c15-4ec7-bbfe-36f3cd8e5338;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906:0\n ea630e5f-20ed-48ec-b8eb-c018bd423c17;fb23b54d-bb22-492a-b6a3-a60a2a1288f3:0\n 2f42fd47-185c-4327-8824-d475202af89a;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:24\n c2f0f063-35b2-42e6-9b8d-157e2cbc72fc;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:19\n 5eaf69d3-26a6-4119-89e8-a05fe79a2e1f;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:6\n 6054a098-5dd3-42e1-8b84-a0b8972532be;ac5840bd-bca9-4faa-be65-b59301e55ff1:0\n ebbfda47-b33a-4c90-b40f-2920fa7add4d;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:9\n 1d3d8033-4336-4188-bd49-15f6d6100e2d;145b6eba-876a-46a4-b946-75ddf0389eda:1\n 16b0043e-06e3-4a0d-8d60-5d6fbd85499c;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:20\n 328aeaa3-7fde-456e-b3a9-1b71975366f8;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:21\n e729b06b-fa53-4b86-a40d-61b5b179d919;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:22\n dc437c4e-207b-4c9a-81c7-586937a3e20b;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:17\n 8f16ea76-0030-4a99-a4c8-a4192eb82a37;145b6eba-876a-46a4-b946-75ddf0389eda:2\n 197c843d-c957-4a8c-801f-19166eaba940;145b6eba-876a-46a4-b946-75ddf0389eda:0\n 6b52254c-6e19-420d-a33f-51720c19fb65;09e0c3fd-e4d7-4edc-9481-ab654bd25b81:0\n 68247aee-2053-41d8-8781-e144fdd126cf;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:3\n b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:4\n 8203b7c9-1cee-48ff-bd7c-c357c8ca4002;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:6\n \n \n f1774289-5526-4343-9b1b-1157c6654acb;437bf18e-9e35-4b60-be6f-6f602ee68f52:0\n 3e94bc22-d904-4d6f-8825-ad87fc1f980f;6227b777-0e84-4821-8dae-9eaedecabd54:0;d43bed11-a65d-4885-b093-c68e15b16d79:0\n f5429955-7a99-4225-ba19-0344b7e896b7;5b256307-1522-4bec-9ccb-c16870e43d1f:0;64d057f1-7dee-489d-b2e4-60ab5f91f0a0:0\n 55cd0676-3d1d-4f38-b63f-6cbc66e768a1;34149888-6c19-4c8e-9f78-cebc46455709:0\n de69f6c2-af03-47f9-aab9-713e08fc183b;fe0c8430-1347-4edb-b926-e5dd11b4d471:0;7dcf1db4-2ef5-4e98-a135-68419c7668b4:0\n 593ac1d4-baaa-4a4b-a951-635c2cda0f17;fe0c8430-1347-4edb-b926-e5dd11b4d471:1;7dcf1db4-2ef5-4e98-a135-68419c7668b4:1\n e1773aeb-d73d-4793-957c-a0ed87c04720;9545e837-af5b-41ee-adad-c1c0c2932155:0;86621b63-8055-4c84-83f4-aa7624425ffc:0;7dcf1db4-2ef5-4e98-a135-68419c7668b4:2\n ce68b450-438e-4c2c-9a21-9a1671985cb4;86621b63-8055-4c84-83f4-aa7624425ffc:1;7dcf1db4-2ef5-4e98-a135-68419c7668b4:3\n 36ca71e4-b319-448c-83da-b6fbbc7c8e43;9545e837-af5b-41ee-adad-c1c0c2932155:1\n 293ec858-03d9-4cbe-9826-8689dcdb9d5a;9545e837-af5b-41ee-adad-c1c0c2932155:2\n 735834f8-6fae-4c73-8b55-00c3068752e6;4cdec79a-d001-4971-b6f6-60159fb2959d:1;a39f1a11-76fd-4066-b052-ae8c93975dc6:6\n 9308f85e-7559-453b-a155-70db3f5521e2;0e2c6223-9457-42ac-9d1d-ae4e5b245348:0;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:0\n 0c63766b-d983-4645-90fe-948b397adc9a;0e2c6223-9457-42ac-9d1d-ae4e5b245348:2;799635cb-9052-4161-a85b-d0b05567f5d8:1\n 1e7c3c78-9d0b-469d-863a-15b4b3927022;a85c189d-ab72-491e-af09-9a10e7ba9971:0;5523125e-75f6-4a05-a70b-df2ff4279778:0\n 47d06d33-b809-4e0d-bd63-693381bcfd70;799635cb-9052-4161-a85b-d0b05567f5d8:2\n 99c418c4-6caf-420c-95a1-bacd2272b3f9;0e2c6223-9457-42ac-9d1d-ae4e5b245348:1\n e5b8a39a-7be3-4000-b3e6-523ffde0625a;ea079d52-17ce-4746-8c95-2356a1f9b38c:0\n c127a352-34d7-4706-b563-ef8542f62f38;98efa0a6-2ab1-48a1-b1bb-6a6bb329899b:0\n 1ba1b273-f3e7-49fc-bbc3-0b016f298e49;5b256307-1522-4bec-9ccb-c16870e43d1f:1\n e17842b4-ccdb-42f8-8da3-ece6d3b5a337;1db9120c-b80d-4b2b-998d-cd7e03f2409d:0;3d678358-1c61-49a9-b803-73faa87d31af:0\n c0d8e13e-ca6c-4a82-af14-372cb8929c81;ea079d52-17ce-4746-8c95-2356a1f9b38c:1\n a3f90c51-7ce7-4b6e-a434-a804f3c014e9;ea079d52-17ce-4746-8c95-2356a1f9b38c:2\n d6aaba2e-1f43-4318-9964-b6c73e08e3a7;675601b8-7348-4172-b59b-31430dca68b3:0;ea079d52-17ce-4746-8c95-2356a1f9b38c:3\n 5864463d-f6e2-4c11-9afd-cc501af9cacb;675601b8-7348-4172-b59b-31430dca68b3:1\n f985362b-a982-49d4-a540-b6a9c8d7058c;a39f1a11-76fd-4066-b052-ae8c93975dc6:0\n 8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:2\n 8d60267b-eb59-44e6-b59e-caadaf75e906;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:1\n e728e158-8b56-48d0-88ab-da1926c92c69;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58:0\n aaaecd43-edc1-4db7-a49f-89e5823de7a1;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:4\n 44c817de-9ee2-45c5-8ea3-3f776b023b48;fff11a28-f609-4e53-b0fd-e8f375125c44:0\n a2c5b4b0-cdff-471f-b8d4-dc499012dc6a;a39f1a11-76fd-4066-b052-ae8c93975dc6:7\n d1b41410-9c55-44f9-87d8-7f442a196551;0493bcab-edd6-44ed-84a7-fee44429a7fb:0\n 8e5837b9-2958-42e5-954b-8c3bd1c08ec1;ea079d52-17ce-4746-8c95-2356a1f9b38c:4\n e1b7152f-30d5-4886-8a4a-4a647c580fb7;f3d336b4-2a44-47ac-a90b-28aed494ab23:0;1659bbe0-e7ae-4a7b-b8db-2a5963abb616:0;799635cb-9052-4161-a85b-d0b05567f5d8:0\n 89e1a961-14e1-43b1-baa9-84b685ad3244;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:3\n 8707e530-90fe-49ba-b221-7924b890c876;92423757-be4c-4fc6-9db2-925b467372e3:0;64d057f1-7dee-489d-b2e4-60ab5f91f0a0:2\n e4ed0f18-4972-43a6-bd1b-ea7e963cd7e6;8a9bc375-44f3-4cc2-8bcd-6a53d945f201:0;42c24c74-5d0d-4254-a419-dd33bc8ace1a:0\n 3b1f0ca4-aed9-41ad-a41e-8f84170f11d8;a39f1a11-76fd-4066-b052-ae8c93975dc6:1\n 4a0f720f-8088-4031-b20d-cee01582c736;a39f1a11-76fd-4066-b052-ae8c93975dc6:2\n 8085fdea-c5a2-42f2-8897-02d1b05fb1be;a39f1a11-76fd-4066-b052-ae8c93975dc6:3\n dc6bedab-3788-4e88-9694-91308f59c51d;a14a5847-0f4a-49a3-a234-00aefeff084f:0;a39f1a11-76fd-4066-b052-ae8c93975dc6:8;42c24c74-5d0d-4254-a419-dd33bc8ace1a:3\n d9308c32-983b-417d-98b9-ed59283dc5c9;e213f459-ed5d-4fe0-adad-fa17125c3450:0\n 3c7564b6-5670-4dbe-be61-0f71c7a732da;bd03d0aa-1df2-4487-b304-75f5ed88bef5:0;42c24c74-5d0d-4254-a419-dd33bc8ace1a:1\n 5683b7c1-2eac-4d95-b72b-65f003284ec8;0c4e80e7-ee54-4d2e-88ec-53541ad08b04:0;559abbb3-53e6-4ee6-bf48-17b5e56a0cd7:0;64d057f1-7dee-489d-b2e4-60ab5f91f0a0:1\n bf18bd03-1c15-4ec7-bbfe-36f3cd8e5338;34149888-6c19-4c8e-9f78-cebc46455709:1\n ea630e5f-20ed-48ec-b8eb-c018bd423c17;799635cb-9052-4161-a85b-d0b05567f5d8:3;42c24c74-5d0d-4254-a419-dd33bc8ace1a:4\n 2f42fd47-185c-4327-8824-d475202af89a;799635cb-9052-4161-a85b-d0b05567f5d8:4\n c2f0f063-35b2-42e6-9b8d-157e2cbc72fc;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58:1;0e2c6223-9457-42ac-9d1d-ae4e5b245348:3;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1:0\n 5eaf69d3-26a6-4119-89e8-a05fe79a2e1f;0e2c6223-9457-42ac-9d1d-ae4e5b245348:4\n ebbfda47-b33a-4c90-b40f-2920fa7add4d;0e2c6223-9457-42ac-9d1d-ae4e5b245348:5\n 1d3d8033-4336-4188-bd49-15f6d6100e2d;42c24c74-5d0d-4254-a419-dd33bc8ace1a:5\n 16b0043e-06e3-4a0d-8d60-5d6fbd85499c;a303b4f3-c88b-4112-8199-87d71b22cdf0:0\n 328aeaa3-7fde-456e-b3a9-1b71975366f8;0f597183-07b5-480d-b0e8-655bdd1c244d:0\n e729b06b-fa53-4b86-a40d-61b5b179d919;c8296816-da6f-4bde-9735-0e8577875a06:0\n dc437c4e-207b-4c9a-81c7-586937a3e20b;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58:2;0e2c6223-9457-42ac-9d1d-ae4e5b245348:6\n 8f16ea76-0030-4a99-a4c8-a4192eb82a37;e213f459-ed5d-4fe0-adad-fa17125c3450:1\n 197c843d-c957-4a8c-801f-19166eaba940;a39f1a11-76fd-4066-b052-ae8c93975dc6:4\n 6b52254c-6e19-420d-a33f-51720c19fb65;a39f1a11-76fd-4066-b052-ae8c93975dc6:5\n 1e9280df-aec2-421e-9f7a-92e6f9da339e;4cdec79a-d001-4971-b6f6-60159fb2959d:0;42c24c74-5d0d-4254-a419-dd33bc8ace1a:2\n 68247aee-2053-41d8-8781-e144fdd126cf;1db9120c-b80d-4b2b-998d-cd7e03f2409d:1;5b256307-1522-4bec-9ccb-c16870e43d1f:2\n b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1;1db9120c-b80d-4b2b-998d-cd7e03f2409d:2;5b256307-1522-4bec-9ccb-c16870e43d1f:3\n e1b89b1f-5704-41c8-a4f7-095a6d896830;1db9120c-b80d-4b2b-998d-cd7e03f2409d:3;5b256307-1522-4bec-9ccb-c16870e43d1f:4\n 8203b7c9-1cee-48ff-bd7c-c357c8ca4002;1db9120c-b80d-4b2b-998d-cd7e03f2409d:4;5b256307-1522-4bec-9ccb-c16870e43d1f:5\n \n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33\n _Jane Doe\n 2017-05-24T12:07:31\n _Jane Doe\n 2019-04-25T10:44:30\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 1\n _Jane Doe\n \n \n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n _Jane Doe\n 2017-05-29T17:38:22\n _Jane Doe\n 2018-07-12T11:35:01\n 2018-09-09T22:00:00\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n \n \n 08c4afc4-6416-4b23-8046-dd47c21ccaec\n _Jane Doe\n 2017-05-29T17:36:44\n _Jane Doe\n 2018-07-12T11:49:16\n 0\n Borrow\n 52ae78aa092e7f89944c10487e92e7be7324fa72\n 0\n _Jane Doe\n \n \n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n _Jane Doe\n 2017-05-29T15:37:43\n _Jane Doe\n 2017-05-29T15:37:43\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n _Jane Doe\n 2017-05-24T12:20:56\n _Jane Doe\n 2017-05-24T12:20:56\n 0\n ExamineAndAssess\n 44087adc4b6dd69f117f87465921d63d99bc5812\n 3\n _Jane Doe\n \n \n 3ab6253b-74b7-4701-9431-acfe6df2d2be\n _Jane Doe\n 2017-05-23T14:34:25\n _Jane Doe\n 2017-05-23T14:34:25\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 1\n _Jane Doe\n \n \n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n _Jane Doe\n 2017-11-09T11:21:14\n _Jane Doe\n 2017-11-09T11:21:27\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 2\n _Jane Doe\n 2017-11-09T11:21:25\n \n \n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n _Jane Doe\n 2017-05-23T13:38:58\n _Jane Doe\n 2017-05-23T13:38:58\n 2018-09-09T22:00:00\n 1\n Update bibliographic information and quotation page numbers\n cfef568ffd0507a385da818f310a68d63fb28bfa\n This is a preprint article. Update article information and add page numbers for quotations after the article has been published.\n 0\n _Jane Doe\n \n \n 4b33d12a-af3c-4821-8907-b9263bb8ee7f\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:07\n _Jane Doe\n 2017-11-09T11:19:06\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:05\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:20\n _Jane Doe\n 2017-11-09T11:19:12\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:12\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:31\n _Jane Doe\n 2017-11-09T11:19:18\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:17\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:40\n _Jane Doe\n 2017-11-09T11:19:22\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:22\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:48\n _Jane Doe\n 2017-11-09T11:19:27\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:27\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:19:00\n _Jane Doe\n 2017-11-09T11:19:32\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:32\n \n \n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n _Jane Doe\n 2017-05-24T12:03:22\n _Jane Doe\n 2017-05-24T12:03:22\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n \n \n f16b35ce-1d93-423c-909a-61d0d5f693f8\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n _Jane Doe\n 2017-05-23T11:33:09\n _Jane Doe\n 2017-05-23T11:33:09\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 3\n _Jane Doe\n \n \n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n _Jane Doe\n 2017-05-23T11:33:30\n _Jane Doe\n 2017-05-23T11:33:30\n 0\n Look up\n d526941bca24bb0b17e7ba0c8ac7460e3afd93ae\n 0\n _Jane Doe\n \n \n d0abc9c9-e230-4a30-ac87-7847e7fa0789\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 24cba909-5cee-4d53-ae8c-95938ad33f89\n _Jane Doe\n 2017-05-29T15:36:49\n _Jane Doe\n 2017-05-29T15:36:49\n 0\n Borrow\n 52ae78aa092e7f89944c10487e92e7be7324fa72\n 0\n _Jane Doe\n \n \n 92976b82-1442-47c0-a23d-dd1a0178ce0c\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 5c99255f-527b-4ab4-a482-10c4441d08f0\n _Jane Doe\n 2017-05-29T15:36:49\n _Jane Doe\n 2017-05-29T15:36:49\n 0\n Borrow\n 52ae78aa092e7f89944c10487e92e7be7324fa72\n 0\n _Jane Doe\n \n \n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n _Jane Doe\n 2017-05-29T15:39:26\n _Jane Doe\n 2017-05-29T15:39:26\n 0\n GoThroughBibliography\n 902affb333b2ae351dfab0809be6d23e94c955c9\n 0\n _Jane Doe\n \n \n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d\n _Jane Doe\n 2017-05-24T13:22:03\n _Jane Doe\n 2017-05-24T13:22:03\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n \n \n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf\n _Jane Doe\n 2017-05-29T15:39:48\n _Jane Doe\n 2017-05-29T15:39:48\n 0\n ExamineAndAssess\n 44087adc4b6dd69f117f87465921d63d99bc5812\n 0\n _Jane Doe\n \n \n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc\n _Jane Doe\n 2017-05-23T15:57:14\n _Jane Doe\n 2017-05-23T15:57:14\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n Check how legal sources should be cited.\n 0\n _Jane Doe\n \n \n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n _Jane Doe\n 2017-11-09T11:32:32\n _Jane Doe\n 2017-11-09T11:32:42\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:32:42\n \n \n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b\n _Jane Doe\n 2017-05-29T15:39:55\n _Jane Doe\n 2017-05-29T15:39:55\n 0\n ExamineAndAssess\n 44087adc4b6dd69f117f87465921d63d99bc5812\n 0\n _Jane Doe\n \n \n \n \n _Jane Doe\n 2017-05-23T09:43:34\n _Jane Doe\n 2017-05-23T09:43:34\n ReferenceLink\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n Reference\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n Reference\n \n \n _Jane Doe\n 2017-08-09T08:19:07\n _Jane Doe\n 2017-08-09T08:19:07\n ReferenceLink\n This article relies heavily on Spink and Moyer's definitions.\n 2\n 27384b10-b549-45fc-80c7-94688793e9fc\n Reference\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n Reference\n \n \n _Jane Doe\n 2017-11-09T11:04:22\n _Jane Doe\n 2017-11-09T11:04:22\n PdfKnowledgeItem\n 0\n e1773aeb-d73d-4793-957c-a0ed87c04720\n KnowledgeItem\n f12b153a-00af-4bf0-a5a6-68060114d337\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:04:34\n _Jane Doe\n 2017-11-09T11:04:34\n PdfKnowledgeItem\n 0\n ce68b450-438e-4c2c-9a21-9a1671985cb4\n KnowledgeItem\n bfe697ba-7ebc-40e1-813c-0483bc1f45be\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:04:45\n _Jane Doe\n 2017-11-09T11:04:45\n PdfKnowledgeItem\n 0\n 36ca71e4-b319-448c-83da-b6fbbc7c8e43\n KnowledgeItem\n 6943e71d-462d-4342-8486-659d62ec3d21\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:05:47\n _Jane Doe\n 2017-11-09T11:05:47\n PdfKnowledgeItem\n 0\n 293ec858-03d9-4cbe-9826-8689dcdb9d5a\n KnowledgeItem\n 07b7f62c-78c8-4473-99c9-5a5a6e689e0d\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:06:41\n _Jane Doe\n 2017-11-09T11:06:41\n PdfKnowledgeItem\n 0\n 1e7c3c78-9d0b-469d-863a-15b4b3927022\n KnowledgeItem\n be305069-1c9d-491b-b942-9bb0e2f4229e\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:07:01\n _Jane Doe\n 2017-11-09T11:07:01\n PdfKnowledgeItem\n 0\n 0c63766b-d983-4645-90fe-948b397adc9a\n KnowledgeItem\n e6df008d-4aad-4544-b5b5-7ca9f2f8293f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:07:16\n _Jane Doe\n 2017-11-09T11:07:16\n PdfKnowledgeItem\n 0\n 47d06d33-b809-4e0d-bd63-693381bcfd70\n KnowledgeItem\n 1be131b0-83b5-4955-90d2-806ee8a3724b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:07:47\n _Jane Doe\n 2017-11-09T11:07:47\n PdfKnowledgeItem\n 0\n d6aaba2e-1f43-4318-9964-b6c73e08e3a7\n KnowledgeItem\n 43b7862f-57a7-485b-8060-c49d1713ebee\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:08:04\n _Jane Doe\n 2017-11-09T11:08:04\n PdfKnowledgeItem\n 0\n 5864463d-f6e2-4c11-9afd-cc501af9cacb\n KnowledgeItem\n 3b81bde5-302a-42bc-881c-fb96526b5d20\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:08:23\n _Jane Doe\n 2017-11-09T11:08:23\n PdfKnowledgeItem\n 0\n f985362b-a982-49d4-a540-b6a9c8d7058c\n KnowledgeItem\n ee385a0d-91c5-472c-a138-46df16d4a0ae\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:12\n _Jane Doe\n 2017-11-09T11:09:12\n PdfKnowledgeItem\n 0\n 8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77\n KnowledgeItem\n 04b10222-9d97-48d6-aa2e-560f06c0578b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:24\n _Jane Doe\n 2017-11-09T11:09:24\n PdfKnowledgeItem\n 0\n 8d60267b-eb59-44e6-b59e-caadaf75e906\n KnowledgeItem\n 510bdb30-6a8f-4bbb-8e45-2ef6cc0b7b07\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:42\n _Jane Doe\n 2017-11-09T11:09:42\n PdfKnowledgeItem\n 0\n e728e158-8b56-48d0-88ab-da1926c92c69\n KnowledgeItem\n 668638be-ebd0-459f-9507-59a2a31919c5\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:59\n _Jane Doe\n 2017-11-09T11:09:59\n PdfKnowledgeItem\n 0\n aaaecd43-edc1-4db7-a49f-89e5823de7a1\n KnowledgeItem\n b22d04cd-6a5c-4c88-a3d3-95db0a5daa4e\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:10:20\n _Jane Doe\n 2017-11-09T11:10:20\n PdfKnowledgeItem\n 0\n 44c817de-9ee2-45c5-8ea3-3f776b023b48\n KnowledgeItem\n 4249f8eb-0571-4d2f-810a-49850b9133bc\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:10:42\n _Jane Doe\n 2017-11-09T11:10:42\n PdfKnowledgeItem\n 0\n a2c5b4b0-cdff-471f-b8d4-dc499012dc6a\n KnowledgeItem\n 46b61af1-9e7e-434f-995b-9d0998208b01\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:11:26\n _Jane Doe\n 2017-11-09T11:11:26\n PdfKnowledgeItem\n 0\n d1b41410-9c55-44f9-87d8-7f442a196551\n KnowledgeItem\n f14d042d-a95c-441b-912c-0f580369a1c8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:11:44\n _Jane Doe\n 2017-11-09T11:11:44\n PdfKnowledgeItem\n 0\n 8e5837b9-2958-42e5-954b-8c3bd1c08ec1\n KnowledgeItem\n 673c0faa-5a36-4645-9c8e-5d9e7906b308\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:12:23\n _Jane Doe\n 2017-11-09T11:12:23\n PdfKnowledgeItem\n 0\n e1b7152f-30d5-4886-8a4a-4a647c580fb7\n KnowledgeItem\n 93d5f85a-78ca-4a03-a893-b71c98667e9a\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:12:38\n _Jane Doe\n 2017-11-09T11:12:38\n PdfKnowledgeItem\n 0\n df067b95-5685-4a74-88ec-6aac3bf7e58f\n KnowledgeItem\n cbd0fadc-37ac-4a91-80b0-e4c426a65842\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:13:08\n _Jane Doe\n 2017-11-09T11:13:08\n PdfKnowledgeItem\n 0\n 89e1a961-14e1-43b1-baa9-84b685ad3244\n KnowledgeItem\n 351eca9c-1e63-49f1-a02f-03a78fdefab6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:13:19\n _Jane Doe\n 2017-11-09T11:13:19\n PdfKnowledgeItem\n 0\n efdf0c51-bb4f-4b99-866f-579f70f3a9b2\n KnowledgeItem\n 8fc77ac6-5d40-4c95-996f-a1fa8a435b8f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:13:34\n _Jane Doe\n 2017-11-09T11:13:34\n PdfKnowledgeItem\n 0\n 7833781a-0d1a-4ad8-869d-da7f167aaf33\n KnowledgeItem\n 9493f23c-e4eb-414d-852b-2e36ffeb11ac\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:14:05\n _Jane Doe\n 2017-11-09T11:14:05\n PdfKnowledgeItem\n 0\n 89d3ec59-4084-41b9-8f5f-bcce18958b19\n KnowledgeItem\n 609297a2-45d5-4a86-b277-38215fe981f6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:14:48\n _Jane Doe\n 2017-11-09T11:14:48\n PdfKnowledgeItem\n 0\n ed928d6e-2210-4afa-943d-64a1217c91ae\n KnowledgeItem\n 1843ef1e-38cf-4140-abfd-73a628998392\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:15:18\n _Jane Doe\n 2017-11-09T11:15:18\n PdfKnowledgeItem\n 0\n ff3ede9f-2eab-4c19-adce-86b7b7e04452\n KnowledgeItem\n 1e279651-7aeb-4270-b98f-ab0b220a57cf\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:15:36\n _Jane Doe\n 2017-11-09T11:15:36\n PdfKnowledgeItem\n 0\n 6ab5bc1c-e84d-4e4c-8054-31172f4e3201\n KnowledgeItem\n fcc32682-6e2f-445e-94ff-4965d1d25259\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:15:57\n _Jane Doe\n 2017-11-09T11:15:57\n PdfKnowledgeItem\n 0\n 98e2bac1-34f6-4d92-b074-de419ac025f5\n KnowledgeItem\n 26415c31-f996-494b-aa22-f50f147b0f42\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:16:11\n _Jane Doe\n 2017-11-09T11:16:11\n PdfKnowledgeItem\n 0\n 44e0edcc-e565-4b61-8b9d-26b3565966f1\n KnowledgeItem\n 426a04e8-9b3e-471e-afaf-c3f81fa1fe8d\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:07\n _Jane Doe\n 2017-11-09T11:18:07\n PdfTaskItem\n 0\n 77d06911-7c99-4b3b-be8c-693c8e693701\n TaskItem\n 48a44898-852f-4931-b81b-2eeedc5bb8b8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:20\n _Jane Doe\n 2017-11-09T11:18:20\n PdfTaskItem\n 0\n 948dd874-d307-4ab5-8e79-e28465542346\n TaskItem\n 7aba9d3c-c28e-4e1e-bc0e-dc66aeb9c4e6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:31\n _Jane Doe\n 2017-11-09T11:18:31\n PdfTaskItem\n 0\n b45a1d38-5f0d-4e3c-8fe7-f39effe0e182\n TaskItem\n cafed103-08c1-4b0a-b42f-82fa169291f4\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:40\n _Jane Doe\n 2017-11-09T11:18:40\n PdfTaskItem\n 0\n 5f3b1770-00c4-46c9-8cce-c26d07af22a2\n TaskItem\n e4407056-eefe-43ba-9df8-d41d702e8b12\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:48\n _Jane Doe\n 2017-11-09T11:18:48\n PdfTaskItem\n 0\n 7c3c503a-713f-4cd0-a84f-e41b016052fd\n TaskItem\n 2d8898fa-6492-4ed7-95be-8d2d875c945f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:19:00\n _Jane Doe\n 2017-11-09T11:19:00\n PdfTaskItem\n 0\n 86d85f74-37cf-4c31-a00b-75be3d300cba\n TaskItem\n 7ab8553a-1a9a-4ca8-becd-2cb051cbae27\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:21:14\n _Jane Doe\n 2017-11-09T11:21:14\n PdfTaskItem\n 0\n 475f456d-f15a-45dd-8d91-8e1f911c6ad8\n TaskItem\n 02d505ca-7546-4ea9-9de8-53c027c13f74\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:22:22\n _Jane Doe\n 2017-11-09T11:22:22\n PdfKnowledgeItem\n 0\n 8707e530-90fe-49ba-b221-7924b890c876\n KnowledgeItem\n a76ba532-af51-424f-b092-7370941bc33a\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:23:05\n _Jane Doe\n 2017-11-09T11:23:05\n PdfKnowledgeItem\n 0\n 5683b7c1-2eac-4d95-b72b-65f003284ec8\n KnowledgeItem\n 0a853a99-c7d1-4440-9aa0-bb0ad318aca3\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:23:12\n _Jane Doe\n 2017-11-09T11:23:12\n PdfKnowledgeItem\n 0\n 8d8a6e93-c9ea-42f5-99a4-825e08d7ddb1\n KnowledgeItem\n 8ecd8f36-d1ba-4096-b594-06ce75fbddc4\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:06\n _Jane Doe\n 2017-11-09T11:24:06\n PdfKnowledgeItem\n 0\n c2f0f063-35b2-42e6-9b8d-157e2cbc72fc\n KnowledgeItem\n 3c560280-bb82-4db2-8eeb-029ff7100cb6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:19\n _Jane Doe\n 2017-11-09T11:24:19\n PdfKnowledgeItem\n 0\n 5eaf69d3-26a6-4119-89e8-a05fe79a2e1f\n KnowledgeItem\n 5b4063c2-8c3a-4e00-af52-a66312b3c9f7\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:36\n _Jane Doe\n 2017-11-09T11:24:36\n PdfKnowledgeItem\n 0\n 6054a098-5dd3-42e1-8b84-a0b8972532be\n KnowledgeItem\n 1bdfbf3b-7804-4566-a325-4b288b5d5f52\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:44\n _Jane Doe\n 2017-11-09T11:24:44\n PdfKnowledgeItem\n 0\n ebbfda47-b33a-4c90-b40f-2920fa7add4d\n KnowledgeItem\n e37bf370-cea2-423f-b82d-555d2cf9cfc4\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:00\n _Jane Doe\n 2017-11-09T11:25:00\n PdfKnowledgeItem\n 0\n 1d3d8033-4336-4188-bd49-15f6d6100e2d\n KnowledgeItem\n f3835772-312b-44f9-9f69-ce0684784f38\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:19\n _Jane Doe\n 2017-11-09T11:25:19\n PdfKnowledgeItem\n 0\n 16b0043e-06e3-4a0d-8d60-5d6fbd85499c\n KnowledgeItem\n 999294a8-db4a-40eb-bf6b-1fdb0eb76f25\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:34\n _Jane Doe\n 2017-11-09T11:25:34\n PdfKnowledgeItem\n 0\n 328aeaa3-7fde-456e-b3a9-1b71975366f8\n KnowledgeItem\n 22e5c9a6-dc6f-4df1-8f7d-504d52bc7d93\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:42\n _Jane Doe\n 2017-11-09T11:25:42\n PdfKnowledgeItem\n 0\n e729b06b-fa53-4b86-a40d-61b5b179d919\n KnowledgeItem\n ecda8516-01dc-40e5-b10f-305d7929a6e5\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:00\n _Jane Doe\n 2017-11-09T11:26:00\n PdfKnowledgeItem\n 0\n dc437c4e-207b-4c9a-81c7-586937a3e20b\n KnowledgeItem\n 22322086-34cc-4311-890c-566ef8b53b4f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:18\n _Jane Doe\n 2017-11-09T11:26:18\n PdfKnowledgeItem\n 0\n 8f16ea76-0030-4a99-a4c8-a4192eb82a37\n KnowledgeItem\n 96291334-163e-4c91-9b47-28afe8020b95\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:37\n _Jane Doe\n 2017-11-09T11:26:37\n PdfKnowledgeItem\n 0\n 197c843d-c957-4a8c-801f-19166eaba940\n KnowledgeItem\n 58590f36-8d2c-4575-9433-bb7bde3daf81\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:59\n _Jane Doe\n 2017-11-09T11:26:59\n PdfKnowledgeItem\n 0\n 6b52254c-6e19-420d-a33f-51720c19fb65\n KnowledgeItem\n c43c0a88-1de4-48da-93ce-9ec1cbc9d56b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:27:13\n _Jane Doe\n 2017-11-09T11:27:13\n PdfKnowledgeItem\n 0\n 1e9280df-aec2-421e-9f7a-92e6f9da339e\n KnowledgeItem\n e82505d8-56de-4267-9352-4974ee7298df\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:27:23\n _Jane Doe\n 2017-11-09T11:27:23\n PdfKnowledgeItem\n 0\n 29bac51b-0f3a-4ca0-8c95-670565fa36f7\n KnowledgeItem\n 547f2b44-f2aa-46c9-ad4f-d2e295f45c45\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:10\n _Jane Doe\n 2017-11-09T11:28:10\n PdfKnowledgeItem\n 0\n 96c2a2d1-f503-4c1b-b971-dbe5100fb40a\n KnowledgeItem\n 0b227831-e94a-4e87-8811-02388608498b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:18\n _Jane Doe\n 2017-11-09T11:28:18\n PdfKnowledgeItem\n 0\n 1de6ee97-7578-4ea7-9ce5-5bfed9d25e67\n KnowledgeItem\n 237297f6-2e0a-404c-b9fc-5dc8e12085d1\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:39\n _Jane Doe\n 2017-11-09T11:28:39\n PdfKnowledgeItem\n 0\n d8280b44-ad37-4d7d-9e34-27602a8eae15\n KnowledgeItem\n 9b6591cb-42a5-4d66-9e4d-2dc9accff555\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:48\n _Jane Doe\n 2017-11-09T11:28:48\n PdfKnowledgeItem\n 0\n 9270be6d-8ff8-4d73-9c00-8d1d5689777e\n KnowledgeItem\n 4a94c085-e4ca-409f-b911-a11fe75fa89c\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:29:14\n _Jane Doe\n 2017-11-09T11:29:14\n PdfKnowledgeItem\n 0\n 8cd93dd1-0d00-4054-9a90-51501596ab63\n KnowledgeItem\n e5dd8427-ec4d-457f-b3bd-1355a0aefbf8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:30:15\n _Jane Doe\n 2017-11-09T11:30:15\n PdfAbstract\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n Reference\n 86e472d5-6ba1-4860-82a8-9de86d8eb1e9\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:31:03\n _Jane Doe\n 2017-11-09T11:31:03\n PdfKnowledgeItem\n 0\n 68247aee-2053-41d8-8781-e144fdd126cf\n KnowledgeItem\n 4fd4b119-3c6f-4b22-b9df-ce181cdc8651\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:31:31\n _Jane Doe\n 2017-11-09T11:31:31\n PdfKnowledgeItem\n 0\n b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1\n KnowledgeItem\n 42dfe8d4-b3c2-430b-9914-2ce3c1182716\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:32:05\n _Jane Doe\n 2017-11-09T11:32:05\n PdfKnowledgeItem\n 0\n e1b89b1f-5704-41c8-a4f7-095a6d896830\n KnowledgeItem\n 58708f29-6a2b-461a-b1df-e57bdb27c612\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:32:12\n _Jane Doe\n 2017-11-09T11:32:12\n PdfKnowledgeItem\n 0\n 8203b7c9-1cee-48ff-bd7c-c357c8ca4002\n KnowledgeItem\n f35e4e21-cb99-4bc2-989a-c35054359de8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:32:32\n _Jane Doe\n 2017-11-09T11:32:32\n PdfTaskItem\n 0\n 6bd21402-65b9-4362-9d88-8b23633385c3\n TaskItem\n c7b34c7e-09fb-4989-8a00-d90694dacca9\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:33:02\n _Jane Doe\n 2017-11-09T11:33:02\n PdfKnowledgeItem\n 0\n 2962251b-22f8-405e-8e1f-f29bbf92dd00\n KnowledgeItem\n b2aa66f4-fd01-488d-8cb0-6955b7965e4c\n Annotation\n \n \n _Jane Doe\n 2018-07-12T11:34:55\n _Jane Doe\n 2018-07-12T11:35:01\n ReferenceLink\n 0\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n Reference\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n Reference\n \n \n _Jane Doe\n 2019-04-25T11:17:04\n _Jane Doe\n 2019-04-25T11:17:07\n PdfKnowledgeItem\n 0\n 6fb75b29-ae6b-4e6f-ba73-37a077fc397c\n KnowledgeItem\n 5070d05e-28a9-408f-99d3-fb565fbd02e8\n Annotation\n \n \n _Jane Doe\n 2019-04-25T11:17:26\n _Jane Doe\n 2019-04-25T11:17:27\n PdfKnowledgeItem\n 0\n 749aae33-cbb7-4aac-9092-7b33e9736eec\n KnowledgeItem\n 64db2632-f382-49eb-933c-60545b61e4d2\n Annotation\n \n \n _Jane Doe\n 2019-04-25T11:23:56\n _Jane Doe\n 2019-04-25T11:24:10\n PdfKnowledgeItem\n 0\n f1774289-5526-4343-9b1b-1157c6654acb\n KnowledgeItem\n be025e69-9bd2-4e5d-a243-d33451e77e09\n Annotation\n \n \n
", + "items": [ + { + "itemType": "journalArticle", + "title": "Food and drug counterfeiting in the developing nations: The implications and way-out", + "creators": [ + { + "lastName": "Agbaraji", + "firstName": "Emmanuel Chuks", + "creatorType": "author" + }, + { + "lastName": "Ochulor", + "firstName": "Deborah O.", + "creatorType": "author" + }, + { + "lastName": "Ezeh", + "firstName": "Gloria N.", + "creatorType": "author" + } + ], + "date": "2012-01-01T00:00:00", + "ISSN": "2223-9944", + "extra": "Citation Key: Agbaraji.2012", + "issue": "2", + "itemID": "351d2c56-4a9b-4998-af82-82a1baba0c33", + "journalAbbreviation": "ARInt.", + "pages": "24-31", + "publicationTitle": "Academic Research International", + "volume": "3", + "attachments": [ + { + "path": "Agbaraji, Ochulor et al.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "id": "6fb75b29-ae6b-4e6f-ba73-37a077fc397c", + "note": "

Food counterfeiting similar to drug counterfeiting

\n

\"Counterfeited drugs are drugs that are not authentic and have been manufactured using incorrect quantities, or incorrect ingredients, to either reduce the potency, or nullify the potency of drugs altogether, and the same is applicable to food counterfeit.\"

\n24" + }, + { + "id": "749aae33-cbb7-4aac-9092-7b33e9736eec", + "note": "

Advantages of RFID

\n

\"With RFID, drugs can be tracked at the item level throughout the supply chain. Individual packages are tagged at manufacturing and then read serially, in-bulk throughout the distribution chain. The read points include tag application, case packaging, total tracking throughout distribution and item level tracking and authentication at the pharmacy. With RFID, the entire drug supply chain becomes more efficient and secure.\"

\n27" + }, + { + "id": "f1774289-5526-4343-9b1b-1157c6654acb", + "note": "

Digital mass serialization in the supply chain

\n28" + } + ], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "The SAGE encyclopedia of food issues", + "creators": [ + { + "lastName": "Albala", + "firstName": "Ken", + "creatorType": "editor" + } + ], + "date": "2015-01-01T00:00:00", + "ISBN": "9781452243016", + "extra": "Citation Key: Albala.2015", + "itemID": "515c0c9b-1bbe-4706-aa5e-f62aeaf73271", + "place": "Los Angeles", + "publisher": "SAGE Reference", + "attachments": [], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "The role of hazard- and risk-based approaches in ensuring food safety", + "creators": [ + { + "lastName": "Barlow", + "firstName": "Susan M.", + "creatorType": "author" + }, + { + "lastName": "Boobis", + "firstName": "Alan R.", + "creatorType": "author" + }, + { + "lastName": "Bridges", + "firstName": "Jim", + "creatorType": "author" + }, + { + "lastName": "Cockburn", + "firstName": "Andrew", + "creatorType": "author" + }, + { + "lastName": "Dekant", + "firstName": "Wolfgang", + "creatorType": "author" + }, + { + "lastName": "Hepburn", + "firstName": "Paul", + "creatorType": "author" + }, + { + "lastName": "Houben", + "firstName": "Geert F.", + "creatorType": "author" + }, + { + "lastName": "König", + "firstName": "Jürgen", + "creatorType": "author" + }, + { + "lastName": "Nauta", + "firstName": "Maarten J.", + "creatorType": "author" + }, + { + "lastName": "Schuermans", + "firstName": "Jeroen", + "creatorType": "author" + }, + { + "lastName": "Bánáti", + "firstName": "Diána", + "creatorType": "author" + } + ], + "date": "2015-01-01T00:00:00", + "DOI": "10.1016/j.tifs.2015.10.007", + "ISSN": "09242244", + "abstractNote": "Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised.", + "extra": "Citation Key: Barlow.2015", + "issue": "2", + "itemID": "d0a6dd17-9c45-4865-a6e7-8fe225ff3b32", + "journalAbbreviation": "Trends Food Sci. Tech.", + "pages": "176-188", + "publicationTitle": "Trends in Food Science & Technology", + "volume": "46", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "id": "3579306e-3aa8-442f-ae86-5692bacb6116", + "note": "

It's unrealistic to aim for completely risk-free food

\n

\"…zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.\"

\n176" + } + ], + "seeAlso": [] + }, + { + "itemType": "document", + "title": "Truth in seafood labeling", + "creators": [ + { + "lastName": "Bishop", + "firstName": "Mac William", + "creatorType": "author" + }, + { + "lastName": "Werschkul", + "firstName": "Ben", + "creatorType": "author" + }, + { + "lastName": "Hodge", + "firstName": "Channon", + "creatorType": "author" + }, + { + "lastName": "Rosado", + "firstName": "Pedro Rafael", + "creatorType": "author" + }, + { + "lastName": "Stokes", + "firstName": "Elaisha", + "creatorType": "author" + }, + { + "lastName": "Desai", + "firstName": "Lisa", + "creatorType": "author" + } + ], + "date": "2013-02-21T00:00:00", + "abstractNote": "A senior scientist at Oceana discusses the group’s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.", + "extra": "Citation Key: Bishop.20130221", + "itemID": "09bd55a6-be76-417d-9682-f1a5a07d28d7", + "publisher": "The New York Times", + "url": "https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede®ion=caption&pgtype=article", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food fraud and adulterated ingredients: Background, issues, and federal action", + "creators": [ + { + "lastName": "Braden", + "firstName": "Darrell T.", + "creatorType": "author" + } + ], + "date": "2014-01-01T00:00:00", + "ISBN": "9781631177309", + "extra": "Citation Key: Braden.2014", + "itemID": "08c4afc4-6416-4b23-8046-dd47c21ccaec", + "numPages": "113", + "place": "New York", + "publisher": "Nova Science Publishers", + "series": "Food Science and Technology", + "attachments": [], + "tags": [ + { + "tag": "Fishery products" + }, + { + "tag": "Food adulteration and inspection" + }, + { + "tag": "Food contamination" + }, + { + "tag": "Government policy" + }, + { + "tag": "Law and legislation" + }, + { + "tag": "Marketing" + }, + { + "tag": "Prevention" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "videoRecording", + "title": "Sweeney Todd: The demon barber of Fleet Street", + "creators": [ + { + "lastName": "Burton", + "firstName": "Tim", + "creatorType": "author" + }, + { + "lastName": "Depp", + "firstName": "Johnny", + "creatorType": "contributor" + }, + { + "lastName": "Carter", + "firstName": "Helena Bonham", + "creatorType": "contributor" + }, + { + "lastName": "Rickman", + "firstName": "Alan", + "creatorType": "contributor" + }, + { + "lastName": "Spall", + "firstName": "Timothy", + "creatorType": "contributor" + }, + { + "lastName": "Cohen", + "firstName": "Sacha Baron", + "creatorType": "contributor" + }, + { + "lastName": "Bower", + "firstName": "Jamie Campbell", + "creatorType": "contributor" + }, + { + "lastName": "Kelly", + "firstName": "Laura Michelle", + "creatorType": "contributor" + }, + { + "lastName": "Wisener", + "firstName": "Jayne", + "creatorType": "contributor" + } + ], + "date": "2013-01-01T00:00:00", + "ISBN": "9786314961534", + "abstractNote": "Reinventing himself as Sweeney Todd, a man unjustly sent to prison returns to exact revenge on those who ruined his life, especially the evil Judge Turpin who sent the man to prison. Not only does he seek revenge for the cruel punishment he suffered in prison, but also for what happened to his wife and daughter. When he returns to his home town, he reopens his barber shop, where Mr. Todd becomes the Demon of Fleet Street. Mrs. Lovett is Sweeney's amorous accomplice who creates diabolical meat pies out of the remains of Mr. Todd's victims.", + "extra": "Citation Key: Burton.2013", + "itemID": "60accf57-c086-423f-9068-7c1afdc2de1d", + "place": "Burbank, CA", + "studio": "Warner Home Video", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Todd, Sweeney (legendary character)" + } + ], + "notes": [ + { + "note": "Logan, John, (screenwriter.)\nMacDonald, Laurie, (producer.)\nParkes, Walter F., (producer.)\nZanuck, Richard D., (producer.)\nBurton, Tim, (director.)\nDepp, Johnny, (actor.)\nBonham Carter, Helena, (actor.)\nRickman, Alan, (actor.)\nSpall, Timothy, (actor.)\nBaron Cohen, Sacha, (actor.)\nWisener, Jayne, (actor.)\nBower, Jamie Campbell, (actor.)\nKelly, Laura Michelle, (actor.)\nSanders, Ed, (actor.)\nHead, Anthony Stewart, (actor.)\nBowles, Peter, (actor.)\nSondheim, Stephen, (composer.)\nWheeler, Hugh, (composer.)\nBond, C. G (adapter.)", + "tags": [ + "#Notes" + ] + }, + { + "id": "3e94bc22-d904-4d6f-8825-ad87fc1f980f", + "note": "

Sweeney Todd = fictional work with food fraud in the plot

\n

I wonder if there's any way to work this into the paper? Perhaps in the introduction?

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "patent", + "title": "Method for identifying a pork content in a food", + "creators": [ + { + "lastName": "Che Man", + "firstName": "Yaakob Bin", + "creatorType": "author" + }, + { + "lastName": "Mustafa", + "firstName": "Shuhaimi", + "creatorType": "author" + }, + { + "lastName": "Khalid", + "firstName": "Farihah Liyana", + "creatorType": "author" + }, + { + "lastName": "Azmi", + "firstName": "Aida Azrina", + "creatorType": "author" + }, + { + "lastName": "Sazili", + "firstName": "Awis Qurni", + "creatorType": "author" + }, + { + "lastName": "Rahim", + "firstName": "Raha Abdul", + "creatorType": "author" + } + ], + "issueDate": "2010-01-01T00:00:00", + "extra": "Citation Key: CheMan.2010", + "itemID": "2485a5d8-95f5-437f-8911-05111eb7e25e", + "url": "https://www.google.com/patents/US20100216136", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Fake meat scandals add to Chinese food fears", + "creators": [ + { + "lastName": "Dai", + "firstName": "Cong", + "creatorType": "author" + }, + { + "lastName": "Jiang", + "firstName": "Min", + "creatorType": "author" + } + ], + "date": "2013-01-01T00:00:00", + "DOI": "10.1136/bmj.f3385", + "ISSN": "0959-535X", + "extra": "PMID: 23716434\nCitation Key: Dai.2013", + "itemID": "490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38", + "journalAbbreviation": "BMJ", + "pages": "3385", + "publicationTitle": "British Medical Journal", + "volume": "346", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "China" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + }, + { + "tag": "Humans" + }, + { + "tag": "Meat" + } + ], + "notes": [ + { + "id": "f5429955-7a99-4225-ba19-0344b7e896b7", + "note": "

Situation in China

\n

“Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.”

\n3385" + } + ], + "seeAlso": [] + }, + { + "itemType": "interview", + "title": "Fighting food fraud in 2017", + "creators": [ + { + "lastName": "Manuell", + "firstName": "Roy", + "creatorType": "author" + }, + { + "lastName": "Daly", + "firstName": "Eoghan", + "creatorType": "contributor" + } + ], + "date": "2017-04-11T00:00:00", + "abstractNote": "In anticipation of Food Fraud 2017, New Food speaks exclusively to Eoghan Daly of Crowe Clark Whitehill about tackling food fraud in the 21st Century.", + "extra": "Citation Key: Daly.20170411", + "itemID": "27dd2250-00b8-4587-8456-c68d0ca5af8a", + "url": "https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "It’s a jungle out there - the strange animals of economic organization in agri-food value chains", + "creators": [ + { + "lastName": "Dries", + "firstName": "Liesbeth K. E.", + "creatorType": "editor" + }, + { + "lastName": "Karantininis", + "firstName": "Konstantinos", + "creatorType": "editor" + }, + { + "lastName": "Martino", + "firstName": "Gaetano", + "creatorType": "editor" + }, + { + "lastName": "Codron", + "firstName": "Jean Marie", + "creatorType": "editor" + }, + { + "lastName": "Pascucci", + "firstName": "Stefano", + "creatorType": "editor" + } + ], + "date": "[In press]", + "ISBN": "9789086863013", + "extra": "Citation Key: Dries.Inpress", + "itemID": "e245ae31-ac6d-42fa-aca4-3435cb4bf378", + "place": "Wageningen", + "publisher": "Wageningen Academic Publishers", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Food Fraud Network activity report 2015", + "creators": [ + { + "lastName": "European Commission Food Fraud Network", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2013-05-26T00:00:00", + "extra": "Citation Key: EuropeanCommissionFoodFraudNetwork.20130526", + "itemID": "f8870bd1-4f3f-4b48-b29b-a7cf3d461475", + "url": "https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "note": "Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "55cd0676-3d1d-4f38-b63f-6cbc66e768a1", + "note": "

The 2013 horsemeat scandal --> Europe-wide process for information exchange related to food fraud.

\n

“In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.”

\n1" + }, + { + "id": "de69f6c2-af03-47f9-aab9-713e08fc183b", + "note": "

2015 statistics - European Food Fraud Network

\n

“In 2015, 108 cases were exchanged by the Food Fraud Network.”

\n2" + }, + { + "id": "1fc2daa1-fc4f-4de9-847d-dea10a10a79e", + "note": "

Types of violations

\n

“...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).”

\n2" + }, + { + "id": "593ac1d4-baaa-4a4b-a951-635c2cda0f17", + "note": "

Illegal exports and exchanges on fish products most common incidents (2015 Food Fraud Network)

\n

“The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential \"food fraud\" cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.”

\n2" + } + ], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "EUR 230 million worth of fake food and beverages seized in global OPSON operation targeting food fraud", + "creators": [ + { + "lastName": "Europol", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2017-04-25T00:00:00", + "abstractNote": "Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.", + "extra": "Citation Key: Europol.20170425", + "itemID": "6d2b6a75-5e45-4e60-bf35-b700d3de8b3d", + "place": "The Hague", + "url": "https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud", + "attachments": [ + { + "path": "Europol 4 25 2017 - EUR 230 million worth.pdf", + "title": "Full Text" + }, + { + "title": "Online" + } + ], + "tags": [], + "notes": [ + { + "id": "e1773aeb-d73d-4793-957c-a0ed87c04720", + "note": "

Results of recent 61-country operation to check for food fraud (12/1/2016 - 03/31/2017)

\n

“Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.”

\n" + }, + { + "id": "ce68b450-438e-4c2c-9a21-9a1671985cb4", + "note": "

Summary of number and location of checks

\n

“More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.”

\n" + }, + { + "id": "36ca71e4-b319-448c-83da-b6fbbc7c8e43", + "note": "

Quote from Françoise Dorcier, Coordinator of INTERPOL’s Illicit Goods and Global Health Programme

\n

“This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.”

\n" + }, + { + "id": "293ec858-03d9-4cbe-9826-8689dcdb9d5a", + "note": "

Findings in Europe

\n

Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent.

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Sorting the beef from the bull: The science of food fraud forensics", + "creators": [ + { + "lastName": "Evershed", + "firstName": "Richard", + "creatorType": "author" + }, + { + "lastName": "Temple", + "firstName": "Nicola", + "creatorType": "author" + }, + { + "lastName": "Judd", + "firstName": "Thomas", + "creatorType": "contributor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "1522614370", + "extra": "Citation Key: Evershed.2016", + "itemID": "de7347ad-5e9f-45cd-9b8e-5e91b02465b4", + "publisher": "Audible Studios for Bloomsbury", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + }, + { + "tag": "Screening" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "thesis", + "title": "Economically motivated adulteration: Implications for food protection and alternate approaches to detection", + "creators": [ + { + "lastName": "Everstine", + "firstName": "Karen", + "creatorType": "author" + }, + { + "lastName": "Hedberg", + "firstName": "Craig", + "creatorType": "contributor" + }, + { + "lastName": "University of Minnesota", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2013-05-01T00:00:00", + "abstractNote": "The food supply system is vulnerable to various types of contamination and adulteration. This research focuses on economically motivated adulteration (often called \"food fraud\"). Economically motivated adulteration (EMA) refers to the knowingly selling a food product that is not up to standards in order to gain economic advantage. There is a long history of EMA in a wide variety of food products. The food safety paradigm is not sufficient for food defense, or for prevention and deterrence of EMA. The goal of this research was to develop methods to improve capabilities for preventing and detecting EMA incidents. First, the food ingredient monographs in the United States Pharmacopeial (USP) Convention Food Chemicals Codex (FCC) were evaluated for susceptibility to EMA. These evaluations can be used to help target the most susceptible ingredients for monograph modernization within USP, and for inspection and laboratory testing resources by regulatory agencies. Second, economic and production data for dairy products in China leading up to the melamine adulteration event was analyzed to evaluate the utility of this data for alerting to the potential for EMA in a food commodity. This analysis shed insight on variables that may be useful for tracking the production of global commodities for early indications of EMA. Finally, a surveillance technique for trade data was evaluated using melamine adulteration of wheat gluten as a case study. This biosurveillance-like methodology can be applied to food import data to identify supply chain shifts that could indicate changes in the market for food products and a heightened risk of EMA. Regulatory agencies have an enormous burden of responsibility for regulating the food supply for both domestically-produced and imported food products. Given the constrained resources of these agencies, they need improved methods for targeting those resources towards the riskiest food products. These preliminary efforts to shed light on EMA vulnerabilities and potential mitigation efforts can contribute to efforts in that area. An integrated, systems-based approach to food protection that encompasses both food safety and food defense is imperative for ensuring the integrity of our food supply.", + "extra": "Citation Key: Everstine.May2013", + "itemID": "43ecc385-004b-4af0-b1cb-2d14c240e032", + "place": "Minneapolis, Minnesota", + "url": "http://hdl.handle.net/11299/153189", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Adulteration" + }, + { + "tag": "Food defense" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "International trade and food security: Exploring collective food security in Asia", + "creators": [ + { + "lastName": "Ewing-Chow", + "firstName": "Michael", + "creatorType": "editor" + }, + { + "lastName": "Slade", + "firstName": "Melanie Vilarasau", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "9781785361890", + "callNumber": "HMNTS YK.2017.a.1845", + "extra": "Citation Key: EwingChow.2016", + "itemID": "7d6705ad-48de-4613-b9f9-94a06f701cb4", + "libraryCatalog": "British Library", + "place": "Cheltenham", + "publisher": "Edward Elgar Publishing", + "series": "NUS Centre for International Law series", + "attachments": [], + "tags": [ + { + "tag": "Food security" + }, + { + "tag": "International trade" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Vulnerability assessments of food systems: Final summary report, June 2009 – February 2012", + "creators": [ + { + "lastName": "Food and Drug Administration", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2012-08-27T00:00:00", + "extra": "Citation Key: FoodandDrugAdministration.20120827", + "itemID": "3ab6253b-74b7-4701-9431-acfe6df2d2be", + "place": "Silver Spring, Maryland", + "url": "https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "note": "Vulnerability Assessments of Food Systems\r\n Table of Contents \r\n I. Executive Summary \r\n II. Background \r\n III. Method Overview \r\n IV. Assessment Results \r\n Commonalities of Critical Process Nodes \r\n Commonalities of Mitigation Strategies a\r\n Commonalities of Identified Research Gap\r\n Commonalities of Identified Threat Indic\r\n V. CARVER + Shock Vulnerability Assessm\r\n VI. Overall Assessment Observations \r\n Assessment Preparation and Conduct \r\n Selection of Threat Agent for CARVER + S\r\n Participant Perspective \r\n International Assessments and Food Defen\r\n Other Observations \r\n VII. Conclusion", + "tags": [ + "#TableOfContents" + ] + }, + { + "note": "Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.", + "tags": [ + "#Evaluation" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "statute", + "nameOfAct": "Mitigation strategies to protect food against intentional adulteration. Final rule", + "creators": [ + { + "lastName": "Food and Drug Administration", + "creatorType": "contributor", + "fieldMode": true + } + ], + "dateEnacted": "2016-05-27T00:00:00", + "abstractNote": "The Food and Drug Administration (FDA or we) is issuing this final rule to require domestic and foreign food facilities that are required to register under the Federal Food, Drug, and Cosmetic Act (the FD&C Act) to address hazards that may be introduced with the intention to cause wide scale public health harm. These food facilities are required to conduct a vulnerability assessment to identify significant vulnerabilities and actionable process steps and implement mitigation strategies to significantly minimize or prevent significant vulnerabilities identified at actionable process steps in a food operation. FDA is issuing these requirements as part of our implementation of the FDA Food Safety Modernization Act (FSMA).", + "extra": "PMID: 27236872\nCitation Key: FoodandDrugAdministration.20160527", + "itemID": "436a30e7-3930-4333-8204-e1bae37af76e", + "pages": "34165-223", + "url": "https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Food industry legislation and jurisprudence" + }, + { + "tag": "Food safety" + }, + { + "tag": "Gray literature" + }, + { + "tag": "Humans" + }, + { + "tag": "Law and legislation" + }, + { + "tag": "Legislation" + }, + { + "tag": "Terrorism prevention and control" + }, + { + "tag": "United States" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "newspaperArticle", + "title": "What is blockchain and how will it impact the food industry?", + "creators": [ + { + "lastName": "Garver", + "firstName": "Krista", + "creatorType": "author" + } + ], + "date": "2017-03-07T00:00:00", + "abstractNote": "The food industry has been abuzz lately about the potential of blockchain to solve the problem of end-to-end traceability in the supply chain.", + "extra": "Citation Key: Garver.20170307", + "itemID": "1810f594-4e9e-47b4-905f-445171ad46c6", + "publicationTitle": "Food Industry Executive", + "url": "http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "GFSI position on mitigating the public health risk of food fraud", + "creators": [ + { + "lastName": "Global Food Safety Initiative", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2014-07-01T00:00:00", + "extra": "Citation Key: GlobalFoodSafetyInitiative.July2014", + "itemID": "6c15fcbf-0980-4849-97de-442e6bfbcdc8", + "url": "http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf", + "attachments": [ + { + "title": "Online" + }, + { + "path": "Némorin 07 2014 - GFSI Position on Mitigating the Public.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "id": "0c63766b-d983-4645-90fe-948b397adc9a", + "note": "

Food fraud definition (GFSI)

\n

“It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers’ health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters’ part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.”

\n2" + }, + { + "id": "1e7c3c78-9d0b-469d-863a-15b4b3927022", + "note": "

Different topic areas and how they relate intentional and unintentional food fraud

\n2" + }, + { + "id": "47d06d33-b809-4e0d-bd63-693381bcfd70", + "note": "

GFSI's recommendations to food industry to mitigate risk of food fraud

\n

“Secondly, appropriate control measures shall be put in place to reduce the risks from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.”

\n3" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Modern analytical methods for the detection of food fraud and adulteration by food category", + "creators": [ + { + "lastName": "Hong", + "firstName": "Eunyoung", + "creatorType": "author" + }, + { + "lastName": "Lee", + "firstName": "Sang Yoo", + "creatorType": "author" + }, + { + "lastName": "Jeong", + "firstName": "Jae Yun", + "creatorType": "author" + }, + { + "lastName": "Park", + "firstName": "Jung Min", + "creatorType": "author" + }, + { + "lastName": "Kim", + "firstName": "Byung Hee", + "creatorType": "author" + }, + { + "lastName": "Kwon", + "firstName": "Kisung", + "creatorType": "author" + }, + { + "lastName": "Chun", + "firstName": "Hyang Sook", + "creatorType": "author" + } + ], + "date": "[In press]", + "DOI": "10.1002/jsfa.8364", + "ISSN": "0022-5142", + "abstractNote": "This review provides current information on the analytical methods used to identify food adulteration in the six most adulterated food categories: animal origin and seafood, oils and fats, beverages, spices and sweet foods (e.g. honey), grain-based food, and others (organic food and dietary supplements). The analytical techniques, both conventional and emerging, used to identify adulteration in these six food categories involve sensory, physicochemical, DNA-based, chromatographic, and spectroscopic methods, and have been combined with chemometrics, making these techniques more convenient and effective for the analysis of a broad variety of food products. Despite recent advances, a need remains for suitably sensitive and widely applicable methodologies that will encompass all the various aspects of food adulteration.", + "extra": "Citation Key: Hong.Inpress", + "itemID": "5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9", + "journalAbbreviation": "J. Sci. Food Agric.", + "publicationTitle": "Journal of the Science of Food and Agriculture", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "99c418c4-6caf-420c-95a1-bacd2272b3f9", + "note": "

Definition of food fraud (Hong et al)

\n

“The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.”

\n" + }, + { + "id": "e5b8a39a-7be3-4000-b3e6-523ffde0625a", + "note": "

Typical kinds of adulterated foods

\n

“In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.”

\n" + }, + { + "id": "c127a352-34d7-4706-b563-ef8542f62f38", + "note": "

Mass spectrometry is the type of testing used for most types of food

\n

“A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.”

\n" + }, + { + "id": "260fee07-d706-4715-8972-16e260e38b6a", + "note": "

Most common detection method by food category

\n

“Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.”

\n" + }, + { + "id": "1ba1b273-f3e7-49fc-bbc3-0b016f298e49", + "note": "

Four categories used when authenticating meat

\n

“Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).”

\n" + }, + { + "id": "e17842b4-ccdb-42f8-8da3-ece6d3b5a337", + "note": "

DNA-based techniques most popular for meat authentication testing

\n

“The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.”

\n" + }, + { + "id": "c0d8e13e-ca6c-4a82-af14-372cb8929c81", + "note": "

Meat usually adulterated with pork and testing can be an issue to detect if the meat is minced or processed

\n

“A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.”

\n" + }, + { + "id": "a3f90c51-7ce7-4b6e-a434-a804f3c014e9", + "note": "

How fish and seafood are typically adulterated

\n

“Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.”

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Walmart, IBM and Tsinghua University explore the use of blockchain to help bring safer food to dinner tables across China", + "creators": [ + { + "lastName": "Slocum", + "firstName": "Hannah", + "creatorType": "contributor" + }, + { + "lastName": "International Business Machines Corporation", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2016-10-19T00:00:00", + "abstractNote": "As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.", + "extra": "Citation Key: InternationalBusinessMachinesCorporation.20161019", + "itemID": "ddf7203d-0229-46d5-badc-e6c35789df3f", + "url": "https://www-03.ibm.com/press/us/en/pressrelease/50816.wss", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Asia" + }, + { + "tag": "Blockchain" + }, + { + "tag": "China" + }, + { + "tag": "Linux Foundation Hyperledger Project" + }, + { + "tag": "Safer food" + }, + { + "tag": "Tsinghua University" + }, + { + "tag": "Walmart Food Safety Collaboration Center" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Food safety management systems – Requirements for any organization in the food chain", + "creators": [ + { + "lastName": "International Organization for Standardization", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2005-09-01T00:00:00", + "extra": "Citation Key: InternationalOrganizationforStandardization.200509", + "institution": "International Organization for Standardization", + "itemID": "14bf1930-bb04-4aaa-90b2-494f7548d8a8", + "place": "Geneva, Switzerland", + "url": "https://www.iso.org/standard/35466.html", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food safety in China: Science, technology, management and regulation", + "creators": [ + { + "lastName": "Jen", + "firstName": "Joseph J.", + "creatorType": "editor" + }, + { + "lastName": "Chen", + "firstName": "Junshi", + "creatorType": "editor" + } + ], + "date": "2017-01-01T00:00:00", + "ISBN": "1119237963", + "extra": "Citation Key: Jen.2017", + "itemID": "2f99e8ce-0e1f-4571-9e89-94bfebc477d3", + "numPages": "696", + "place": "Chichester, West Sussex; Hoboken, New Jersey", + "publisher": "John Wiley & Sons, Inc", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Food adulteration and inspection" + }, + { + "tag": "Food contamination" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "RFID-enabled traceability in the food supply chain", + "creators": [ + { + "lastName": "Kelepouris", + "firstName": "Thomas", + "creatorType": "author" + }, + { + "lastName": "Pramatari", + "firstName": "Katerina", + "creatorType": "author" + }, + { + "lastName": "Doukidis", + "firstName": "Georgios", + "creatorType": "author" + } + ], + "date": "2007-01-01T00:00:00", + "DOI": "10.1108/02635570710723804", + "ISSN": "0263-5577", + "extra": "Citation Key: Kelepouris.2007", + "issue": "2", + "itemID": "4b33d12a-af3c-4821-8907-b9263bb8ee7f", + "journalAbbreviation": "Ind. Manage. Data Syst.", + "pages": "183-200", + "publicationTitle": "Industrial Management & Data Systems", + "volume": "107", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "newspaperArticle", + "title": "Horsemeat scandal: The essential guide", + "creators": [ + { + "lastName": "Lawrence", + "firstName": "Felicity", + "creatorType": "author" + } + ], + "date": "2013-02-15T00:00:00", + "abstractNote": "With the Europewide scandal over the contamination of meat products, from beefburgers to lasagne, showing no sign of abating, study the issue in depth and learn all you need to know about how it came to this with our essential guide", + "extra": "Citation Key: Lawrence.20130215", + "itemID": "647ed0dd-03b8-481f-8882-d6fefa91f4bb", + "publicationTitle": "The Guardian", + "url": "https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Europe" + }, + { + "tag": "Food and drink industry" + }, + { + "tag": "Food safety" + }, + { + "tag": "Horsemeat scandal" + }, + { + "tag": "Ireland" + }, + { + "tag": "Meat" + }, + { + "tag": "Supermarkets" + }, + { + "tag": "The meat industry" + }, + { + "tag": "United Kingdom" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food and supply chain integrity", + "creators": [ + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "extra": "Citation Key: Manning.2016b", + "itemID": "30642deb-def4-40a6-86a2-b9ad1c335df6", + "volume": "119", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Food safety, food fraud, and food defense: A fast evolving literature", + "creators": [ + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "author" + }, + { + "lastName": "Soon", + "firstName": "Jan Mei", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "DOI": "10.1111/1750-3841.13256", + "ISSN": "0022-1147", + "abstractNote": "Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. Successful models of food crime are dependent on how well the crime has been executed and at what point, or even if, detection actually occurs. The aim of this paper is to undertake a literature review and critique the often contradictory definitions that can be found in the literature in order to compare and contrast existing food crime risk assessment tools and their application. Food safety, food defense, and food fraud risk assessments consider different criteria in order to determine the degree of situational risk for each criteria and the measures that need to be implemented to mitigate that risk. Further research is required to support the development of global countermeasures, that are of value in reducing overall risk even when the potential hazards may be largely unknown, and specific countermeasures that can act against unique risks.", + "extra": "PMID: 26934423\nCitation Key: Manning.2016c", + "issue": "4", + "itemID": "27384b10-b549-45fc-80c7-94688793e9fc", + "journalAbbreviation": "J. Food Sci.", + "pages": "823-834", + "publicationTitle": "Journal of food science", + "volume": "81", + "attachments": [ + { + "path": "Manning, Soon 2016 - Food Safety.pdf", + "title": "Full Text" + }, + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Crime" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + }, + { + "tag": "Humans" + }, + { + "tag": "Risk Assessment" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "7c83d4dc-5ba0-47bf-94e0-d4c6e17623d8", + "note": "823" + }, + { + "id": "e313259e-0e47-45ee-b1ea-e989600b2337", + "note": "823" + }, + { + "id": "54ef1ad1-1da6-4aa7-9ce0-086ea6dfddc1", + "note": "823" + }, + { + "id": "87e8f5d2-a67a-47ae-b248-4306c14a896e", + "note": "823" + }, + { + "id": "89d3ec59-4084-41b9-8f5f-bcce18958b19", + "note": "823" + }, + { + "id": "c052069b-3b7c-4670-ba3a-92dffa80444f", + "note": "824" + }, + { + "id": "2aa0e8c5-f8e0-4014-afab-0f177b641c08", + "note": "824" + }, + { + "id": "ed928d6e-2210-4afa-943d-64a1217c91ae", + "note": "824" + }, + { + "id": "b7de7023-c42b-4ae7-a599-1666e2114450", + "note": "825" + }, + { + "id": "55f377a9-9873-41c0-838b-6e4dc06951a5", + "note": "825" + }, + { + "id": "ff3ede9f-2eab-4c19-adce-86b7b7e04452", + "note": "825" + }, + { + "id": "8d5da324-3c30-471a-adce-980019eac8a6", + "note": "826" + }, + { + "id": "6ab5bc1c-e84d-4e4c-8054-31172f4e3201", + "note": "826" + }, + { + "id": "b86d59cb-a694-4d59-9f02-b299eb0312c8", + "note": "829" + }, + { + "id": "98e2bac1-34f6-4d92-b074-de419ac025f5", + "note": "829" + }, + { + "id": "2ad8bf1a-09a9-4933-b7f8-32690259a92c", + "note": "830" + }, + { + "id": "7ce78538-e43d-4858-a32c-540336fb6f9c", + "note": "830" + }, + { + "id": "44e0edcc-e565-4b61-8b9d-26b3565966f1", + "note": "830" + }, + { + "id": "224a4d7c-a724-404b-b103-fe0a7a0fd809", + "note": "833" + }, + { + "id": "f51525ff-0d72-4eb0-b269-bac6369e0daf", + "note": "833" + }, + { + "id": "aac727ea-d999-4fdb-87f3-ad508e7629ec", + "note": "833" + }, + { + "id": "efdf0c51-bb4f-4b99-866f-579f70f3a9b2", + "note": "833" + }, + { + "id": "7833781a-0d1a-4ad8-869d-da7f167aaf33", + "note": "833" + }, + { + "id": "fb94fa2f-ceb6-4454-8212-9ec3aaa1a6d7", + "note": "833" + }, + { + "id": "d6aaba2e-1f43-4318-9964-b6c73e08e3a7", + "note": "

Terminological difficulties - contamination vs. adulteration

\n

Sometimes in U.S. literature \"contamination\" = unintentional, while \"adulteration\" = intentional

\n823" + }, + { + "id": "5864463d-f6e2-4c11-9afd-cc501af9cacb", + "note": "

Concept of food safety is changing

\n

Unintentional and intentional contamination used to be considered together, now they are often looked at separately.

\n823" + }, + { + "id": "f985362b-a982-49d4-a540-b6a9c8d7058c", + "note": "

High demand and low supply can create the conditions for food fraud

\n

“The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.”

\n823" + }, + { + "id": "8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77", + "note": "

Definition of food crime (Manning & Soon)

\n

“...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.”

\n824" + }, + { + "id": "8d60267b-eb59-44e6-b59e-caadaf75e906", + "note": "

Example of food crime through intentional neglect

\n

See PDF

\n824" + }, + { + "id": "e728e158-8b56-48d0-88ab-da1926c92c69", + "note": "

Definition of food defense (Manning & Soon)

\n

“Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.”

\n824" + }, + { + "id": "aaaecd43-edc1-4db7-a49f-89e5823de7a1", + "note": "

Types of food crime

\n825" + }, + { + "id": "44c817de-9ee2-45c5-8ea3-3f776b023b48", + "note": "

Definition of crime vulnerability

\n

“Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.”

\n825" + }, + { + "id": "a2c5b4b0-cdff-471f-b8d4-dc499012dc6a", + "note": "

Drivers behind food crime and food defense

\n826" + }, + { + "id": "d1b41410-9c55-44f9-87d8-7f442a196551", + "note": "

There needs to be a better understanding of what motivates food criminals

\n

“Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.”

\n827–828" + }, + { + "id": "8e5837b9-2958-42e5-954b-8c3bd1c08ec1", + "note": "

Intentional and unintentional adulteration

\n828" + }, + { + "id": "e1b7152f-30d5-4886-8a4a-4a647c580fb7", + "note": "

Differences between GFSI (2014) and FSIS (2014) and FAO (2003)

\n

See PDF

\n829" + }, + { + "id": "df067b95-5685-4a74-88ec-6aac3bf7e58f", + "note": "

Both scientific and social scientific criteria needed for risk assessment

\n830" + }, + { + "id": "89e1a961-14e1-43b1-baa9-84b685ad3244", + "note": "

Plurality of food crime makes it difficult to define which in turn makes it difficult to create policies to fight it

\n

“Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.”

\n833" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "In the interest of food safety: A qualitative study investigating communication and trust between food regulators and food industry in the UK, Australia and New Zealand", + "creators": [ + { + "lastName": "Meyer", + "firstName": "Samantha B.", + "creatorType": "author" + }, + { + "lastName": "Wilson", + "firstName": "Annabelle Mary", + "creatorType": "author" + }, + { + "lastName": "Calnan", + "firstName": "Michael", + "creatorType": "author" + }, + { + "lastName": "Henderson", + "firstName": "Julie", + "creatorType": "author" + }, + { + "lastName": "Coveney", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "McCullum", + "firstName": "Dean", + "creatorType": "author" + }, + { + "lastName": "Pearce", + "firstName": "Alex R.", + "creatorType": "author" + }, + { + "lastName": "Ward", + "firstName": "Paul", + "creatorType": "author" + }, + { + "lastName": "Webb", + "firstName": "Trevor", + "creatorType": "author" + } + ], + "date": "2017-01-01T00:00:00", + "DOI": "10.1186/s12889-017-4118-x", + "ISSN": "1471-2458", + "abstractNote": "BACKGROUND: Food regulatory bodies play an important role in public health, and in reducing the costs of food borne illness that are absorbed by both industry and government. Regulation in the food industry involves a relationship between regulators and members of the industry, and it is imperative that these relationships are built on trust. Research has shown in a variety of contexts that businesses find the most success when there are high levels of trust between them and their key stakeholders. An evidence-based understanding of the barriers to communication and trust is imperative if we are to put forward recommendations for facilitating the (re)building of trusting and communicative relationships. METHODS: We present data from 72 interviews with regulators and industry representatives regarding their trust in and communication with one another. Interviews were conducted in the UK, New Zealand, and Australia in 2013. RESULTS: Data identify a variety of factors that shape the dynamic and complex relationships between regulators and industry, as well as barriers to communication and trust between the two parties. Novel in our approach is our emphasis on identifying solutions to these barriers from the voices of industry and regulators. CONCLUSIONS: We provide recommendations (e.g., development of industry advisory boards) to facilitate the (re)building of trusting and communicative relationships between the two parties.", + "extra": "PMID: 28193265\nCitation Key: Meyer.2017", + "itemID": "bc5000cc-1af0-4d23-837f-422c907de172", + "journalAbbreviation": "BMC Public Health", + "pages": "1-13", + "publicationTitle": "BMC Public Health", + "volume": "17", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "newspaperArticle", + "title": "Alibaba to use blockchain to fight China’s fake food", + "creators": [ + { + "lastName": "Millward", + "firstName": "Steven", + "creatorType": "author" + } + ], + "date": "2017-03-24T00:00:00", + "abstractNote": "Fake soy sauce, fake rice, fake eggs – those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.", + "extra": "Citation Key: Millward.20170324", + "itemID": "7d50376a-ef59-4b6a-804f-79e6880ebd42", + "publicationTitle": "Tech in Asia", + "url": "https://www.techinasia.com/alibaba-fake-food-detection-blockchain", + "attachments": [ + { + "path": "Millward 3 24 2017 - Alibaba to use blockchain.pdf", + "title": "Full Text" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Asia" + }, + { + "tag": "Jakarta" + }, + { + "tag": "Singapore" + }, + { + "tag": "Tokyo" + } + ], + "notes": [ + { + "id": "8707e530-90fe-49ba-b221-7924b890c876", + "note": "

Fake egg found on sale in China in 2012

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Recent advances on determination of milk adulterants", + "creators": [ + { + "lastName": "Nascimento", + "firstName": "Carina de Fátima", + "creatorType": "author" + }, + { + "lastName": "Santos", + "firstName": "Poliana Macedo dos", + "creatorType": "author" + }, + { + "lastName": "Pereira-Filho", + "firstName": "Edenir Rodrigues", + "creatorType": "author" + }, + { + "lastName": "Rocha", + "firstName": "Fábio Rodrigo Piovezani", + "creatorType": "author" + } + ], + "date": "2017-01-01T00:00:00", + "ISSN": "0308-8146", + "abstractNote": "Milk adulteration is a current fraudulent practice to mask the quality parameters (e.g. protein and fat content) and increase the product shelf life. Milk adulteration includes addition of toxic substances, such as formaldehyde, hydrogen peroxide, hypochlorite, dichromate, salicylic acid, melamine, and urea. In order to assure the food safety and avoid health risks to consumers, novel analytical procedures have been proposed for detection of these adulterants. The innovations encompass sample pretreatment and improved detection and data processing, including chemometric tools. This review focuses on critical evaluation of analytical approaches for assay of milk adulteration, with emphasis on applications published after 2010. Alternatives for fast, environmentally friendly and in-situ detection of milk adulterants are highlighted.", + "extra": "PMID: 27979084\nCitation Key: Nascimento.2017", + "itemID": "f16b35ce-1d93-423c-909a-61d0d5f693f8", + "journalAbbreviation": "Food Chem.", + "pages": "1232-1244", + "publicationTitle": "Food chemistry", + "volume": "221", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Food Fraud: Economically-motivated adulteration", + "creators": [ + { + "lastName": "Nestec Ltd.", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2016-01-01T00:00:00", + "extra": "Citation Key: NestecLtd..2016", + "itemID": "0ef4b577-f9c6-43b5-abfa-5d05ba8664a1", + "place": "Vevey, Switzerland", + "url": "http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "note": "An example of an industry-created guide for preventing food fraud.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "ae0faadc-51ef-4d95-9f4c-5826b39a10df", + "note": "

Most often food fraud is not likely to cause health problems, but it does lead to lower quality food

\n

“The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.”

\n4" + }, + { + "id": "e4ed0f18-4972-43a6-bd1b-ea7e963cd7e6", + "note": "

Steps for prevention

\n

“A general approach to prevent food fraud can be summarised as follows: \r\n• Conduct vulnerability assessment, including: \r\n– Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); \r\n– Know your suppliers (manufacturer, broker, history);\r\n – Know your supply chain (length, complexity, supply & demand arrangements, ease of access);\r\n – Know your existing control measures. \r\n• Design mitigation strategy and implement mitigation measures. \r\n• Validate and verify mitigation measures, continually review food fraud management system.”

\n6" + }, + { + "id": "3b1f0ca4-aed9-41ad-a41e-8f84170f11d8", + "note": "

Factors that can contribute to fraud

\n

“Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.”

\n6" + }, + { + "id": "4a0f720f-8088-4031-b20d-cee01582c736", + "note": "

Increases in prices for an ingredient and rarity are good conditions for fraud

\n

“Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.”

\n8" + }, + { + "id": "8085fdea-c5a2-42f2-8897-02d1b05fb1be", + "note": "

Geopolitical considerations

\n

“Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).”

\n8" + }, + { + "id": "dc6bedab-3788-4e88-9694-91308f59c51d", + "note": "

Vulnerability factors vs. control measures

\n8" + }, + { + "id": "d9308c32-983b-417d-98b9-ed59283dc5c9", + "note": "

What's needed to judge food fraud risk

\n

“In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.”

\n9" + }, + { + "id": "3c7564b6-5670-4dbe-be61-0f71c7a732da", + "note": "

Two types of raw material monitoring

\n

“Raw material monitoring should be performed using appropriate analytical methods for the verification of authenticity. The methods must be selective, specific, and of appropriate sensitivity to verify that the food authenticity process is efficient. There are 2 approaches:\r\n • Targeted analyses (linked to parameters specified in raw material specifications);\r\n • Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.”

\n10" + }, + { + "id": "e8789c0d-bcc7-426c-bc79-4ae45fe123be", + "note": "

Businesses should use suppliers they can trust and who will share processes with them

\n

“Confidence is increased with a supplier’s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.”

\n11" + }, + { + "id": "d41db08f-6c2e-4724-899d-f5934846a3b2", + "note": "

Auditing examples

\n

“More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site – auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site – auditors may look for the presence of equipment used to inject brine.”

\n14" + }, + { + "id": "b64ad7df-383b-4606-b5f9-4725c6056945", + "note": "

Definition of EMA (economically-motivated adulteration)

\n

“EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).”

\n16" + }, + { + "id": "8756bc78-f317-444a-b13c-7a3a35207b67", + "note": "

Recommendations for consumers for avoiding food fraud

\n

“Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.”

\n18" + } + ], + "seeAlso": [] + }, + { + "itemType": "map", + "title": "Global seafood fraud", + "creators": [ + { + "lastName": "Oceana", + "creatorType": "author", + "fieldMode": true + } + ], + "date": "2016-01-01T00:00:00", + "abstractNote": "Seafood is a global commodity traded all over the world, following a long, complex and non-transparent supply chain. It also serves as an important source of protein for millions of people every day. However, seafood fraud and species substitutions occur regularly, cheating consumers out of what they ordered and putting public health and the oceans at risk. In addition, seafood fraud allows illegally caught fish to be laundered into the legal seafood trade.", + "extra": "Citation Key: Oceana.2016", + "itemID": "e365933e-9b5b-4bb1-ae02-326f41d2833a", + "url": "https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [ + { + "note": "This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.", + "tags": [ + "#Evaluation" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Compositional signatures of conventional, free range, and organic pork meat using fingerprint techniques", + "creators": [ + { + "lastName": "Oliveira", + "firstName": "Gislene Batista de", + "creatorType": "author" + }, + { + "lastName": "Alewijn", + "firstName": "Martin", + "creatorType": "author" + }, + { + "lastName": "Boerrigter-Eenling", + "firstName": "Rita", + "creatorType": "author" + }, + { + "lastName": "van Ruth", + "firstName": "Saskia M.", + "creatorType": "author" + } + ], + "date": "2015-01-01T00:00:00", + "ISSN": "2304-8158", + "abstractNote": "Consumers' interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester-FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry-ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry-PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.", + "extra": "PMID: 28231211\nCitation Key: Oliveira.2015", + "issue": "3", + "itemID": "d0abc9c9-e230-4a30-ac87-7847e7fa0789", + "pages": "359-375", + "publicationTitle": "Foods", + "volume": "4", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Real food fake food: Why you don't know what you're eating & what you can do about it", + "creators": [ + { + "lastName": "Olmsted", + "firstName": "Larry", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "9781616204211", + "abstractNote": "[Description from publisher - J.S.]\r\nYou've seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn't. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we're eating is not what we're really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It's a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters", + "extra": "Citation Key: Olmsted.2016", + "itemID": "24cba909-5cee-4d53-ae8c-95938ad33f89", + "numPages": "318", + "place": "Chapel Hill, North Carolina", + "publisher": "Algonquin Books of Chapel Hill", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Artificial foods" + }, + { + "tag": "Consumer education" + }, + { + "tag": "Food additives" + }, + { + "tag": "Food substitutes" + }, + { + "tag": "Fraud" + }, + { + "tag": "Nutrition" + }, + { + "tag": "Popular sources" + }, + { + "tag": "Quality" + } + ], + "notes": [ + { + "note": "Real food, perfected : a day in the life of Parma\r\nWhat is fake food?\r\nFishy fish\r\nSpoiled oils : olive and \"truffle\"\r\nWhat's in a name? : real foods come from real places\r\nQ:Where's the Kobe beef? A:not on your plate\r\nChampagne and scotch : the sincerest form of flattery\r\nCheesy cheeses\r\nFine wines and not-so-fine wines\r\nThe other red (and white) meat?\r\nFakes, fakes, and more fakes : what else is there?", + "tags": [ + "#TableOfContents" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Traceability in agriculture and food supply chain: A review of basic concepts, technological implications, and future prospects", + "creators": [ + { + "lastName": "Opara", + "firstName": "Linus Umezuruike", + "creatorType": "author" + } + ], + "date": "2003-01-01T00:00:00", + "ISSN": "1459-0255", + "extra": "Citation Key: Opara.2003", + "itemID": "92976b82-1442-47c0-a23d-dd1a0178ce0c", + "journalAbbreviation": "J. Food Agric. Environ.", + "pages": "101-106", + "publicationTitle": "Journal of Food Agriculture and Environment", + "volume": "1", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Reflections on supply chain research and practice: The proceedings of 20th International Symposium on Logistics (ISL 2015)", + "creators": [ + { + "lastName": "Pawar", + "firstName": "Kulwant S.", + "creatorType": "editor" + }, + { + "lastName": "Rogers", + "firstName": "Helen", + "creatorType": "editor" + }, + { + "lastName": "Ferrari", + "firstName": "Emilio", + "creatorType": "editor" + }, + { + "lastName": "International Symposium on Logistics", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2015-01-01T00:00:00", + "ISBN": "9780853583080", + "extra": "Citation Key: Pawar.2015", + "itemID": "0293a42d-151c-4ca2-9091-4e1dd5400666", + "place": "Nottingham", + "publisher": "Centre for Concurrent Enterprise", + "url": "http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "webpage", + "title": "Leveraging blockchain to improve food supply chain traceability", + "creators": [ + { + "lastName": "Ramamurthy", + "firstName": "Shanker", + "creatorType": "author" + }, + { + "lastName": "International Business Machines Corporation", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2016-11-16T00:00:00", + "abstractNote": "Leveraging blockchain for food supply chain tracking and authentication, is critical to finding and helping to address sources of contamination worldwide.", + "extra": "Citation Key: Ramamurthy.20161116", + "itemID": "89c1b839-ce76-43f4-be84-84d394af9179", + "url": "https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/", + "attachments": [ + { + "title": "Online" + }, + { + "path": "Ramamurthy 11 16 2016 - Leveraging blockchain to improve food.pdf", + "title": "Full Text" + } + ], + "tags": [], + "notes": [ + { + "note": "This blog article discusses IBM, Walmart, and Tsinghua University's pilot program to apply blockchain technology to tracing the food supply chain.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "5683b7c1-2eac-4d95-b72b-65f003284ec8", + "note": "

How blockchain works when applied to the food supply chain

\n

“When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.”

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food fraud", + "creators": [ + { + "lastName": "Ryan", + "firstName": "John M.", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "0128033932", + "abstractNote": "Food Fraud provides an overview of the current state on the topic to help readers understand which products are being impacted, how pervasive food fraud is, and what laws are in effect across the developed world. As international food trade increases, food processors, distributors, and consumers are purchasing more and more food from foreign countries that, in many cases, have inadequate oversight or control over what is coming into our supermarkets, restaurants, and refrigerators. This book is an essential quick reference that will familiarize readers with the latest issues surrounding the food industry.", + "extra": "Citation Key: Ryan.2016", + "itemID": "5c99255f-527b-4ab4-a482-10c4441d08f0", + "numPages": "92", + "place": "Amsterdam; Boston", + "publisher": "Academic Press", + "attachments": [], + "tags": [ + { + "tag": "Food adulteration and inspection" + }, + { + "tag": "Food industry and trade" + }, + { + "tag": "Law and legislation" + }, + { + "tag": "Scholarly sources" + }, + { + "tag": "United States" + } + ], + "notes": [ + { + "note": "Table of Contents\r\n Introduction\r\n Chapter 1. Background\r\n Abstract\r\n 1.1 Risk\r\n 1.2 Prevention Versus Corrective Action\r\n Chapter 2. Some Food Fraud Laws\r\n Abstract\r\n 2.1 Defining Food Fraud in the European Union\r\n 2.2 Defining Food Fraud in the United States\r\n 2.3 Executive Responsibilities and Prosecution: The Park Doctrine\r\n 2.4 FDA Ties with Customs and Border Protection and Homeland Security\r\n 2.5 Introduction of an Adulterated Food into Interstate Commerce\r\n 2.6 The Potential for Terrorism\r\n Chapter 3. Food Fraud Through the Supply Chain\r\n Abstract\r\n 3.1 Labeling\r\n 3.2 Blends: Walking on the Edge\r\n 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates\r\n 3.4 Supply Chain Food Fraud Examples\r\n Chapter 4. Unprotected Customers\r\n Abstract\r\n 4.1 Detection Testing and the Authentication Dilemma\r\n 4.2 Whistle Blowers\r\n 4.3 What are Consumers Being Told?\r\n Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems\r\n Abstract\r\n 5.1 Item Level Traceability\r\n 5.2 Barcode: Case Level Traceability\r\n 5.3 Pallet Level Traceability and Temperature Monitoring\r\n 5.4 Pallet and Container Level Traceability and Temperature Monitoring\r\n 5.5 Container Level Traceability and Temperature Control\r\n 5.6 Recall and the Chain of Custody\r\n Chapter 6. Recommendations\r\n Abstract\r\n 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement\r\n 6.2 Take Responsibility\r\n 6.3 Get Training and Get Involved\r\n 6.4 Establish Preventive Purchasing Practices\r\n 6.5 Know Your Supply Chain\r\n 6.6 Establish a System of Distributed Authority\r\n 6.7 Invest in Prevention by Establishing a System of Continuous Improvement\r\n 6.8 Hire Honest People\r\n 6.9 Proactively Cooperate with the Competition\r\n 6.10 Help Prosecute and Publicize\r\n Chapter 7. Available Resources\r\n Abstract\r\n 7.1 Some International Experts\r\n 7.2 Better Seafood Board (BSB)\r\n 7.3 FDA DNA Seafood Labeling Training\r\n 7.4 FDA Fish Substitutes\r\n 7.5 The University of Michigan Food Fraud Initiative\r\n 7.6 The US Pharmacopeial Food Fraud Database\r\n 7.7 Food Fraudster\r\n 7.8 UK Food Standards Agency “Reporting food fraud”\r\n 7.9 European Commission Official Controls and Enforcement\r\n 7.10 National Center for Food Protection and Defense: Food Fraud Resources\r\n 7.11 National Science Foundation (NSF)\r\n 7.12 Rapid Alert System for Food and Feed (RASFF)\r\n Chapter 8. Summary: Confusion Reigns", + "tags": [ + "#TableOfContents" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "document", + "title": "A proper mouthful: How do we prevent food fraud?", + "creators": [ + { + "lastName": "Sample", + "firstName": "Ian", + "creatorType": "author" + }, + { + "lastName": "Chambers", + "firstName": "Iain", + "creatorType": "author" + } + ], + "date": "2016-02-26T00:00:00", + "abstractNote": "From fake eggs to horsemeat burgers, food fraud is common, but hard to detect. How can we be sure that what we’re eating is the real thing?", + "extra": "Citation Key: Sample.20160226", + "itemID": "61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4", + "url": "https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Food and drink industry" + }, + { + "tag": "Food safety" + }, + { + "tag": "Food science" + }, + { + "tag": "Horsemeat scandal" + }, + { + "tag": "Popular sources" + }, + { + "tag": "The meat industry" + } + ], + "notes": [ + { + "id": "cbb0de87-e45f-48db-899b-5ebbab2f93bb", + "note": "

Adulteration usually not complete subsitution but attempt to cover up something in the food

\n

Usually it's an attempt to mask something in the food and is not an outright 100% substitution.

\n" + }, + { + "id": "07650771-fff2-4109-94f6-1c7bd608768e", + "note": "

Adulteration can occur with almost all types of food

\n

“Pretty much every food is vulnerable. ”

\n025" + }, + { + "id": "bf18bd03-1c15-4ec7-bbfe-36f3cd8e5338", + "note": "

Testing in UK has revealed widespread adulteration or misrepresentation of ingredients

\n

“Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.”

\n125" + } + ], + "seeAlso": [] + }, + { + "itemType": "computerProgram", + "title": "MarkerView Software", + "creators": [ + { + "lastName": "Sciex", + "creatorType": "author", + "fieldMode": true + } + ], + "date": "2017-03-29T00:00:00", + "abstractNote": "[Description from publisher - J.S.]\r\nA powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.", + "extra": "Citation Key: Sciex.20170329", + "itemID": "d69a676f-1c2b-425b-bc36-ea52e1409bb2", + "url": "https://sciex.com/products/software/markerview-software", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "webpage", + "title": "GFSI direction on food fraud and vulnerability assessment (VACCP)", + "creators": [ + { + "lastName": "Spink", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "Michigan State University", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2014-05-08T00:00:00", + "abstractNote": "In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.  They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.", + "extra": "Citation Key: Spink.20140508", + "itemID": "0d576b32-d148-4660-9d3c-05e19c6b7691", + "url": "http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + } + ], + "notes": [ + { + "id": "ea630e5f-20ed-48ec-b8eb-c018bd423c17", + "note": "

GFSI Approach to Food Fraud Prevention

\n" + }, + { + "id": "2f42fd47-185c-4327-8824-d475202af89a", + "note": "

GFSI Terminology Comparison

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Defining the public health threat of food fraud", + "creators": [ + { + "lastName": "Spink", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "Moyer", + "firstName": "Douglas C.", + "creatorType": "author" + } + ], + "date": "2011-01-01T00:00:00", + "DOI": "10.1111/j.1750-3841.2011.02417.x", + "ISSN": "0022-1147", + "abstractNote": "Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that—economically motivated—but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud—it focuses specifically on the public health threat—and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications ofthe crime triangle and the chemistry ofthe crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.", + "extra": "PMID: 22416717\nCitation Key: Spink.2011", + "issue": "9", + "itemID": "736d8366-00c0-4f5d-a982-4b24d6e27b3a", + "journalAbbreviation": "J. Food Sci.", + "pages": "157-163", + "publicationTitle": "Journal of food science", + "volume": "76", + "attachments": [ + { + "title": "Online" + }, + { + "path": "Spink, Moyer 2011 - Defining the public health threat.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Consumer product safety" + }, + { + "tag": "Food safety methods" + }, + { + "tag": "Fraud" + }, + { + "tag": "Risk Assessment" + }, + { + "tag": "Risk Factors" + }, + { + "tag": "Scholarly sources" + }, + { + "tag": "Terrorism" + } + ], + "notes": [ + { + "note": "Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "f2eb5713-27ac-41f3-83ac-b61392b8bacf", + "note": "157" + }, + { + "id": "0f31aea1-8324-4e12-8162-3637e53ad930", + "note": "157" + }, + { + "id": "07cfdbf0-6572-4f7f-985f-18bf0d4e495d", + "note": "157" + }, + { + "id": "8f65339e-8192-444e-82ae-55e47f02aaef", + "note": "157" + }, + { + "id": "2ef2f38b-d773-4713-8cb4-b8f842b9e0d4", + "note": "157" + }, + { + "id": "56686902-3d02-4bc3-b757-fbdf21e5dbc4", + "note": "157" + }, + { + "id": "f034a2fb-ad09-4a92-8ec0-b77bc05ac074", + "note": "157" + }, + { + "id": "c955ab2c-971c-40ca-872c-a33c1f3172a7", + "note": "157" + }, + { + "id": "96c2a2d1-f503-4c1b-b971-dbe5100fb40a", + "note": "157" + }, + { + "id": "1de6ee97-7578-4ea7-9ce5-5bfed9d25e67", + "note": "157" + }, + { + "id": "5873d947-8838-42c8-b3d1-63ec62468961", + "note": "158" + }, + { + "id": "128ecc9b-196b-41d9-af3c-f429b136b85e", + "note": "158" + }, + { + "id": "d8280b44-ad37-4d7d-9e34-27602a8eae15", + "note": "158" + }, + { + "id": "9270be6d-8ff8-4d73-9c00-8d1d5689777e", + "note": "158" + }, + { + "id": "e6281cc4-4a84-4f10-9267-4ea40b7dd5ba", + "note": "160" + }, + { + "id": "a9dbf0fd-8dbc-4bc6-84f6-90629c3eec3f", + "note": "161" + }, + { + "id": "8cd93dd1-0d00-4054-9a90-51501596ab63", + "note": "161" + }, + { + "id": "5ce373fa-5738-41f5-bfa8-0f5e68473f4f", + "note": "162" + }, + { + "id": "29bac51b-0f3a-4ca0-8c95-670565fa36f7", + "note": "162" + }, + { + "id": "c2f0f063-35b2-42e6-9b8d-157e2cbc72fc", + "note": "

Definitions of food fraud, food safety incidents, and food defense incidents

\n

“Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.”

\n157" + }, + { + "id": "5eaf69d3-26a6-4119-89e8-a05fe79a2e1f", + "note": "

Where food fraud fits as a term

\n

“Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.”

\n157" + }, + { + "id": "6054a098-5dd3-42e1-8b84-a0b8972532be", + "note": "

Difference between fraud in ancient and contemporary times

\n

Although fraud existed, it was geographically limited. Today the scale can be vast.

\n158" + }, + { + "id": "ebbfda47-b33a-4c90-b40f-2920fa7add4d", + "note": "

Definition of food fraud (Spink & Moyer)

\n

“Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.”

\n158" + }, + { + "id": "1d3d8033-4336-4188-bd49-15f6d6100e2d", + "note": "

Components of a food protection plan

\n158" + }, + { + "id": "16b0043e-06e3-4a0d-8d60-5d6fbd85499c", + "note": "

Direct food fraud risk definition

\n

“Direct food fraud risk occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.”

\n159" + }, + { + "id": "328aeaa3-7fde-456e-b3a9-1b71975366f8", + "note": "

Indirect food fraud risk - definition

\n

“Indirect food fraud risk occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.”

\n159" + }, + { + "id": "e729b06b-fa53-4b86-a40d-61b5b179d919", + "note": "

Technical food fraud risk - definition

\n

“Technical food fraud risk is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.”

\n159" + }, + { + "id": "dc437c4e-207b-4c9a-81c7-586937a3e20b", + "note": "

Differences between food fraud and food defense

\n

Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.

\n160" + }, + { + "id": "8f16ea76-0030-4a99-a4c8-a4192eb82a37", + "note": "

Food protection risk matrix

\n160" + }, + { + "id": "197c843d-c957-4a8c-801f-19166eaba940", + "note": "

How to reduce likelihood of food fraud

\n

“Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.”

\n161" + }, + { + "id": "6b52254c-6e19-420d-a33f-51720c19fb65", + "note": "

Reasons enforcing food fraud laws is difficult

\n

“Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.”

\n162" + }, + { + "id": "1e9280df-aec2-421e-9f7a-92e6f9da339e", + "note": "

What is needed to prevent food fraud

\n

“Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe crime triangle provides insights to the motivations for seeking food fraud opportunities.”

\n162" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Introducing food fraud including translation and interpretation to Russian, Korean, and Chinese languages", + "creators": [ + { + "lastName": "Spink", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "Moyer", + "firstName": "Douglas C.", + "creatorType": "author" + }, + { + "lastName": "Park", + "firstName": "Hyeonho", + "creatorType": "author" + }, + { + "lastName": "Wu", + "firstName": "Yongning", + "creatorType": "author" + }, + { + "lastName": "Fersht", + "firstName": "Victor", + "creatorType": "author" + }, + { + "lastName": "Shao", + "firstName": "Bing", + "creatorType": "author" + }, + { + "lastName": "Hong", + "firstName": "Miao", + "creatorType": "author" + }, + { + "lastName": "Paek", + "firstName": "Seung Yeop", + "creatorType": "author" + }, + { + "lastName": "Edelev", + "firstName": "Dmitry", + "creatorType": "author" + } + ], + "date": "2015-01-01T00:00:00", + "DOI": "10.1016/j.foodchem.2014.09.106", + "ISSN": "0308-8146", + "abstractNote": "This paper introduces the topic of Food Fraud with translations to Russian, Korean, and Chinese. The concepts provide a system-wide focus leading to prevention. The goal is not to detect Food Fraud but to adjust entire food supply chains to reduce fraud opportunities. Food Fraud is a recently defined area of Food Protection between Food Safety (such as Salmonella or pesticide residue), and Food Defense (malicious intent to harm such as terrorism). Food Fraud is intentional with no intent to harm but only for economic gain. As with improving Food Safety and Food Defense, preventing Food Fraud is good for society and the economy. Society benefits through fewer public health threats from unauthorized acts. Society also benefits from increased consumer satisfaction and harmony. Food Security is increased through the production of more, higher-value products for consumers, commerce, and exporting. Food Fraud can reduce economic output because sickened citizens cannot work and it also reduces consumer confidence leading to less commerce.", + "extra": "PMID: 26190607\nCitation Key: Spink.2015", + "itemID": "9208b9de-7f60-485f-92fb-5b2ce71e2d8d", + "journalAbbreviation": "Food Chem.", + "pages": "102-7", + "publicationTitle": "Food chemistry", + "volume": "189", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "China" + }, + { + "tag": "Food contamination prevention and control" + }, + { + "tag": "Food quality" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud prevention and control" + }, + { + "tag": "Language" + }, + { + "tag": "Public Health" + }, + { + "tag": "Republic of Korea" + }, + { + "tag": "Russia" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Driving agribusiness with technology innovations", + "creators": [ + { + "lastName": "Tarnanidis", + "firstName": "Theodore", + "creatorType": "editor" + }, + { + "lastName": "Vlachopoulou", + "firstName": "Maro", + "creatorType": "editor" + }, + { + "lastName": "Papathanasiou", + "firstName": "Jason", + "creatorType": "editor" + } + ], + "date": "2017-01-01T00:00:00", + "ISBN": "9781522521075", + "abstractNote": "[Description from publisher - J.S.]\r\nModern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially.\r\nDriving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.", + "extra": "Citation Key: Tarnanidis.2017", + "itemID": "b3b260b4-1492-4b1c-81c8-436cdedebaad", + "place": "Hershey, Pennsylvania", + "publisher": "IGI Global", + "series": "Advances in Business Strategy and Competitive Advantage", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Coffee adulteration: More than two decades of research", + "creators": [ + { + "lastName": "Toci", + "firstName": "Aline Theodoro", + "creatorType": "author" + }, + { + "lastName": "Farah", + "firstName": "Adriana", + "creatorType": "author" + }, + { + "lastName": "Pezza", + "firstName": "Helena Redigolo", + "creatorType": "author" + }, + { + "lastName": "Pezza", + "firstName": "Leonardo", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "DOI": "10.1080/10408347.2014.966185", + "ISSN": "1040-8347", + "abstractNote": "Coffee is a ubiquitous food product of considerable economic importance to the countries that produce and export it. The adulteration of roasted coffee is a strategy used to reduce costs. Conventional methods employed to identify adulteration in roasted and ground coffee involve optical and electron microscopy, which require pretreatment of samples and are time-consuming and subjective. Other analytical techniques have been studied that might be more reliable, reproducible, and widely applicable. The present review provides an overview of three analytical approaches (physical, chemical, and biological) to the identification of coffee adulteration. A total of 30 published articles are considered. It is concluded that despite the existence of a number of excellent studies in this area, there still remains a lack of a suitably sensitive and widely applicable methodology able to take into account the various different aspects of adulteration, considering coffee varieties, defective beans, and external agents.", + "extra": "PMID: 25633422\nCitation Key: Toci.2016", + "issue": "2", + "itemID": "ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf", + "journalAbbreviation": "Crit. Rev. Anal. Chem.", + "pages": "83-92", + "publicationTitle": "Critical Reviews in Analytical Chemistry", + "volume": "46", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Coffee" + }, + { + "tag": "Electron scanning microscopy" + }, + { + "tag": "Food contamination analysis" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "statute", + "nameOfAct": "FDA Food Safety Modernization Act: 21 USC 2201", + "creators": [ + { + "lastName": "United States Congress", + "creatorType": "contributor", + "fieldMode": true + } + ], + "dateEnacted": "2017-01-04T00:00:00", + "extra": "Citation Key: UnitedStatesCongress.20170104", + "itemID": "b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc", + "url": "https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf", + "attachments": [ + { + "title": "Online" + }, + { + "path": "United States Congress 1 4 2017 - FDA Food Safety Modernization Act.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Legal sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "case", + "caseName": "United States v. Lexington Mill & Elevator Co.", + "creators": [ + { + "lastName": "United States Supreme Court", + "creatorType": "contributor", + "fieldMode": true + } + ], + "dateDecided": "1914-02-24T00:00:00", + "extra": "Citation Key: UnitedStatesSupremeCourt.19140224", + "itemID": "03798623-1bd2-422e-bb17-0f77830aff20", + "url": "https://supreme.justia.com/cases/federal/us/232/399/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Legal sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food safety", + "creators": [ + { + "lastName": "Uyttendaele", + "firstName": "Mieke", + "creatorType": "editor" + }, + { + "lastName": "Franz", + "firstName": "Eelco", + "creatorType": "editor" + }, + { + "lastName": "Schlüter", + "firstName": "Oliver", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "extra": "Citation Key: Uyttendaele.2016", + "itemID": "9735e0ee-c250-4570-b2b9-6388450b3dae", + "volume": "13", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "DNA barcoding reveals commercial fraud related to yak jerky sold in China", + "creators": [ + { + "lastName": "Wang", + "firstName": "Yunyu", + "creatorType": "author" + }, + { + "lastName": "He", + "firstName": "Kai", + "creatorType": "author" + }, + { + "lastName": "Fan", + "firstName": "Long", + "creatorType": "author" + }, + { + "lastName": "Wang", + "firstName": "Yushui", + "creatorType": "author" + }, + { + "lastName": "Wu", + "firstName": "Shifang", + "creatorType": "author" + }, + { + "lastName": "Murphy", + "firstName": "Robert W.", + "creatorType": "author" + }, + { + "lastName": "Wang", + "firstName": "Wenzhi", + "creatorType": "author" + }, + { + "lastName": "Zhang", + "firstName": "Yaping", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "DOI": "10.1007/s11427-015-4979-0", + "ISSN": "1674-7305", + "extra": "PMID: 26758743\nCitation Key: Wang.2016", + "issue": "1", + "itemID": "6934fac0-8c0a-469d-90ce-0412ba7d9a87", + "journalAbbreviation": "Sci. China Life Sci.", + "pages": "106-8", + "publicationTitle": "Science China. Life sciences", + "volume": "59", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + }, + { + "path": "Wang, He et al.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Cattle genetics" + }, + { + "tag": "China" + }, + { + "tag": "DNA Barcoding" + }, + { + "tag": "Food contamination" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + }, + { + "tag": "Hazard analysis and critical control points" + }, + { + "tag": "Meat" + }, + { + "tag": "Preserved food" + }, + { + "tag": "RNA" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "Example of how DNA barcode tests can be used to detect when another species of animal is used.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "0bf7e05e-8b06-49df-8f75-507304afe7a5", + "note": "106" + }, + { + "id": "68247aee-2053-41d8-8781-e144fdd126cf", + "note": "

Why identifying species in certain food products is difficult

\n

“Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.”

\n106" + }, + { + "id": "b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1", + "note": "

DNA barcoding use

\n

“DNA barcoding uses a short, standardized region to distinguish different taxa at the species level.”

\n106" + }, + { + "id": "2962251b-22f8-405e-8e1f-f29bbf92dd00", + "note": "106" + }, + { + "id": "e1b89b1f-5704-41c8-a4f7-095a6d896830", + "note": "

Example of food adulteration in a test of yak meat jerky

\n

“Only nine yak jerky samples were identified as yak (Bos grunniens) samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat (Bos taurus), buffalo beef (Bubalus bubalis), or pig meat (Sus scrofa). The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew (Sorex bedfordiae) and the Chinese mole shrew (Anourosorex squamipes).”

\n107-108" + }, + { + "id": "8203b7c9-1cee-48ff-bd7c-c357c8ca4002", + "note": "

Percentage of yak jerky products that were adulterated

\n

“...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.”

\n108" + } + ], + "seeAlso": [] + }, + { + "itemType": "webpage", + "title": "2008 Chinese milk scandal", + "creators": [ + { + "lastName": "Wikipedia", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2017-05-22T00:00:00", + "extra": "Citation Key: Wikipedia.20170522", + "itemID": "8b7d04f3-dfc8-4e36-8d34-0db8113eab01", + "url": "https://en.wikipedia.org/w/index.php?oldid=781647563", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Background info - not for citation!" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "audioRecording", + "title": "Still seems like food to me", + "creators": [ + { + "lastName": "Winter", + "firstName": "Carl", + "creatorType": "author" + } + ], + "date": "2008-01-01T00:00:00", + "extra": "Citation Key: Winter.2008", + "itemID": "57e829e1-dc28-4a02-956f-04d36967db37", + "label": "Food Safety Music - UC Davis", + "place": "Davis, California", + "url": "http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Food safety and social risk in contemporary China", + "creators": [ + { + "lastName": "Yan", + "firstName": "Yunxiang", + "creatorType": "author" + } + ], + "date": "2012-01-01T00:00:00", + "ISSN": "1752-0401", + "extra": "Citation Key: Yan.2012", + "issue": "3", + "itemID": "3c651c48-0dd6-4a47-b02d-13a6a80b1c2b", + "journalAbbreviation": "J. Asian Stud.", + "pages": "705-729", + "publicationTitle": "The Journal of Asian Studies", + "volume": "71", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "2016 13th International Conference on Service Systems and Service Management (ICSSSM): June 24-26, 2016, KUST, Kunming, China", + "creators": [ + { + "lastName": "Yang", + "firstName": "Baojian", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "978-1-5090-2842-9", + "extra": "Citation Key: Yang.2016", + "itemID": "26c0c55a-7828-45c1-a29c-f85a34eb8676", + "place": "Piscataway, NJ", + "publisher": "IEEE", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Computer networks" + }, + { + "tag": "Scholarly sources" + }, + { + "tag": "Service industries" + }, + { + "tag": "Systems engineering" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "bookSection", + "title": "Dissonance in the food traceability regulatory environment and food fraud", + "creators": [ + { + "lastName": "Bitzios", + "firstName": "Michail", + "creatorType": "author" + }, + { + "lastName": "Jack", + "firstName": "Lisa", + "creatorType": "author" + }, + { + "lastName": "Krzyzaniak", + "firstName": "Sally-Ann Caroline", + "creatorType": "author" + }, + { + "lastName": "Xu", + "firstName": "Mark", + "creatorType": "author" + }, + { + "lastName": "Dries", + "firstName": "Liesbeth K. E.", + "creatorType": "editor" + }, + { + "lastName": "Karantininis", + "firstName": "Konstantinos", + "creatorType": "editor" + }, + { + "lastName": "Martino", + "firstName": "Gaetano", + "creatorType": "editor" + }, + { + "lastName": "Codron", + "firstName": "Jean Marie", + "creatorType": "editor" + }, + { + "lastName": "Pascucci", + "firstName": "Stefano", + "creatorType": "editor" + } + ], + "ISBN": "9789086863013", + "bookTitle": "It’s a jungle out there - the strange animals of economic organization in agri-food value chains", + "extra": "Citation Key: Bitzios.Inpress", + "itemID": "b213355e-df97-4b43-9e69-8a185817ce57", + "place": "Wageningen", + "publisher": "Wageningen Academic Publishers", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "e245ae31-ac6d-42fa-aca4-3435cb4bf378" + ] + }, + { + "itemType": "bookSection", + "title": "Supply chain food crime & fraud: A systematic literature review of food criminality", + "creators": [ + { + "lastName": "Fassam", + "firstName": "Liam", + "creatorType": "author" + }, + { + "lastName": "Dani", + "firstName": "Samir", + "creatorType": "author" + }, + { + "lastName": "Hills", + "firstName": "Mils", + "creatorType": "author" + }, + { + "lastName": "Pawar", + "firstName": "Kulwant S.", + "creatorType": "editor" + }, + { + "lastName": "Rogers", + "firstName": "Helen", + "creatorType": "editor" + }, + { + "lastName": "Ferrari", + "firstName": "Emilio", + "creatorType": "editor" + }, + { + "lastName": "International Symposium on Logistics", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2015-01-01T00:00:00", + "ISBN": "9780853583080", + "bookTitle": "Reflections on supply chain research and practice: The proceedings of 20th International Symposium on Logistics (ISL 2015)", + "extra": "Citation Key: Fassam.2015", + "itemID": "5fb48a7c-65db-4581-ab2c-7197305a0811", + "pages": "659-666", + "place": "Nottingham", + "publisher": "Centre for Concurrent Enterprise", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "id": "a3c8b5d4-6350-4814-899f-141f4fb089fa", + "note": "

Research not having any effect on food fraud incidents

\n

“Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....”

\n660" + }, + { + "id": "d7702e6d-03df-440c-99f4-23e4d5bbc2a7", + "note": "

Disconnect between academic and public interest in food fraud

\n662" + }, + { + "id": "735834f8-6fae-4c73-8b55-00c3068752e6", + "note": "

Factors leading to food fraud in the supply chain

\n664" + }, + { + "id": "9308f85e-7559-453b-a155-70db3f5521e2", + "note": "

Another problem of terminology: US uses \"food fraud\" and UK and Europe use \"food crime\" in the research

\n

“Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of ‘fraud’ and European based research adopts ‘crime’, which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term ‘food crime’ in order to build and strengthen a coherent body of knowledge.”

\n665" + } + ], + "seeAlso": [ + "0293a42d-151c-4ca2-9091-4e1dd5400666" + ] + }, + { + "itemType": "bookSection", + "title": "Eco-certification and transparency in global food supply chains", + "creators": [ + { + "lastName": "Karipidis", + "firstName": "Philippos", + "creatorType": "author" + }, + { + "lastName": "Tselempis", + "firstName": "Dimitrios", + "creatorType": "author" + }, + { + "lastName": "Tsironis", + "firstName": "Loukas K.", + "creatorType": "author" + }, + { + "lastName": "Tarnanidis", + "firstName": "Theodore", + "creatorType": "editor" + }, + { + "lastName": "Vlachopoulou", + "firstName": "Maro", + "creatorType": "editor" + }, + { + "lastName": "Papathanasiou", + "firstName": "Jason", + "creatorType": "editor" + } + ], + "date": "2017-01-01T00:00:00", + "ISBN": "9781522521075", + "bookTitle": "Driving agribusiness with technology innovations", + "extra": "Citation Key: Karipidis.2017\nDOI: 10.4018/978-1-5225-2107-5.ch005", + "itemID": "cb44c440-80f8-4486-bf68-af79d9d716e2", + "pages": "70-90", + "place": "Hershey, Pennsylvania", + "publisher": "IGI Global", + "series": "Advances in Business Strategy and Competitive Advantage", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "b3b260b4-1492-4b1c-81c8-436cdedebaad" + ] + }, + { + "itemType": "bookSection", + "title": "Food Integrity", + "creators": [ + { + "lastName": "Manning", + "firstName": "L.", + "creatorType": "author" + }, + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "bookTitle": "Food and supply chain integrity", + "extra": "Citation Key: Manning.2016", + "itemID": "3012ebe2-c183-4d12-9851-5ab7b6d2421c", + "pages": "2-6", + "volume": "119", + "attachments": [], + "tags": [], + "notes": [ + { + "id": "a7263495-1753-4d6b-a5bd-035c37cf9eac", + "note": "

Difficulty: not yet enough academic literature since the field of food integrity is still developing

\n

“The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...”

\n2" + } + ], + "seeAlso": [ + "30642deb-def4-40a6-86a2-b9ad1c335df6" + ] + }, + { + "itemType": "bookSection", + "title": "An agri-food supply chain traceability system for China based on RFID & blockchain technology", + "creators": [ + { + "lastName": "Tian", + "firstName": "Feng", + "creatorType": "author" + }, + { + "lastName": "Yang", + "firstName": "Baojian", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "978-1-5090-2842-9", + "bookTitle": "2016 13th International Conference on Service Systems and Service Management (ICSSSM): June 24-26, 2016, KUST, Kunming, China", + "extra": "Citation Key: Tian.2016\nDOI: 10.1109/ICSSSM.2016.7538424", + "itemID": "3c9fc64a-c430-4733-a4a1-1e9103e4f8fa", + "pages": "1-6", + "place": "Piscataway, NJ", + "publisher": "IEEE", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "26c0c55a-7828-45c1-a29c-f85a34eb8676" + ] + }, + { + "itemType": "bookSection", + "title": "Food safety, a global challenge", + "creators": [ + { + "lastName": "Uyttendaele", + "firstName": "Mieke", + "creatorType": "author" + }, + { + "lastName": "Franz", + "firstName": "Eelco", + "creatorType": "author" + }, + { + "lastName": "Schlüter", + "firstName": "Oliver", + "creatorType": "author" + }, + { + "lastName": "Uyttendaele", + "firstName": "Mieke", + "creatorType": "editor" + }, + { + "lastName": "Franz", + "firstName": "Eelco", + "creatorType": "editor" + }, + { + "lastName": "Schlüter", + "firstName": "Oliver", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "bookTitle": "Food safety", + "extra": "Citation Key: Uyttendaele.2016b\nDOI: 10.3390/ijerph13010067", + "itemID": "d0c8a959-aa18-4a58-a996-96af08a09256", + "pages": "1–6", + "volume": "13", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "Article number: 67", + "tags": [ + "#Notes" + ] + } + ], + "seeAlso": [ + "9735e0ee-c250-4570-b2b9-6388450b3dae" + ] + }, + { + "itemType": "bookSection", + "title": "Food scares: A comprehensive categorisation", + "creators": [ + { + "lastName": "Whitworth", + "firstName": "Elizabeth", + "creatorType": "author" + }, + { + "lastName": "Druckman", + "firstName": "Angela", + "creatorType": "author" + }, + { + "lastName": "Woodward", + "firstName": "Amy", + "creatorType": "author" + }, + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "abstractNote": "Purpose – The purpose of this paper is to describe the development of a comprehensive categorisation of food scares.\r\nDesign/methodology/approach – Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews.\r\nFindings – The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues).\r\nPractical implications – The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies.\r\nOriginality/value – The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.", + "bookTitle": "Food and supply chain integrity", + "extra": "Citation Key: Whitworth.2016\nDOI: 10.1108/BFJ-06-2016-0263", + "itemID": "31cd5301-52f8-4c11-98f8-765ec869a45d", + "pages": "131-142", + "volume": "119", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Classification" + }, + { + "tag": "Consumer risk" + }, + { + "tag": "Contamination" + }, + { + "tag": "Food safety" + }, + { + "tag": "Risk reduction" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "30642deb-def4-40a6-86a2-b9ad1c335df6" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "351d2c56-4a9b-4998-af82-82a1baba0c33" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read until 2018-09-09T22:00:00

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "d0a6dd17-9c45-4865-a6e7-8fe225ff3b32" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Borrow

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "08c4afc4-6416-4b23-8046-dd47c21ccaec" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

ExamineAndAssess

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "f8870bd1-4f3f-4b48-b29b-a7cf3d461475" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "3ab6253b-74b7-4701-9431-acfe6df2d2be" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "6c15fcbf-0980-4849-97de-442e6bfbcdc8" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Update bibliographic information and quotation page numbers until 2018-09-09T22:00:00

\nThis is a preprint article. Update article information and add page numbers for quotations after the article has been published.", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "4b33d12a-af3c-4821-8907-b9263bb8ee7f" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "7d50376a-ef59-4b6a-804f-79e6880ebd42" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "f16b35ce-1d93-423c-909a-61d0d5f693f8" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "0ef4b577-f9c6-43b5-abfa-5d05ba8664a1" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Look up

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "0ef4b577-f9c6-43b5-abfa-5d05ba8664a1" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "d0abc9c9-e230-4a30-ac87-7847e7fa0789" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Borrow

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "24cba909-5cee-4d53-ae8c-95938ad33f89" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "92976b82-1442-47c0-a23d-dd1a0178ce0c" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Borrow

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "5c99255f-527b-4ab4-a482-10c4441d08f0" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

GoThroughBibliography

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "736d8366-00c0-4f5d-a982-4b24d6e27b3a" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "9208b9de-7f60-485f-92fb-5b2ce71e2d8d" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

ExamineAndAssess

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

\nCheck how legal sources should be cited.", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "6934fac0-8c0a-469d-90ce-0412ba7d9a87" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

ExamineAndAssess

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "3c651c48-0dd6-4a47-b02d-13a6a80b1c2b" + ] + } + ] + }, + { + "type": "import", + "input": "\n\n \n \n \n \n \n \n Auto\n Scholarly sources\n e3964141-fa83-4d92-82c6-0453310b3c2f\n Single\n Groups\n False\n \n \n Auto\n Popular sources\n 57bc5c84-2b57-47b1-9b2e-c908a3b63069\n Single\n Groups\n False\n \n \n Auto\n Gray literature\n bc1857c0-304b-402f-a245-0f13d36455e9\n Single\n Groups\n False\n \n \n Auto\n Legal sources\n 85dfca94-4bd0-4fa9-990d-dc7d0db21b4d\n Single\n Groups\n False\n \n \n Auto\n Background info - not for citation!\n 16ae8ae8-1941-49df-8426-267e4b6b7ce4\n Single\n Groups\n True\n \n \n My bibliography grouping\n \n Bottom\n False\n \n \n \n \n \n Online Sources\n Manual\n \"Online address\": * OR \"DOI\": *\n Single\n SavedSearches\n \n false\n false\n true\n \"Online address\": * OR \"DOI\": *\n \"Online address\": * OR \"DOI\": *\n \n False\n \n \n Printed and online sources\n \n Printed Sources\n Top\n False\n \n \n \n \n \n \n Text\n \n None\n CustomField1\n \n \n Text\n \n None\n CustomField2\n \n \n Text\n \n None\n CustomField3\n \n \n Text\n \n None\n CustomField4\n \n \n Text\n \n None\n CustomField5\n \n \n Text\n \n None\n CustomField6\n \n \n Text\n \n None\n CustomField7\n \n \n Text\n \n None\n CustomField8\n \n \n Text\n \n None\n CustomField9\n \n \n \n true\n 10.10.2024 14:12:10\n \n \n false\n false\n true\n \"Online address\": * OR \"DOI\": *\n \"Online address\": * OR \"DOI\": *\n \n \n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33\n true\n \n \n AuthorsOrEditorsOrOrganizations\n Ascending\n \n \n YearResolved\n Ascending\n \n \n Title\n Ascending\n \n \n Volume\n Ascending\n \n \n Number\n Ascending\n \n \n \n \n AuthorsOrEditorsOrOrganizations\n Ascending\n \n \n YearResolved\n Ascending\n \n \n Title\n Ascending\n \n \n Volume\n Ascending\n \n \n Number\n Ascending\n \n \n \n \n \n _Jane Doe\n 2017-05-22T14:49:08\n _Jane Doe\n 2017-05-22T14:49:08\n Introduction\n [\"ab2b0374-5038-49d1-92d8-72db6c13c981\"]\n \n \n _Jane Doe\n 2017-05-23T08:15:46\n _Jane Doe\n 2017-05-23T08:15:46\n Definitions and background\n [\"97a37477-c3e0-4f5a-8d28-931af375ac32\"]\n \n \n _Jane Doe\n 2017-05-29T16:19:21\n _Jane Doe\n 2017-05-29T16:19:21\n Definitions\n [\"616baeb5-fc07-4650-a893-808577bd04d0\"]\n \n \n _Jane Doe\n 2017-05-29T16:19:48\n _Jane Doe\n 2017-05-29T16:19:48\n Emerging study of food fraud\n [\"fed63096-6f13-468a-bb08-bf1568fe5b26\"]\n \n \n _Jane Doe\n 2017-05-23T11:45:37\n _Jane Doe\n 2017-05-23T11:45:37\n Cases of food fraud\n [\"8330fd24-5438-4269-b769-6ca54e71d9fe\"]\n \n \n _Jane Doe\n 2017-05-23T11:45:45\n _Jane Doe\n 2017-05-23T11:45:45\n Food fraud in history\n [\"e292f0d0-ca54-4db9-81b8-36c9c1830e2e\"]\n \n \n _Jane Doe\n 2017-05-29T08:01:37\n _Jane Doe\n 2017-05-29T08:01:37\n Foods most susceptible to fraud\n [\"acb05fe1-e509-4def-aa3c-6763a81fde48\"]\n \n \n _Jane Doe\n 2017-05-23T10:35:01\n _Jane Doe\n 2017-05-23T10:35:01\n Recent cases\n [\"bd77bddc-811e-47ea-9d8c-fe7a24c0a1a3\"]\n \n \n _Jane Doe\n 2017-05-29T14:30:35\n _Jane Doe\n 2017-05-29T14:30:35\n Causes of food fraud\n [\"cbc17a1b-e998-480b-81db-ee1c5511d60d\"]\n \n \n _Jane Doe\n 2017-05-29T16:21:29\n _Jane Doe\n 2017-05-29T16:21:29\n Countermeasures\n [\"8c92169d-11fe-4566-a139-93a21369046e\"]\n \n \n _Jane Doe\n 2017-05-29T07:59:16\n _Jane Doe\n 2017-05-29T07:59:16\n Developing World\n [\"9db1e1ef-883b-402b-b359-03b8b435de38\"]\n \n \n _Jane Doe\n 2017-05-29T07:59:25\n _Jane Doe\n 2017-05-29T07:59:25\n Developed World\n [\"04fabbac-8057-428e-8461-107297187542\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:49\n _Jane Doe\n 2017-05-29T08:03:49\n China\n [\"fda524f0-df9c-47f0-9462-5ccfe59b7178\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:17\n _Jane Doe\n 2017-05-29T08:03:17\n Europe\n [\"4b7e3844-06d9-4ec9-a1fc-c9bd4cab37c1\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:23\n _Jane Doe\n 2017-05-29T08:03:23\n United States\n [\"0a83c4d9-f62a-4ffb-8fbb-b4a4eadcb68e\"]\n \n \n _Jane Doe\n 2017-05-29T08:03:54\n _Jane Doe\n 2017-05-29T08:03:54\n India\n [\"86ea4611-c8b5-4634-a57b-92a7f37dac81\"]\n \n \n _Jane Doe\n 2017-05-29T08:04:54\n _Jane Doe\n 2017-05-29T08:04:54\n United Kingdom\n [\"d651fa1a-a4ee-4fbc-b8ea-136487327ce5\"]\n \n \n _Jane Doe\n 2017-05-29T08:06:44\n _Jane Doe\n 2017-05-29T08:06:44\n Asia\n [\"c888bd70-641b-49fd-a3dc-3f35a709c9d0\"]\n \n \n _Jane Doe\n 2017-05-29T08:34:53\n _Jane Doe\n 2017-05-29T08:34:53\n Australia and New Zealand\n [\"d071a807-f42c-43ae-9e5e-4925f7d911fc\"]\n \n \n _Jane Doe\n 2017-05-23T11:51:43\n _Jane Doe\n 2017-05-23T11:51:43\n International measures\n [\"25a2fda9-f4b9-415c-9dde-605993432e90\"]\n \n \n _Jane Doe\n 2017-05-23T11:51:54\n _Jane Doe\n 2017-05-23T11:51:54\n National and regional measures\n [\"2680063b-5f91-438d-8534-e254a0ae2f6b\"]\n \n \n _Jane Doe\n 2017-05-23T11:52:07\n _Jane Doe\n 2017-05-23T11:52:07\n Industry measures\n [\"dcf798eb-58ff-4ac6-86b8-4ae7b4a9bbe5\"]\n \n \n _Jane Doe\n 2017-05-23T13:26:47\n _Jane Doe\n 2017-05-23T13:26:47\n Thin layer chromatography (TLC)\n [\"23b9f08b-9607-4255-bce4-8459f1359b0e\"]\n \n \n _Jane Doe\n 2017-05-23T13:27:02\n _Jane Doe\n 2017-05-23T13:27:02\n High-performance liquid chromatography (HPLC)\n [\"1fc372cc-4824-491a-8cc5-66878eae204f\"]\n \n \n _Jane Doe\n 2017-05-23T13:27:27\n _Jane Doe\n 2017-05-23T13:27:27\n Gas chromatography (GC)\n [\"82d927da-bb5b-425a-ba8b-1dca403680b9\"]\n \n \n _Jane Doe\n 2017-05-23T13:28:13\n _Jane Doe\n 2017-05-23T13:28:13\n Infared techniques\n [\"935d50a7-7543-4c63-9113-4f571afa22e4\"]\n \n \n _Jane Doe\n 2017-05-23T13:28:47\n _Jane Doe\n 2017-05-23T13:28:47\n Nuclear magnetic resonance (NMR)\n [\"9958eaff-f5a4-4389-bd49-cf42215796e2\"]\n \n \n _Jane Doe\n 2017-05-23T11:55:39\n _Jane Doe\n 2017-05-23T11:55:39\n DNA methods\n [\"950edbd4-7eba-4611-bbd7-43b7c8d1a228\"]\n \n \n _Jane Doe\n 2017-05-23T13:16:39\n _Jane Doe\n 2017-05-23T13:16:39\n Sensory methods\n [\"9d2d84f2-15af-4e07-a368-67e05698d57c\"]\n \n \n _Jane Doe\n 2017-05-23T13:16:52\n _Jane Doe\n 2017-05-23T13:16:52\n Chemometric methods\n [\"54edd26a-6a21-4ff2-8e87-51e15e27433e\"]\n \n \n _Jane Doe\n 2017-05-23T13:30:22\n _Jane Doe\n 2017-05-23T13:30:22\n Mass spectrometry (MS)\n [\"ad1969a0-9047-45d4-b015-599b83f5b6c3\"]\n \n \n _Jane Doe\n 2017-05-23T13:17:10\n _Jane Doe\n 2017-05-23T13:17:10\n Chromatographic analysis\n [\"57b553db-6322-4e4a-bf1b-1460fc8ebae6\"]\n \n \n _Jane Doe\n 2017-05-23T13:17:24\n _Jane Doe\n 2017-05-23T13:17:24\n Spectroscopic methods\n [\"48fffc9e-9445-4740-bd1b-1cb63ad08a70\"]\n \n \n _Jane Doe\n 2017-05-23T11:55:26\n _Jane Doe\n 2017-05-23T11:55:26\n Screening technology\n [\"2d01172e-8e96-4fb9-90f0-457bf78123c2\"]\n \n \n _Jane Doe\n 2017-05-23T13:22:42\n _Jane Doe\n 2017-05-23T13:22:42\n Risk analysis\n [\"358184f0-e435-47a2-9c0f-5c5e9d6f6e4a\"]\n \n \n _Jane Doe\n 2017-05-23T13:22:49\n _Jane Doe\n 2017-05-23T13:22:49\n Vulnerability assessment\n [\"f298a2cc-30b1-4b97-9067-9e19333b4e35\"]\n \n \n _Jane Doe\n 2017-05-23T11:52:36\n _Jane Doe\n 2017-05-23T11:52:36\n Company guidelines and best practices\n [\"b2a9de22-c5a7-4ca8-a9fc-c855a6e3bfe2\"]\n \n \n _Jane Doe\n 2017-05-23T11:52:54\n _Jane Doe\n 2017-05-23T11:52:54\n Consumer guidelines and best practices\n [\"7577c43a-a95e-45d7-a8a3-4d8e57a18354\"]\n \n \n _Jane Doe\n 2017-05-23T11:56:06\n _Jane Doe\n 2017-05-23T11:56:06\n Blockchain\n [\"5531afd2-dd84-4ef9-88dc-434303383325\"]\n \n \n _Jane Doe\n 2017-05-29T16:34:25\n _Jane Doe\n 2017-05-29T16:34:25\n Digital mass serialization\n [\"2440fe0b-b001-4171-95d3-2b3766aece4f\"]\n \n \n _Jane Doe\n 2017-05-24T11:35:04\n _Jane Doe\n 2017-05-24T11:35:04\n RFID\n [\"ff6fea97-8ac1-40f8-b055-60d1e2c5f5b6\"]\n \n \n _Jane Doe\n 2017-05-23T11:51:22\n _Jane Doe\n 2017-05-23T11:51:22\n Regulation\n [\"3106342c-71e8-40fc-a09a-972776cfc837\"]\n \n \n _Jane Doe\n 2017-05-29T16:22:07\n _Jane Doe\n 2017-05-29T16:22:07\n Enforcement\n [\"fdcc7198-eba6-4b37-b2ba-56e26fe389b2\"]\n \n \n _Jane Doe\n 2017-05-23T11:54:20\n _Jane Doe\n 2017-05-23T11:54:20\n Prevention\n [\"181f8bad-e984-4da5-b30e-f3faf6678cf9\"]\n \n \n _Jane Doe\n 2017-05-23T11:53:12\n _Jane Doe\n 2017-05-23T11:53:12\n Improving supply chain transparency\n [\"1bc869d4-92c6-4b63-8dea-179397392230\"]\n \n \n _Jane Doe\n 2017-05-23T11:47:27\n _Jane Doe\n 2017-05-23T11:47:27\n Conclusion\n [\"e57f8bfe-f42d-40ad-95ca-ef17ed09d603\"]\n \n \n \n 00000000-0000-0000-0000-000000000000;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;fab7624c-e13e-4fc5-9991-758d7e0fdbf6;a83e3adf-a16b-4864-82ef-0efc1dbaa236;0a74c8cc-cda1-4336-869f-5e5f518273d7;4a05cca9-2d0d-4ea5-8440-5a09c4f40249\n 3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;92c35cb6-0cf5-4949-804a-1d31fbcfbd06;8b2dd3a7-2643-425a-9009-4e63647ea860\n fab7624c-e13e-4fc5-9991-758d7e0fdbf6;ac5840bd-bca9-4faa-be65-b59301e55ff1;c8122f49-7dc9-49e0-8919-eefad7f416a9;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 0a74c8cc-cda1-4336-869f-5e5f518273d7;73aa7410-7c17-4acc-83af-249657be15e6;09e0c3fd-e4d7-4edc-9481-ab654bd25b81;145b6eba-876a-46a4-b946-75ddf0389eda;adbb0c87-4c1c-4156-844b-3bb40145b49a\n fc506b83-b591-4183-b9a9-0041d2242545;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 721654e5-7ac1-42ac-9c9c-69111c7e8b90;f1ba83e7-fdda-4bb8-bbe1-e84af8112dfa;190d402f-4513-4442-ab76-155be2ce8db8\n 22387b25-e632-4404-9270-2df1ce7f461c;9ce92a38-44f1-48c4-b1d7-36b74f0836a7;6aaba073-4a78-4cfc-b277-a12ecde05560;b8337610-de37-46a2-bf81-82bc5053255d;d3100956-91ed-4965-ac76-7b66f51d147a;fc506b83-b591-4183-b9a9-0041d2242545;4afcfa69-74cc-4a95-8aba-4a6aadaf59c5\n b03947cc-d2ec-4f99-886e-aab560749d35;55b0134d-a7ca-4853-89fe-1cabd07ed9aa;443ad9c4-cc2b-42f4-a4d6-16d0c8d40614;082d3154-9484-4992-999d-b9c93343d0cb\n 1903e642-0108-4c7c-91e3-7219833a5e54;62e9b05b-6763-4591-8136-899f33bdce7e;4fae714d-c9dc-4759-954e-e4e195f9d20d\n a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d;530cb647-c5aa-46b6-bb8f-d49dab51a26a;99056660-3ef1-45cf-8d39-6e9d8151d848;c5730108-95c7-4468-a834-88a85d582130;a5607a6f-cc37-4e62-968b-bb5deada2317;b03947cc-d2ec-4f99-886e-aab560749d35;1903e642-0108-4c7c-91e3-7219833a5e54\n 4bbd6753-30f2-4e3b-9e32-3c65b5037589;ddb219dd-dfc6-4f0b-b61b-cf5c1b179ae5;3ff07eeb-a959-41de-bab6-c3945d6f0f35\n 73aa7410-7c17-4acc-83af-249657be15e6;721654e5-7ac1-42ac-9c9c-69111c7e8b90;22387b25-e632-4404-9270-2df1ce7f461c;fb23b54d-bb22-492a-b6a3-a60a2a1288f3\n 09e0c3fd-e4d7-4edc-9481-ab654bd25b81;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d\n 145b6eba-876a-46a4-b946-75ddf0389eda;4bbd6753-30f2-4e3b-9e32-3c65b5037589;fabfd984-d738-4459-8a45-1699b4959a4c\n adbb0c87-4c1c-4156-844b-3bb40145b49a;de4970f8-9818-44d8-88cc-53d9ad4885a3;7c3bf245-d473-41fa-952c-22ccb3bf3f8e;55496d4d-9f92-44aa-89ce-3b30e5c437d7\n \n \n \n _Jane Doe\n 2017-05-29T15:57:06\n _Jane Doe\n 2017-05-29T15:57:06\n 1\n Background info - not for citation!\n Popular sources used for learning more about the topic that should not be cited.\n background info - not for citation!\n 6997c8d11d3c3e836499011437f68be5ccef3034\n \n \n _Jane Doe\n 2017-05-29T16:04:36\n _Jane Doe\n 2017-05-29T16:04:36\n 1\n Gray literature\n gray literature\n 02046038ad4995a0540bf3b60c009333865403f9\n \n \n _Jane Doe\n 2017-05-29T16:02:51\n _Jane Doe\n 2017-05-29T16:02:51\n 1\n Legal sources\n legal sources\n 3db4c33d42ca7d002cb2071ec75335f4d42ac390\n \n \n _Jane Doe\n 2017-05-29T15:58:16\n _Jane Doe\n 2017-05-29T15:58:16\n 1\n Popular sources\n News articles, social media posts, blog posts, podcasts, etc.\n popular sources\n f40a12e3e6684284bdd26ca1204fa6fca2a58444\n \n \n _Jane Doe\n 2017-05-29T15:59:09\n _Jane Doe\n 2017-05-29T15:59:09\n 1\n Scholarly sources\n Sources that have undergone peer review\n scholarly sources\n 3854569f7c4de9fdd72dda7b742df98e829daa98\n \n \n \n \n _Jane Doe\n 2017-05-23T15:28:57\n _Jane Doe\n 2017-05-23T15:28:57\n Adulteration\n false\n adulteration\n d524ee69450d46d228f60852c6860a65bc5960f2\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Artificial foods\n false\n artificial foods\n 8c730a3de9791d3c24558dac7dc223b72f1314f8\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Asia\n true\n asia\n ad5e672b03149688034bd2a80a9f3c7e64c3c174\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Blockchain\n false\n blockchain\n 32aebb064157bdba70224d9022fca19728cdc19f\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Cattle genetics\n true\n cattle genetics\n ccb780d8c3c22c1b7024d2c6eb5c20ff64eaae25\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n China\n false\n china\n 830861a7be146b54573618ab59d51536353969c4\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Classification\n false\n classification\n dda2c3ad13cd236589f3a85743cbe6ed90df0e2c\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Coffee\n true\n coffee\n 8ef35c4b0cfec47df0fd84a376c9f2525209fe6e\n \n \n _Jane Doe\n 2017-05-29T15:16:24\n _Jane Doe\n 2017-05-29T15:16:24\n Companies\n false\n companies\n e1291fdba457a9b6af0537da53d024641f4b2e20\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Computer networks\n false\n computer networks\n 8388a36f48fa0c6e23f066c59a578818259877d2\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Consumer education\n false\n consumer education\n 111a7cad35c44ed0cf94a074a743a0d97e1e3a02\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Consumer product safety\n true\n consumer product safety\n e63487aaf68038d2d17358157817ecd06a2edede\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Consumer risk\n false\n consumer risk\n 0dadc2a60ab569d90580fc5c64199336a9eb4172\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Contamination\n false\n contamination\n 32c61ee4d8b70a5f98a2d9529d7041be313f8029\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Crime\n false\n crime\n cd7b553da774ad81d8c60df89304d3aaa00b6f1d\n \n \n _Jane Doe\n 2017-05-29T15:13:03\n _Jane Doe\n 2017-05-29T15:13:03\n Crime vulnerability\n true\n crime vulnerability\n c880827928ee3e9ce3942db7f6f909193754d643\n \n \n _Jane Doe\n 2017-05-29T15:02:26\n _Jane Doe\n 2017-05-29T15:02:26\n Digital mass serialization\n false\n digital mass serialization\n 47a7e6bd04591b15bc13f3a31ab9cfb4a101a12e\n \n \n _Jane Doe\n 2017-05-29T15:20:11\n _Jane Doe\n 2017-05-29T15:20:11\n Direct Food Fraud Risk\n false\n direct food fraud risk\n f2045dee0c4d8e4fed7091fa0e99b855cbaff2e1\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n DNA Barcoding\n true\n dna barcoding\n 808ddcb60b964dcb43f7570b35c1df21a3073dd7\n \n \n _Jane Doe\n 2017-05-29T15:14:53\n _Jane Doe\n 2017-05-29T15:14:53\n Egg Adulteration\n false\n egg adulteration\n 3939d0895141e49c998e7513b28b9aacb4932dbf\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Electron scanning microscopy\n true\n electron scanning microscopy\n 45b4964bf3470d4a7e10b54f5c4dcd0420d2a396\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Europe\n false\n europe\n da48050821dc673bb44a3b0d7c9271712f8a1505\n \n \n _Jane Doe\n 2017-05-29T15:07:14\n _Jane Doe\n 2017-05-29T15:07:14\n Factors\n false\n factors\n 8dc56a365792c42231a96b230b8ab4a02399dff4\n \n \n _Jane Doe\n 2017-05-29T15:14:09\n _Jane Doe\n 2017-05-29T15:14:09\n FAO\n false\n fao\n 93a14737486bc24923fba150ef057a178d56d038\n \n \n _Jane Doe\n 2017-05-29T15:10:33\n _Jane Doe\n 2017-05-29T15:10:33\n Fiction\n false\n fiction\n 08737e7dee9e1771ff394626ad5254647828a207\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Fishery products\n false\n fishery products\n b966e34e97386b6b92c52292271e0392b0f82e68\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Food additives\n true\n food additives\n b41e1accde8b0abd92716e382f054afaee4a122a\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Food adulteration and inspection\n true\n food adulteration and inspection\n 044ed2f9af12bb172155f2fd19f16744b9ccc954\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Food and drink industry\n true\n food and drink industry\n 95b80bd04586170ebf7c0884e33b89c1c86d063d\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Food contamination\n true\n food contamination\n 228bc01bb125b5e3761a255582ffb83734f1c759\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Food contamination analysis\n true\n food contamination analysis\n 2513df73a5aba75ab66ab160d6195bbe31f527eb\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Food contamination prevention and control\n true\n food contamination prevention and control\n 636a1fcf6f96ac04c4fdc1a4e5efec780f8512b5\n \n \n _Jane Doe\n 2017-05-29T15:07:41\n _Jane Doe\n 2017-05-29T15:07:41\n Food crime\n true\n food crime\n e99650e7eedfa9108a509460d68d6c7388da49cb\n \n \n _Jane Doe\n 2017-05-23T15:28:57\n _Jane Doe\n 2017-05-23T15:28:57\n Food defense\n true\n food defense\n f09fecc48879dffeac8b2dd92c017d846ffa4452\n \n \n _Jane Doe\n 2017-05-29T15:07:41\n _Jane Doe\n 2017-05-29T15:07:41\n Food fraud\n true\n food fraud\n c0da59c9845a76348f2d4c18fe0f71718140eb9e\n \n \n _Jane Doe\n 2017-05-29T14:59:31\n _Jane Doe\n 2017-05-29T14:59:31\n Food Fraud Network (FFN)\n true\n food fraud network (ffn)\n afb4041a86fc31fc46c9114a7796c5e801b7c932\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Food industry and trade\n true\n food industry and trade\n a07882f001b381b14ddb523bfb8b0d004d629be5\n \n \n _Jane Doe\n 2017-05-22T08:08:45\n _Jane Doe\n 2017-05-22T08:08:45\n Food industry legislation and jurisprudence\n true\n food industry legislation and jurisprudence\n bfdc2c96f9b605c9f9316fdb2083ae4748c2cf6d\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Food quality\n true\n food quality\n c0bc8ec3ba6920a7eb8fb25a499ec49355465a94\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Food safety\n true\n food safety\n 1c749e13abfbddc73a210dcfe6f76a04d5dd5f2e\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Food safety methods\n true\n food safety methods\n 6cec3f7022b4ab110db0d556418bc6481ebbc9cd\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Food science\n false\n food science\n 5f66148cf3287371cec39b052444cac040385029\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Food security\n false\n food security\n 3fe9ad9c2d6f88349bbb124ff5c1e5283d18886d\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Food substitutes\n false\n food substitutes\n 444dfe30a9c02f132541ae4cb6e703782280db5c\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Fraud\n false\n fraud\n 366e620a8ed87fcc3df0157648a1e2c7c15b633e\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Fraud prevention and control\n true\n fraud prevention and control\n d3925bbcd8d544c29e9192ac4ded7e3c826d8927\n \n \n _Jane Doe\n 2017-05-29T15:14:09\n _Jane Doe\n 2017-05-29T15:14:09\n FSIS\n false\n fsis\n 5af327e54eed3c8dfa62deea665533c79283c59f\n \n \n _Jane Doe\n 2017-05-29T14:39:52\n _Jane Doe\n 2017-05-29T14:39:52\n GFSI\n true\n gfsi\n cb6791ac604715f3ee0b8b991c12ae98a766825e\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Government policy\n false\n government policy\n 02af1cf38c1ea511f3ac2bfb618f3546c45b546e\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Hazard analysis and critical control points\n true\n hazard analysis and critical control points\n f3a186e0a2caf968ef928d886ea201e526782d2c\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Horsemeat scandal\n false\n horsemeat scandal\n 3be91ab16df7e0201fd401f1414c0128116452cb\n \n \n _Jane Doe\n 2017-05-22T08:00:50\n _Jane Doe\n 2017-05-22T08:00:50\n Humans\n false\n humans\n 2d65c873e8358f70a20600b351326a3e77ffd1e7\n \n \n _Jane Doe\n 2017-05-29T15:20:18\n _Jane Doe\n 2017-05-29T15:20:18\n Indirect food fraud risk\n true\n indirect food fraud risk\n c88aa235d05d42eca76c289dc7eb2823d0fa14c5\n \n \n _Jane Doe\n 2017-05-29T15:15:20\n _Jane Doe\n 2017-05-29T15:15:20\n Intentional food fraud\n true\n intentional food fraud\n 46e106ec5d8259e1c29489903e4f346fb933fd83\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n International trade\n false\n international trade\n 6045a5734134c31ddc24766470d2e813e5d8c011\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Ireland\n false\n ireland\n 1575b3f97b84b925c8bb047f977c7bb7dff78ee4\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Jakarta\n false\n jakarta\n 05cb36037c6c4f9bd094f6f8cb4e811e19ee4def\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Language\n false\n language\n cc1f7052057a1ec518e41f548aa4c5a4ba47c59d\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Law and legislation\n false\n law and legislation\n 9577132e54fe39726e348d67e108a8777929233c\n \n \n _Jane Doe\n 2017-05-22T08:06:43\n _Jane Doe\n 2017-05-22T08:06:43\n Legislation\n true\n legislation\n e7a6dde2d7af6c6c9d3c03f1db27d00977c20708\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Linux Foundation Hyperledger Project\n false\n linux foundation hyperledger project\n cf36626de791eaa060041ff102d46871fc0b51bb\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Marketing\n false\n marketing\n c67ab0ee866931c94df3abc9602c12a1a051c0b2\n \n \n _Jane Doe\n 2017-05-29T15:08:45\n _Jane Doe\n 2017-05-29T15:08:45\n Mass spectrometry (MS)\n true\n mass spectrometry (ms)\n ee1856295a7a7c26f4fbdc53d7f504832a03a054\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Meat\n false\n meat\n 1e9839371988f246a9f9a992ca6025877654e4aa\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Nutrition\n false\n nutrition\n f2a1984945697f62c6e893304fcb13415e775ac8\n \n \n _Jane Doe\n 2017-05-29T15:04:51\n _Jane Doe\n 2017-05-29T15:04:51\n Operation OPSON VI\n false\n operation opson vi\n 489c794f6378b769eb22ab51e974753e65f6f4b2\n \n \n _Jane Doe\n 2017-05-29T15:09:14\n _Jane Doe\n 2017-05-29T15:09:14\n PCR\n false\n pcr\n e10d4dad9bdffc69c850dc22fdaef811c2058bb9\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Preserved food\n true\n preserved food\n 722b11dfd4f0aee62cb1b87c9e2cf0bc9abb6065\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Prevention\n false\n prevention\n 81273c488e09bcee1fd1036bc3453a7ddee7b8ef\n \n \n _Jane Doe\n 2017-05-29T15:13:32\n _Jane Doe\n 2017-05-29T15:13:32\n Psychology\n false\n psychology\n 70cb2b28c474188d0666600577d55597ec2fd815\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Public Health\n false\n public health\n ca27a461fb9b52c7c4a3b3cdc38acaea2e4440a7\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Quality\n false\n quality\n c5f2406640f4f08577b3adfe0b94ddc1b821f406\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Republic of Korea\n false\n republic of korea\n 49dbef98c7004d4e3bc82a16da32c2284e8b3965\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Risk Assessment\n false\n risk assessment\n 2faaead91a77e94890e2f8800f553180f30b870a\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Risk Factors\n false\n risk factors\n b42bc3ec203ea6ff2bbbbe19ef17995182cfb1c9\n \n \n _Jane Doe\n 2017-05-24T12:33:20\n _Jane Doe\n 2017-05-24T12:33:20\n Risk reduction\n false\n risk reduction\n cfa94db9c436e1867b169ca64bf6612ece57805b\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n RNA\n true\n rna\n 1b8249f6e9cb15de19b38833f42bfe495cd3e044\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Russia\n false\n russia\n c03221708b5e1a8450f7a8e5cd33589dc3ad5239\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Safer food\n true\n safer food\n 0f72f13b7656c3ba7680b81fb3d7c8524c9d4212\n \n \n _Jane Doe\n 2017-05-29T15:17:46\n _Jane Doe\n 2017-05-29T15:17:46\n Screening\n false\n screening\n 358ef8c946dd65065f1098bb8c1e2c3658af5b06\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Service industries\n false\n service industries\n 1c7979286d4b5c026b95b1da038f18b210898cc2\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Singapore\n false\n singapore\n 9e8646e8a516de51eee2271060a7e01296268001\n \n \n _Jane Doe\n 2017-05-29T15:03:44\n _Jane Doe\n 2017-05-29T15:03:44\n Statistics\n false\n statistics\n 52e769de1d8d2e1ceff5784a064ce04a2bf49a46\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Supermarkets\n false\n supermarkets\n 0e0fe1493c9a2b206d123ac574d3cbe543df8d7f\n \n \n _Jane Doe\n 2017-05-29T15:01:36\n _Jane Doe\n 2017-05-29T15:01:36\n Supply chain\n true\n supply chain\n 05580aa7510cc9bd11176e4f52ab8836c69d3656\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Systems engineering\n false\n systems engineering\n 81a49a87b65957c1d44154b589bd5633f6929fa3\n \n \n _Jane Doe\n 2017-05-29T15:20:27\n _Jane Doe\n 2017-05-29T15:20:27\n Technical food fraud risk\n true\n technical food fraud risk\n 20ea68cb39e61c89f95dde1326d4f1e9bb8730a4\n \n \n _Jane Doe\n 2017-05-22T08:06:30\n _Jane Doe\n 2017-05-22T08:06:30\n Terrorism\n false\n terrorism\n f5782a45f8281317be2edfdf0b8944233fa23234\n \n \n _Jane Doe\n 2017-05-22T08:08:45\n _Jane Doe\n 2017-05-22T08:08:45\n Terrorism prevention and control\n true\n terrorism prevention and control\n 9cdfbbdd56b7adcdac8ddc158797a0664c9db623\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n The meat industry\n true\n the meat industry\n f380befc2aec2ea6ded79a197d5945a1b58b42c6\n \n \n _Jane Doe\n 2017-05-23T15:24:24\n _Jane Doe\n 2017-05-23T15:24:24\n Todd, Sweeney (legendary character)\n true\n todd, sweeney (legendary character)\n 040fa436e2fe7f080f810bba8efe55b81e2ac37a\n \n \n _Jane Doe\n 2017-05-22T07:56:38\n _Jane Doe\n 2017-05-22T07:56:38\n Tokyo\n false\n tokyo\n c29f5f80e80081780e440672e8d904c67738e71f\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Tsinghua University\n false\n tsinghua university\n 59b1bf4e20d388770dc03f9b462002bf67c2f5a1\n \n \n _Jane Doe\n 2017-05-29T15:15:20\n _Jane Doe\n 2017-05-29T15:15:20\n Unintentional food fraud\n true\n unintentional food fraud\n 7646b4c6210f73559838c3ff7c140cdd898ff2df\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n United Kingdom\n true\n united kingdom\n 96220982e731d3a94ac92b6b57b2f773a853eba5\n \n \n _Jane Doe\n 2017-05-22T08:00:50\n _Jane Doe\n 2017-05-22T08:00:50\n United States\n false\n united states\n 9fb68c67959913c15f7214c815d8a259a0a025a9\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jane Doe\n 2017-05-23T09:58:56\n Walmart Food Safety Collaboration Center\n false\n walmart food safety collaboration center\n f04dd2fd8c59e3adfe9937bea5d4f63fe5860b6f\n \n \n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n British Library\n 1\n british library\n 82c54085fee7651c9c000e85b094413b864801af\n \n \n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n 2223-9944\n Academic Research International\n 0\n true\n arint. (academic research international)\n ARInt.\n ARInt\n 8d7a72db1eb7b78dd0ac852e2362a3d72ea43a6d\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n 1471-2458\n BMC Public Health\n 0\n true\n bmc public health (bmc public health)\n BMC Public Health\n BMC Public Health\n 6c989d88ea22950543da5756f3eb009e93e016aa\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n 0959-535X\n British Medical Journal\n (Clinical research ed.)\n 0\n true\n bmj (british medical journal)\n BMJ\n BMJ\n 124000ae92a56abbb1add5392842bc552b7178c8\n \n \n _Jane Doe\n 2017-05-22T08:26:26\n _Jane Doe\n 2017-05-22T08:26:26\n British Food Journal\n 0\n true\n brit. food j. (british food journal)\n Brit. Food J.\n Brit Food J\n 59c2df569a730e5fecec504ccc58f62ef7600be0\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n 1040-8347\n Critical Reviews in Analytical Chemistry\n 0\n true\n crit. rev. anal. chem. (critical reviews in analytical chemistry)\n Crit. Rev. Anal. Chem.\n Crit Rev Anal Chem\n a95fdbc699498473dd785df684830d035a3bfc3b\n \n \n _Jane Doe\n 2017-05-22T08:08:45\n _Jane Doe\n 2017-05-22T08:08:45\n 0097-6326\n Federal register\n 0\n true\n fed. regist. (federal register)\n Fed. Regist.\n Fed Regist\n 2214b87c7b2192ebb2c8f745f2b5aa6ed7af31cd\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n 0308-8146\n Food chemistry\n 0\n true\n food chem. (food chemistry)\n Food Chem.\n Food Chem\n cad4f77606b5a93e17d6a11933e0d30a9816fe37\n \n \n _Jane Doe\n 2017-05-24T11:30:01\n _Jane Doe\n 2017-05-24T11:30:01\n Food Industry Executive\n 0\n true\n food indust. exec. (food industry executive)\n Food Indust. Exec.\n Food Industry Executive\n 8521e3d71c77efcc1ea926fdbb5838316ddd4b30\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n 2304-8158\n Foods\n Foods (Basel, Switzerland)\n 0\n true\n foods\n 6576d4250f14ada5e5da82b762a256afcc075507\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n 0263-5577\n Industrial Management & Data Systems\n 0\n true\n ind. manage. data syst. (industrial management & data systems)\n Ind. Manage. Data Syst.\n Ind Manage Data Syst\n 6c4ae90f21952e292dd37321e5fdf34dfc7616a2\n \n \n _Jane Doe\n 2017-05-22T12:36:41\n _Jane Doe\n 2017-05-22T12:36:41\n International Journal of Environmental Research and Public Health\n 0\n true\n int. j. env. res. pub. he. (international journal of environmental research and public health)\n Int. J. Env. Res. Pub. He.\n Int J Env Res Pub He\n c3aa2ff8be1177a53ebcd7e3522642d24d82688c\n \n \n _Jane Doe\n 2017-05-22T08:22:13\n _Jane Doe\n 2017-05-22T08:22:13\n 1752-0401\n The Journal of Asian Studies\n 0\n true\n j. asian stud. (the journal of asian studies)\n J. Asian Stud.\n J Asian Stud\n c23562cd0fe4846dbc1fd5102bb135f88ac7553c\n \n \n _Jane Doe\n 2017-05-22T08:24:49\n _Jane Doe\n 2017-05-22T08:24:49\n 1459-0255\n Journal of Food Agriculture and Environment\n 0\n true\n j. food agric. environ. (journal of food agriculture and environment)\n J. Food Agric. Environ.\n J Food Agric Environ\n bd2ff86d80158e229c236f1892f159cb2ab480fd\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n 0022-1147\n Journal of food science\n 0\n true\n j. food sci. (journal of food science)\n J. Food Sci.\n J Food Sci\n b237d086473f3deb700eea79280b54cfaf689f54\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n 0022-5142\n Journal of the Science of Food and Agriculture\n 0\n true\n j. sci. food agric. (journal of the science of food and agriculture)\n J. Sci. Food Agric.\n J Sci Food Agric\n 1bf7217e10c8eea99fcfae586bc4704b7a417eb7\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n 1674-7305\n Science China. Life sciences\n 0\n true\n sci. china life sci. (science china. life sciences)\n Sci. China Life Sci.\n Sci China Life Sci\n 94d1862560db3827f020991d726974198a5be0ec\n \n \n _Jane Doe\n 2017-09-27T10:09:59\n _Jane Doe\n 2017-09-27T10:09:59\n Tech in Asia\n 0\n false\n tech in asia\n d0f4f353e26d4ddaf4075d82ad7d225dd99de0e6\n \n \n _Jane Doe\n 2017-05-23T15:07:44\n _Jane Doe\n 2017-05-23T15:07:44\n The Guardian\n 0\n true\n the guardian\n e4aaaeb5be9e1cb4eff82754b2b104e1638fe6a4\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n 09242244\n Trends in Food Science & Technology\n 0\n true\n trends food sci. tech. (trends in food science & technology)\n Trends Food Sci. Tech.\n Trends Food Sci Tech\n 60e8e832a30a1fefe2ece1c80930da108c504dd2\n \n \n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n Emmanuel\n Agbaraji\n Chuks\n true\n 2\n agbaraji, emmanuel chuks\n bf0469d7bd9d53f83a1f09af993ce48d927c0d0f\n \n \n _Jane Doe\n 2017-08-09T08:25:50\n _Jane Doe\n 2017-08-09T08:25:50\n Ken\n Albala\n false\n 2\n albala, ken\n 5735a153df7a837eb432ba4997a2375d38e105e1\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Martin\n Alewijn\n false\n 2\n alewijn, martin\n a4eddc4f1ca1f14c0e741ec1a009f710b18dd23f\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Aida\n Azmi\n Azrina\n false\n 1\n azmi, aida azrina\n da1e417c69c0c6b2ff40ed9c919820368ccab67e\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Diána\n Bánáti\n true\n 1\n bánáti, diána\n 6e79fadacc818c0cd1b5dde4344690d9606656a6\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Susan\n Barlow\n M.\n false\n 1\n barlow, susan m.\n 4bd1e6c5f78f7f230c5059daaa6553915734c40a\n \n \n _Jane Doe\n 2017-05-24T13:45:58\n _Jane Doe\n 2017-05-24T13:45:58\n BBC Two Scotland\n true\n 3\n bbc two scotland\n c6338d07816dcfbdd36bd8339697d8d9f84f22f5\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Mac\n Bishop\n William\n false\n 2\n bishop, mac william\n 285fe87b3e6b102e66f300f82641a4d49d7a9ca5\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Michail\n Bitzios\n true\n 2\n bitzios, michail\n 2510963c3ec646166951c58340346354d64d26fa\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Rita\n Boerrigter-Eenling\n false\n 1\n boerrigter-eenling, rita\n ccb90b90681ea2ae59f827a4389543c485ba199a\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Alan\n Boobis\n R.\n false\n 2\n boobis, alan r.\n e2c487e23bb6bba596a5f64bd9d3f6f522da0b75\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Jamie\n Bower\n Campbell\n true\n 2\n bower, jamie campbell\n 7d9db321cd7c0c1b43b9c012a5a1a695bd831c02\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Darrell\n Braden\n T.\n false\n 2\n braden, darrell t.\n bd8c25f625826028c7c674df2fd0749c79710db7\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Jim\n Bridges\n false\n 2\n bridges, jim\n 98edb6616db3b8c875c67909eb94499784298d2c\n \n \n _Jane Doe\n 2017-05-23T15:24:24\n _Jane Doe\n 2017-05-23T15:24:24\n Tim\n Burton\n false\n 2\n burton, tim\n 3217fe47d0428f040bb5414904947355dfef8bde\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Michael\n Calnan\n false\n 2\n calnan, michael\n f277f28440381baf89b539f56919b2cf01de11cf\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Helena\n Carter\n Bonham\n false\n 1\n carter, helena bonham\n 7cee36f78941b2a8792f2f4ba566439c3f97ad95\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Iain\n Chambers\n false\n 2\n chambers, iain\n f5e48f9b47a75a83e15d2e4608f98268a0a764db\n \n \n _Jane Doe\n 2017-06-28T10:15:43\n _Jane Doe\n 2017-06-28T10:15:43\n Yaakob\n Che Man\n Bin\n true\n 2\n che man, yaakob bin\n 459234774584d45c034b1b3db2d6e7fd2b7fb95a\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jane Doe\n 2017-05-22T12:10:22\n Junshi\n Chen\n true\n 2\n chen, junshi\n 7c4817e33b72591203075eecf2ea0f2bb18d3d1f\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Hyang\n Chun\n Sook\n true\n 1\n chun, hyang sook\n c5ca8e5fa7de59267abfbda0f0ac449ed11e27aa\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Andrew\n Cockburn\n false\n 2\n cockburn, andrew\n aed0f10214bc9b954af0d283d9e536f3e15ffe63\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Jean\n Codron\n Marie\n true\n 2\n codron, jean marie\n f008088966f8281965e5e0a0779c9d5fec68a44f\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Sacha\n Cohen\n Baron\n true\n 2\n cohen, sacha baron\n 3f5bdb99dcbb0e01dcefc1dd56b3ca2837241840\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n John\n Coveney\n false\n 2\n coveney, john\n 3438a36e000d671148ae503ade483fb67dce7777\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Cong\n Dai\n true\n 2\n dai, cong\n d7fc44c62719b09ae9d4a42c34b44def2ea30204\n \n \n _Jane Doe\n 2017-05-24T11:16:02\n _Jane Doe\n 2017-05-24T11:16:02\n Eoghan\n Daly\n false\n 2\n daly, eoghan\n 5e0c2a6a0843b8ec097294ed05481d8813bb5a79\n \n \n _Jane Doe\n 2017-05-23T14:14:34\n _Jane Doe\n 2017-05-23T14:14:34\n Samir\n Dani\n true\n 2\n dani, samir\n 4000df698ee63e8c984538affbb2fc21eeadd780\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Wolfgang\n Dekant\n false\n 2\n dekant, wolfgang\n 8bda5cbf81c02f99db1001f01e6c08b01b71a48b\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Johnny\n Depp\n false\n 2\n depp, johnny\n 15a47b2b5c25058a7f8f9c8dd2a525b42530e122\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Lisa\n Desai\n false\n 1\n desai, lisa\n fdc808bd8d6500092b49dcdd3d5572e5d5040e62\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n Georgios\n Doukidis\n false\n 2\n doukidis, georgios\n 8d66ae8fa4ecdd8996494a0e64dc6a0e8748425c\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Liesbeth\n Dries\n K. E.\n false\n 1\n dries, liesbeth k. e.\n 751b1385862d0c99aed80da0d6e0bc166c473332\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jane Doe\n 2017-05-24T12:31:04\n Angela\n Druckman\n false\n 1\n druckman, angela\n 4af1152683873f71a35221357299805ad1e9ef90\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Dmitry\n Edelev\n false\n 2\n edelev, dmitry\n a6a07c2fa313913282b66e76a30653d01514269e\n \n \n _Jane Doe\n 2017-06-28T10:26:17\n _Jane Doe\n 2017-06-28T10:26:17\n FFN\n European Commission Food Fraud Network\n true\n 3\n european commission food fraud network (ffn)\n 30df2db645ddbe61191bfe2f332c8f4d3f555fbb\n \n \n _Jane Doe\n 2017-05-23T10:30:23\n _Jane Doe\n 2017-05-23T10:30:23\n Europol\n true\n 3\n europol\n 4d3b991064ae709308c45c8713a67f06f21f67ae\n \n \n _Jane Doe\n 2017-05-24T11:39:43\n _Jane Doe\n 2017-05-24T11:39:43\n Richard\n Evershed\n false\n 2\n evershed, richard\n bcfcba440003cf3e211470192fcd6d9cfa266ca4\n \n \n _Jane Doe\n 2017-05-22T08:06:43\n _Jane Doe\n 2017-05-22T08:06:43\n Karen\n Everstine\n false\n 1\n everstine, karen\n 6277ee54ee685d2bf893e61338d6beef1ec59c2f\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Michael\n Ewing-Chow\n false\n 2\n ewing-chow, michael\n 33f0d152dd630eaa82ad47e5ac14415e93fb898a\n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n Gloria\n Ezeh\n N.\n false\n 1\n ezeh, gloria n.\n a5a34e7dabec05e03a8ee5c351ed558faa77db08\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Long\n Fan\n false\n 2\n fan, long\n 03a4c85bdd377acc5041eda114448036b82ba1cc\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Adriana\n Farah\n false\n 1\n farah, adriana\n 21b95ae6d52a19d9187e0f35678ec9e1cc8c52b5\n \n \n _Jane Doe\n 2017-05-23T14:14:34\n _Jane Doe\n 2017-05-23T14:14:34\n Liam\n Fassam\n true\n 2\n fassam, liam\n 2042b6a587fb7cc162f7eaf568432811df74c62e\n \n \n _Jane Doe\n 2017-05-23T14:17:30\n _Jane Doe\n 2017-05-23T14:17:30\n Emilio\n Ferrari\n true\n 2\n ferrari, emilio\n 5a18becfc2ea05e4a0dc555122b97a1bd22352e1\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Victor\n Fersht\n false\n 2\n fersht, victor\n 5e0ab2915b1cf01d5f567d060322211e2eca6b9c\n \n \n _Jane Doe\n 2017-05-24T13:55:14\n _Jane Doe\n 2017-05-24T13:55:14\n FDA\n Food and Drug Administration\n true\n 3\n food and drug administration (fda)\n 73fd573482016e47f4f236719fd762624a89abbb\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jane Doe\n 2017-05-22T12:34:38\n Eelco\n Franz\n true\n 2\n franz, eelco\n 28f0c2ed8f2c33694ca4ad77c213966c827cc7c3\n \n \n _Jane Doe\n 2017-05-24T11:30:21\n _Jane Doe\n 2017-05-24T11:30:21\n Krista\n Garver\n false\n 1\n garver, krista\n a6b238d9c2d15a75822824519e89af0bbbade7d0\n \n \n _Jane Doe\n 2017-05-23T11:39:28\n _Jane Doe\n 2017-05-23T11:39:28\n GFSI\n Global Food Safety Initiative\n true\n 3\n global food safety initiative (gfsi)\n 07d5a51f3094164a422f94ccba36bdecad7717e1\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Kai\n He\n true\n 2\n he, kai\n 4cd523e44badf966ba160ee72e3578cc82e48c30\n \n \n _Jane Doe\n 2017-05-30T10:39:53\n _Jane Doe\n 2017-05-30T10:39:53\n Craig\n Hedberg\n false\n 2\n hedberg, craig\n db7e6b48a4e76e72c8ec6970aacc7cb57ee52d31\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Julie\n Henderson\n false\n 1\n henderson, julie\n c6d6f3d450588ed7aa2aa1c5df42cc58dd1192cf\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Paul\n Hepburn\n false\n 2\n hepburn, paul\n 1452419cbbdac26f7540be48730a90feb1956818\n \n \n _Jane Doe\n 2017-05-23T14:14:34\n _Jane Doe\n 2017-05-23T14:14:34\n Mils\n Hills\n true\n 2\n hills, mils\n fb06ecc132f7af321211f87b9d549feb37dc6134\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Channon\n Hodge\n true\n 1\n hodge, channon\n caa387e80b013f9db9cb17c92ca6632c0960ffd4\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Eunyoung\n Hong\n true\n 1\n hong, eunyoung\n 6442602cb41594449f83ac1616f1e84b20ce70b0\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Miao\n Hong\n true\n 1\n hong, miao\n 0440a5cda84af189bcecda1265fd57e340444a23\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Geert\n Houben\n F.\n false\n 2\n houben, geert f.\n 6c43bd452dd396221f65867ba64ba432c3caa22a\n \n \n _Jane Doe\n 2017-05-24T11:23:35\n _Jane Doe\n 2017-05-24T11:23:35\n IBM\n International Business Machines Corporation\n true\n 3\n international business machines corporation (ibm)\n f15d426dc0fa1a5880251e9bdbb326d5844e6a6e\n \n \n _Jane Doe\n 2017-05-24T11:18:32\n _Jane Doe\n 2017-05-24T11:18:32\n ISO\n International Organization for Standardization\n true\n 3\n international organization for standardization (iso)\n 738a08116e0e73e8bd139b7dc49cb86008246d90\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jane Doe\n 2017-05-23T14:19:18\n ISL\n International Symposium on Logistics\n true\n 3\n international symposium on logistics (isl)\n 0a9d03fa6fd7428cf7147c7217775d78d932da38\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Lisa\n Jack\n false\n 1\n jack, lisa\n 475f30cc7ea684e803465750f78270ce74eb8f77\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jane Doe\n 2017-05-22T12:10:22\n Joseph\n Jen\n J.\n false\n 2\n jen, joseph j.\n d0a04ce6c1a00ad2dd1382e4f57484f8463ca144\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Jae\n Jeong\n Yun\n false\n 0\n jeong, jae yun\n 94869efdb3407e0c8928feb269eed7d1b662d9bf\n \n \n _Jane Doe\n 2017-05-22T08:05:15\n _Jane Doe\n 2017-05-22T08:05:15\n Min\n Jiang\n false\n 1\n jiang, min\n 5e377f2ca786f9064741277343d1237db6a8e0b8\n \n \n _Jane Doe\n 2017-05-24T11:41:45\n _Jane Doe\n 2017-05-24T11:41:45\n Thomas\n Judd\n false\n 2\n judd, thomas\n 9606855ca81466db1676638eea5aef14090e8153\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Konstantinos\n Karantininis\n false\n 2\n karantininis, konstantinos\n 7b84899c7876b78c3c34772c9a4b3326ebf17d03\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n Philippos\n Karipidis\n true\n 2\n karipidis, philippos\n 4ace98e166c320a037f00a0b5b116ff325430903\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n Thomas\n Kelepouris\n false\n 2\n kelepouris, thomas\n 958a8db784b6bbd78f30222a35c2fcbc7a3b1386\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Laura\n Kelly\n Michelle\n false\n 1\n kelly, laura michelle\n c28d066e7787fc10dc36a5952627e098b5c771f7\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Farihah\n Khalid\n Liyana\n true\n 1\n khalid, farihah liyana\n a5da3e6495acc19fc8166d0152e21a01b732c066\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Byung\n Kim\n Hee\n true\n 2\n kim, byung hee\n 03a573f81f7eb3ba95bde63a552a4d40979b887d\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Jürgen\n König\n false\n 2\n könig, jürgen\n 76075e00d603f43139263e0743f171131ce6f608\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Sally-Ann\n Krzyzaniak\n Caroline\n true\n 1\n krzyzaniak, sally-ann caroline\n 34eba8291e82fafb393e6d6b7ed470c665c6c5b5\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Kisung\n Kwon\n false\n 0\n kwon, kisung\n 9accb1732aadf985ffb4eb69e95d3e4823431cf6\n \n \n _Jane Doe\n 2017-05-23T15:05:04\n _Jane Doe\n 2017-05-23T15:05:04\n Felicity\n Lawrence\n false\n 1\n lawrence, felicity\n 99d9d9b3982b20e4559d43eb3b4c6dc1587203dc\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Sang\n Lee\n Yoo\n true\n 2\n lee, sang yoo\n df7e6c1a9e30a07d8d1c33141d22ec5fc2de7b0d\n \n \n _Jane Doe\n 2017-10-16T07:58:47\n _Jane Doe\n 2017-10-16T07:58:47\n Yin-Ling\n Lin\n false\n 0\n lin, yin-ling\n 9ed581b08bf7e1d0c32a1a34dcb502856f39c13c\n \n \n _Jane Doe\n 2017-06-28T12:25:01\n _Jane Doe\n 2017-06-28T12:25:01\n L.\n Manning\n false\n 0\n manning, l.\n e399c92840d02386e0b2c81c590db22014d76928\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Louise\n Manning\n false\n 1\n manning, louise\n b4cea9146ce4c5b8a265561f0e3220ed5d02a9a8\n \n \n _Jane Doe\n 2017-05-24T11:15:48\n _Jane Doe\n 2017-05-24T11:15:48\n Roy\n Manuell\n false\n 2\n manuell, roy\n f7847615681788181d96077e4e694d3e432d60c6\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Gaetano\n Martino\n false\n 2\n martino, gaetano\n 013fd7416380cd459bde46efab27b5a562b06ca6\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Dean\n McCullum\n false\n 2\n mccullum, dean\n ee5140234a4d08c5db88c0c9b57a4259fda26293\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Samantha\n Meyer\n B.\n false\n 1\n meyer, samantha b.\n 183aa65874f13d3a289b93ab02d1e8c5dc245b2d\n \n \n _Jane Doe\n 2017-05-24T11:13:08\n _Jane Doe\n 2017-05-24T11:13:08\n Michigan State University\n true\n 3\n michigan state university\n 37c580ef2b57ed8dfcc80e853d9ecdf077a2eefe\n \n \n _Jane Doe\n 2017-05-24T11:57:02\n _Jane Doe\n 2017-05-24T11:57:02\n Steven\n Millward\n false\n 2\n millward, steven\n 131f8fd8191a18e0e34188c6652d5e1bf6365ff7\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Douglas\n Moyer\n C.\n false\n 2\n moyer, douglas c.\n 8351d7d7c023d15740adfbcccb63e9a7b617d96c\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Robert\n Murphy\n W.\n false\n 2\n murphy, robert w.\n 600240cc3cdbe3a14cb2c38bab92f19be5f4e2c8\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Shuhaimi\n Mustafa\n true\n 2\n mustafa, shuhaimi\n 014adf3dd4cf5a81f9b17a9ec85250a4660a8381\n \n \n _Jane Doe\n 2017-06-28T10:49:28\n _Jane Doe\n 2017-06-28T10:49:28\n Carina\n Nascimento\n de Fátima\n false\n 1\n nascimento, carina de fátima\n 9851152262ceb324c304a432a9204997b7e17fce\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Maarten\n Nauta\n J.\n false\n 2\n nauta, maarten j.\n 0eac94a27a626f3806045b999adce11ee2ff6b00\n \n \n _Jane Doe\n 2017-05-23T15:59:24\n _Jane Doe\n 2017-05-23T15:59:24\n Nestec Ltd.\n true\n 3\n nestec ltd.\n 7352ebdfd3df96f07717ebc14ed3d40c497d98f7\n \n \n _Jane Doe\n 2017-05-24T11:06:04\n _Jane Doe\n 2017-05-24T11:06:04\n Oceana\n true\n 3\n oceana\n aaa6fc4dc1a85711e3d78e41e302455fdaf29976\n \n \n _Jane Doe\n 2017-05-22T08:22:45\n _Jane Doe\n 2017-05-22T08:22:45\n Deborah\n Ochulor\n O.\n false\n 1\n ochulor, deborah o.\n 955b95287e0c8b90c2c9dfd0418a1c699df0717f\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Gislene\n Oliveira\n Batista de\n true\n 1\n oliveira, gislene batista de\n 11eaa5cbba5b5da8ec076e7605d298188c4d264a\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Larry\n Olmsted\n false\n 2\n olmsted, larry\n 7d4ef7b6cfff7fcb554aabf933d7fa29747152f7\n \n \n _Jane Doe\n 2017-05-22T08:24:49\n _Jane Doe\n 2017-05-22T08:24:49\n Linus\n Opara\n Umezuruike\n true\n 2\n opara, linus umezuruike\n 7e192a2c9fc541467678ade834644d06ba314f81\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Seung\n Paek\n Yeop\n true\n 2\n paek, seung yeop\n 4d0d054820805e0a33dee3ebc713b5061bf55a4f\n \n \n _Jane Doe\n 2017-05-24T11:46:59\n _Jane Doe\n 2017-05-24T11:46:59\n Jason\n Papathanasiou\n false\n 2\n papathanasiou, jason\n 29158315a398eb475dffc1224ec1bd22fff4f1a0\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Hyeonho\n Park\n true\n 2\n park, hyeonho\n 78bd511428d9f005620984b132849fee9068471f\n \n \n _Jane Doe\n 2017-05-22T08:07:14\n _Jane Doe\n 2017-05-22T08:07:14\n Jung\n Park\n Min\n true\n 2\n park, jung min\n a7b018978524be5416b5315e32daf80a809a40ff\n \n \n _Jane Doe\n 2017-05-23T10:47:07\n _Jane Doe\n 2017-05-23T10:47:07\n Stefano\n Pascucci\n false\n 2\n pascucci, stefano\n 8d8906c856c048133b09a13c31a0572cf51d1684\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jane Doe\n 2017-05-23T14:19:18\n Kulwant\n Pawar\n S.\n true\n 2\n pawar, kulwant s.\n 4bccc17550722be8ed2d48b5db3c20081a049534\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Alex\n Pearce\n R.\n false\n 2\n pearce, alex r.\n 3daba8e793c9d5166955739fcff380f16060d939\n \n \n _Jane Doe\n 2017-05-24T12:17:05\n _Jane Doe\n 2017-05-24T12:17:05\n Edenir\n Pereira-Filho\n Rodrigues\n true\n 2\n pereira-filho, edenir rodrigues\n 1d2684bdfd5093c4aedda56d0c5335f70d928924\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Helena\n Pezza\n Redigolo\n false\n 1\n pezza, helena redigolo\n ba90d1b2fe0bac16771935c20286deee981dd528\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Leonardo\n Pezza\n false\n 2\n pezza, leonardo\n 1fe4e6681f6d18475714a3ca8651c801ae7457ed\n \n \n _Jane Doe\n 2017-05-22T08:24:18\n _Jane Doe\n 2017-05-22T08:24:18\n Katerina\n Pramatari\n false\n 1\n pramatari, katerina\n da5fede75686022b6c6fcd02b7aa01fcf5dcadec\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Raha\n Rahim\n Abdul\n true\n 1\n rahim, raha abdul\n ff855c1fa639349bed471c870de0686a1074e280\n \n \n _Jane Doe\n 2017-05-24T11:23:50\n _Jane Doe\n 2017-05-24T11:23:50\n Shanker\n Ramamurthy\n true\n 2\n ramamurthy, shanker\n e290490e306d7dba4c2eb1bcbf84d4ef831a071c\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Alan\n Rickman\n false\n 2\n rickman, alan\n ad6f83ddf0df81077f101b80d5c1583363d0ce2f\n \n \n _Jane Doe\n 2017-06-28T10:47:47\n _Jane Doe\n 2017-06-28T10:47:47\n Fábio\n Rocha\n Rodrigo Piovezani\n true\n 2\n rocha, fábio rodrigo piovezani\n abb0bb32c8b71b70d01580b28118217d6fa9f5b1\n \n \n _Jane Doe\n 2017-05-23T14:17:30\n _Jane Doe\n 2017-05-23T14:17:30\n Helen\n Rogers\n true\n 1\n rogers, helen\n 004ce77fad1834eaf22762254fc3a50ae68c8795\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Pedro\n Rosado\n Rafael\n false\n 2\n rosado, pedro rafael\n 5e940211f269808d90e7aee82716797168d31018\n \n \n _Jane Doe\n 2017-05-23T06:40:56\n _Jane Doe\n 2017-05-23T06:40:56\n Saskia\n van Ruth\n Ruth\n M.\n true\n 1\n ruth, saskia m.\n 390dad2636e661bbf86dd2b899420c69404c5e5e\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n John\n Ryan\n M.\n false\n 2\n ryan, john m.\n 3176d88230638e6c7a250d07a244f6004b43b563\n \n \n _Jane Doe\n 2017-05-22T11:16:01\n _Jane Doe\n 2017-05-22T11:16:01\n Ian\n Sample\n false\n 2\n sample, ian\n a6b5cf5ebb1fc96700b789baf7682dae8d678f34\n \n \n _Jane Doe\n 2017-06-28T10:47:47\n _Jane Doe\n 2017-06-28T10:47:47\n Poliana\n Santos\n Macedo dos\n true\n 1\n santos, poliana macedo dos\n 2c7b4485a0ab287009e298aaf2901a896011d504\n \n \n _Jane Doe\n 2017-05-24T12:40:53\n _Jane Doe\n 2017-05-24T12:40:53\n Awis\n Sazili\n Qurni\n true\n 2\n sazili, awis qurni\n 4edd070b6942951f30f6655225186ed609c6d25a\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jane Doe\n 2017-05-22T12:34:38\n Oliver\n Schlüter\n false\n 2\n schlüter, oliver\n 6445f7b6e25391a376b2e369006702f6fee1496b\n \n \n _Jane Doe\n 2017-05-23T06:30:27\n _Jane Doe\n 2017-05-23T06:30:27\n Jeroen\n Schuermans\n false\n 2\n schuermans, jeroen\n d04a3680ab8ddfe216a931ae7ecf28a129a6540d\n \n \n _Jane Doe\n 2017-05-24T14:40:26\n _Jane Doe\n 2017-05-24T14:40:26\n Sciex\n true\n 3\n sciex\n d9e90c8076a472839d5ee62f3b27aee445b286d2\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Bing\n Shao\n true\n 2\n shao, bing\n 4f2348ec9ab7a9f9000b3a8a281ded62f3aefb20\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Melanie\n Slade\n Vilarasau\n false\n 1\n slade, melanie vilarasau\n d149b7f08bf98a4225ec95ada78cf311aebdedf2\n \n \n _Jane Doe\n 2017-05-24T11:44:46\n _Jane Doe\n 2017-05-24T11:44:46\n Hannah\n Slocum\n false\n 1\n slocum, hannah\n 1372dd64241e7acb9a9e6362eec69f56b9745886\n \n \n _Jane Doe\n 2017-05-22T08:06:12\n _Jane Doe\n 2017-05-22T08:06:12\n Jan\n Soon\n Mei\n true\n 1\n soon, jan mei\n f8151c5f7a5b32c8e19f0ce21d7da2ab9472e688\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Timothy\n Spall\n false\n 2\n spall, timothy\n 54b7930d990038cac9b9bde121effd856b44c38a\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n John\n Spink\n false\n 2\n spink, john\n 796fbeac6a5cac33c85348fc37c652d6f3c60504\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Elaisha\n Stokes\n true\n 1\n stokes, elaisha\n dd0cdb072ce1f73a5b428a910c037e696d28574c\n \n \n _Jane Doe\n 2017-05-24T11:46:59\n _Jane Doe\n 2017-05-24T11:46:59\n Theodore\n Tarnanidis\n false\n 2\n tarnanidis, theodore\n 56e3bb6667d7da6650d5d8ffa5c4a2862aabb64b\n \n \n _Jane Doe\n 2017-05-24T11:39:43\n _Jane Doe\n 2017-05-24T11:39:43\n Nicola\n Temple\n true\n 1\n temple, nicola\n 7600b8153cd43450bf4aa3d414a039d7eb1cdd61\n \n \n _Jane Doe\n 2017-05-24T12:56:43\n _Jane Doe\n 2017-05-24T12:56:43\n Feng\n Tian\n true\n 2\n tian, feng\n c2e89337f9a55246074367535256467f3d12d94a\n \n \n _Jane Doe\n 2017-05-22T08:07:31\n _Jane Doe\n 2017-05-22T08:07:31\n Aline\n Toci\n Theodoro\n false\n 1\n toci, aline theodoro\n 057a4055394765a420d9dd8ddb5284e03f276fab\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n Dimitrios\n Tselempis\n true\n 2\n tselempis, dimitrios\n cfe9bf3f3bad1ce064a02c1ba03ce3d474fa24bc\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n Loukas\n Tsironis\n K.\n true\n 2\n tsironis, loukas k.\n dd211273c972ffdb6df2e25fc216dfff5ba8f28e\n \n \n _Jane Doe\n 2017-05-24T14:39:54\n _Jane Doe\n 2017-05-24T14:39:54\n USC\n United States Congress\n true\n 3\n united states congress (usc)\n fd9a4b1bcec064c1fa15a32c4b5a5d9d5fd0f78b\n \n \n _Jane Doe\n 2017-05-24T11:27:14\n _Jane Doe\n 2017-05-24T11:27:14\n USSC\n United States Supreme Court\n true\n 3\n united states supreme court (ussc)\n 0b2ef9ed510d4f17461af532e3da2e2e33356e18\n \n \n _Jane Doe\n 2017-05-23T15:30:24\n _Jane Doe\n 2017-05-23T15:30:24\n University of Minnesota\n true\n 3\n university of minnesota\n add53e102b3a6c128aa875cef00d41823553acd6\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jane Doe\n 2017-05-22T12:34:38\n Mieke\n Uyttendaele\n false\n 1\n uyttendaele, mieke\n 12b642f6eec0a3d72657f230158c8a1ab1851e48\n \n \n _Jane Doe\n 2017-05-24T11:46:59\n _Jane Doe\n 2017-05-24T11:46:59\n Maro\n Vlachopoulou\n true\n 1\n vlachopoulou, maro\n 13c6ef91081b23ef83caa3d3539ed89bfb5d19c2\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Wenzhi\n Wang\n true\n 2\n wang, wenzhi\n 5e2ae8d41fea9a2936c298a99654882a92267798\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Yunyu\n Wang\n true\n 2\n wang, yunyu\n 16616916b8a6a6059a47c355e10d825095e1c2ce\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Yushui\n Wang\n true\n 2\n wang, yushui\n c3fb7d7ecdaaa5be0cddeda543ca33ee25cc973b\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Paul\n Ward\n false\n 2\n ward, paul\n 659bb743dc97a0af6b2e659ac69649370d6db9ec\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Trevor\n Webb\n false\n 2\n webb, trevor\n 27c2da16683df02f775722b9807ad7411ce8ec7d\n \n \n _Jane Doe\n 2017-05-23T14:58:47\n _Jane Doe\n 2017-05-23T14:58:47\n Ben\n Werschkul\n false\n 2\n werschkul, ben\n e7f69ea309a4e9afd68d8d31f50c95f511b656f8\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jane Doe\n 2017-05-24T12:31:04\n Elizabeth\n Whitworth\n false\n 1\n whitworth, elizabeth\n ee6bed98ec6581eaf3d0032c20149b2641596956\n \n \n _Jane Doe\n 2017-05-29T16:00:22\n _Jane Doe\n 2017-05-29T16:00:22\n Wikipedia\n true\n 3\n wikipedia\n e84bc0e1c5a877c79be55c97c45195c9ee85a1c3\n \n \n _Jane Doe\n 2017-05-22T08:04:33\n _Jane Doe\n 2017-05-22T08:04:33\n Annabelle\n Wilson\n Mary\n true\n 1\n wilson, annabelle mary\n 41584548a0847d45103034b813aef3420e18de1d\n \n \n _Jane Doe\n 2017-05-24T10:45:54\n _Jane Doe\n 2017-05-24T10:45:54\n Carl\n Winter\n false\n 2\n winter, carl\n bb71e74b3d2ea962253adb0f5553c1a333c821e1\n \n \n _Jane Doe\n 2017-05-30T10:46:13\n _Jane Doe\n 2017-05-30T10:46:13\n Jayne\n Wisener\n false\n 1\n wisener, jayne\n 8a62905296d72b1a4f3074bd466293f25c6c493a\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jane Doe\n 2017-05-24T12:31:04\n Amy\n Woodward\n false\n 1\n woodward, amy\n fb550a7b2ae728f28a0ee5a41938c9d06c4781eb\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Shifang\n Wu\n true\n 1\n wu, shifang\n c18ed77f8d74a27f7f271ee52cfbde31dcb9d750\n \n \n _Jane Doe\n 2017-05-22T08:05:56\n _Jane Doe\n 2017-05-22T08:05:56\n Yongning\n Wu\n true\n 2\n wu, yongning\n 6cd8131b63daf11d26bbfceac0ce17afa2eeaf90\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Mark\n Xu\n false\n 2\n xu, mark\n efec7ef091c630ccf294d2a1e9f05f06b9f3030c\n \n \n _Jane Doe\n 2017-05-22T08:22:13\n _Jane Doe\n 2017-05-22T08:22:13\n Yunxiang\n Yan\n true\n 2\n yan, yunxiang\n 6a26d7018c816da1c664427252d7e4a235dd8ae4\n \n \n _Jane Doe\n 2017-05-24T12:56:53\n _Jane Doe\n 2017-05-24T12:56:53\n Baojian\n Yang\n true\n 2\n yang, baojian\n 476c63c41aec65de09cf010c52353a53c9ae11c8\n \n \n _Jane Doe\n 2017-05-22T08:05:31\n _Jane Doe\n 2017-05-22T08:05:31\n Yaping\n Zhang\n true\n 2\n zhang, yaping\n 581e61eb3e5ba6cc11b278b092ca58ec8c7f7915\n \n \n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jane Doe\n 2017-05-22T08:10:38\n Academic Press\n Imprint of Elsevier\n true\n academic press\n 5dd7c8ff8760876167e944f9e5ae80cfc10778fb\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jane Doe\n 2017-05-22T08:02:48\n Algonquin Books of Chapel Hill\n false\n algonquin books of chapel hill\n 38f3aaa7f2004513fffa0359de859320c0129434\n \n \n _Jane Doe\n 2017-05-24T11:42:49\n _Jane Doe\n 2017-05-24T11:42:49\n Audible Studios for Bloomsbury\n false\n audible studios for bloomsbury\n 445da2b0a5d075f1582dbc0acc442bd18f9fa6cb\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jane Doe\n 2017-05-23T14:19:18\n Centre for Concurrent Enterprise\n false\n centre for concurrent enterprise\n 093e0a130031850a33fd36ab84b2fce9960ab46c\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n Edward Elgar Publishing\n false\n edward elgar publishing\n a5058ea8db5152faeb2b5d65636a84560753d42d\n \n \n _Jane Doe\n 2017-06-28T13:47:03\n _Jane Doe\n 2017-06-28T13:47:03\n Food Safety Music - UC Davis\n true\n food safety music - uc davis\n 7fdec54dc9bbf1971f2f4e0f70d3cb78acc80a35\n \n \n _Jane Doe\n 2017-05-22T08:23:33\n _Jane Doe\n 2017-05-22T08:23:33\n IEEE\n false\n ieee\n 0858ab9b315bf3096f4b1d08e81ae10db51fe30d\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jane Doe\n 2017-05-22T08:26:04\n IGI Global\n false\n igi global\n 858b32ea791ae8e303558af34ba016eee9122442\n \n \n _Jane Doe\n 2017-05-24T11:20:44\n _Jane Doe\n 2017-05-24T11:20:44\n International Organization for Standardization\n false\n international organization for standardization\n 31e5c8b5909a1f655fe9a239a40c5ee33275334a\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jane Doe\n 2017-05-22T12:10:22\n John Wiley & Sons, Inc\n false\n john wiley & sons, inc\n c3e7a333cab75e9e904cd2452e54c6c3c4fc376f\n \n \n _Jane Doe\n 2017-05-22T08:12:02\n _Jane Doe\n 2017-05-22T08:12:02\n Nova Science Publishers\n false\n nova science publishers\n 02fc85bc3e14a723701ea858c4cd3af4e204683c\n \n \n _Jane Doe\n 2017-08-09T08:25:50\n _Jane Doe\n 2017-08-09T08:25:50\n SAGE Reference\n true\n sage reference\n f2494ecf35ec0f1572f408d569f13ff1dd3dedf1\n \n \n _Jane Doe\n 2017-05-23T15:00:01\n _Jane Doe\n 2017-05-23T15:00:01\n The New York Times\n false\n the new york times\n c7ff9a01c9eb9bd867ebbd5f7c4494e85e7e4928\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jane Doe\n 2017-05-22T08:25:43\n Wageningen Academic Publishers\n false\n wageningen academic publishers\n 7cad595e3198fee2d306845cbe363c7bafe4cf70\n \n \n _Jane Doe\n 2017-05-30T09:41:27\n _Jane Doe\n 2017-05-30T09:41:27\n Warner Home Video\n false\n warner home video\n a5b9fba67479ebc75578d2c49201675ea23d6667\n \n \n \n \n _Jane Doe\n 2017-05-24T11:49:46\n _Jane Doe\n 2017-05-24T11:49:46\n Advances in Business Strategy and Competitive Advantage\n false\n advances in business strategy and competitive advantage\n 153d35ddc42cb931f31f9c506e3c57929bd4f71b\n \n \n _Jane Doe\n 2017-05-24T11:23:30\n _Jane Doe\n 2017-05-24T11:23:30\n Blockchain Unleashed: IBM Blockchain Blog\n false\n blockchain unleashed: ibm blockchain blog\n 3231f074caa8d1a4affe67b33e2b5dab1df6be8c\n \n \n _Jane Doe\n 2017-05-24T11:13:12\n _Jane Doe\n 2017-05-24T11:13:12\n Food Fraud Initiative Blog\n false\n food fraud initiative blog\n 4a1dd44ff916215c298118a5bdaaf6ad3ad6c21b\n \n \n _Jane Doe\n 2017-05-30T10:34:47\n _Jane Doe\n 2017-05-30T10:34:47\n Food Science and Technology\n false\n food science and technology\n 1894af7529cbed74e41cfa5504576881e9deec15\n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n NUS Centre for International Law series\n false\n nus centre for international law series\n 8da04eac17e5f4a15503762d362049368c2bc904\n \n \n _Jane Doe\n 2017-05-24T13:02:55\n _Jane Doe\n 2017-05-24T13:02:55\n The Guardian's Science Weekly\n false\n the guardian's science weekly\n 31f5c7ee36f1c800bc5ce3e7c95002fb7dae1bd2\n \n \n _Jane Doe\n 2017-05-30T10:22:55\n _Jane Doe\n 2017-05-30T10:22:55\n Timescast\n false\n timescast\n f23ce7f65118442b09615b6de3322cd3409e1d3d\n \n \n \n \n e438ddc5-5a1f-4c76-9e57-55ee67c48763\n _Jane Doe\n 2017-05-22T08:22:45\n _Jkli14\n 2024-10-10T12:12:08\n 0\n 0\n 0\n 2012-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 2\n Jane Doe, 2017-5-29\n \n 24\n true\n 24\n 24\n\n\n 31\n true\n 31\n 31\n\n24-31]]>\n 24\n 30\n 0\n JournalArticle\n Agbaraji, Ochulor et al. 2012 – Food and drug counterfeiting\n 0\n OriginalSource\n [\"a8c585d7-1d5f-44d5-99b7-074f086ff45e\"]\n The implications and way-out\n 0\n 0\n Food and drug counterfeiting in the developing nations\n 3\n 2012\n \n \n _Jane Doe\n 2017-08-09T08:25:50\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Albala.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n 9781452243016\n -1\n Los Angeles\n 0\n BookEdited\n Albala (Ed.) 2015 – The SAGE encyclopedia of food\n 0\n The British Library\n [\"fd32aff3-1b6f-44d8-920f-9d1a35414818\"]\n 0\n 0\n The SAGE encyclopedia of food issues\n 2015\n \n \n ace033bb-c74d-4096-a059-1f1975e0bdea\n _Jane Doe\n 2017-05-23T08:30:27\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}{\\f1\\fnil\\fcharset0 Arial;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised. } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised. </p>\n Barlow.2015\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Barlow, Boobis et al 2015 - The role of hazard.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2015-01-01T00:00:00\n 10.1016/j.tifs.2015.10.007\n 0\n 0\n false\n false\n eng\n en\n 2\n \n 176\n true\n 176\n 176\n\n\n 188\n true\n 188\n 188\n\n176-188]]>\n 176\n 30\n 0\n JournalArticle\n Barlow, Boobis et al. 2015 – The role of hazard\n 0\n CrossRef\n [\"9ddce1aa-e7ce-4e1a-ba5f-f9ed10841765\"]\n 0\n 0\n The role of hazard- and risk-based approaches in ensuring food safety\n 46\n 2015\n \n \n c2f95721-b77f-47ae-a48d-1e63c63a3104\n _Jane Doe\n 2017-05-23T14:58:18\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n A senior scientist at Oceana discusses the group’s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 A senior scientist at Oceana discusses the group\\u8217 s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>A senior scientist at Oceana discusses the group’s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.</p>\n 2017-05-23\n Bishop.20130221\n 0\n 2013-02-21T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede&region=caption&pgtype=article\n -1\n 0\n AudioOrVideoDocument\n Bishop, Werschkul et al. 2013-02-21 – Truth in seafood labeling\n 0\n 5:09 minutes\n [\"23dee43c-5d58-42e9-bb1f-8aaee92ea8ba\"]\n 0\n 0\n Truth in seafood labeling\n 2013-02-21\n \n \n 298acc7b-14bf-4120-ab3e-27211e0bcb19\n _Jane Doe\n 2017-05-22T08:12:02\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Braden.2014\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Braden 2014 - Food fraud and adulterated ingredients.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2014-01-01T00:00:00\n 0\n 0\n false\n false\n 9781631177309\n eng\n en\n <c>113</c> \n<in>true</in> \n<os>113</os> \n<ps>113</ps>\n -1\n New York\n 0\n Book\n Braden 2014 – Food fraud and adulterated ingredients\n 0\n Library of Congress\n [\"4e617371-6978-4468-a951-80dc8754017f\"]\n Background, issues, and federal action\n 0\n 0\n Food fraud and adulterated ingredients\n 2014\n \n \n _Jane Doe\n 2017-05-23T15:24:24\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Reinventing himself as Sweeney Todd, a man unjustly sent to prison returns to exact revenge on those who ruined his life, especially the evil Judge Turpin who sent the man to prison. Not only does he seek revenge for the cruel punishment he suffered in prison, but also for what happened to his wife and daughter. When he returns to his home town, he reopens his barber shop, where Mr. Todd becomes the Demon of Fleet Street. Mrs. Lovett is Sweeney's amorous accomplice who creates diabolical meat pies out of the remains of Mr. Todd's victims.\n Burton.2013\n 0\n 2007-12-01\n 2013-01-01T00:00:00\n 0\n 0\n false\n false\n 9786314961534\n eng\n en\n Logan, John, (screenwriter.)\nMacDonald, Laurie, (producer.)\nParkes, Walter F., (producer.)\nZanuck, Richard D., (producer.)\nBurton, Tim, (director.)\nDepp, Johnny, (actor.)\nBonham Carter, Helena, (actor.)\nRickman, Alan, (actor.)\nSpall, Timothy, (actor.)\nBaron Cohen, Sacha, (actor.)\nWisener, Jayne, (actor.)\nBower, Jamie Campbell, (actor.)\nKelly, Laura Michelle, (actor.)\nSanders, Ed, (actor.)\nHead, Anthony Stewart, (actor.)\nBowles, Peter, (actor.)\nSondheim, Stephen, (composer.)\nWheeler, Hugh, (composer.)\nBond, C. G (adapter.)\n -1\n Demon barber of Fleet Street\n Burbank, CA\n 0\n Movie\n Burton 2013 – Sweeney Todd\n 0\n WorldCat\n 116 minutes\n Videodisc\n [\"5c5ba2e8-a506-41df-8c00-46c5ee9107d8\"]\n The demon barber of Fleet Street\n 0\n 0\n Sweeney Todd\n 2013\n \n \n _Jane Doe\n 2017-05-22T12:08:33\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n CheMan.2010\n 0\n 2010-08-26\n 2010-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n US20100216136 A1\n https://www.google.com/patents/US20100216136\n -1\n 0\n Patent\n Che Man, Mustafa et al. 2010 – Method for identifying a pork\n 0\n Google Patents\n Universiti Putra Malaysia\n US 12/594,164\n 2008-06-26\n [\"202cb4c4-b982-4cf0-b42c-a0575ab98a63\"]\n 0\n 0\n Method for identifying a pork content in a food\n Pork-specific PCR assay is performed for Halal authentication, by detecting porcine DNA in food products.\n 2010\n \n \n 15abcda1-f600-441e-9138-95b46cc0f12f\n _Jane Doe\n 2017-05-22T08:05:15\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Dai.2013\n 0\n 2013-01-01T00:00:00\n 10.1136/bmj.f3385\n 0\n 0\n false\n false\n eng\n en\n \n Omit\n f3385\n f3385\n\nf3385]]>\n 2147483647\n 100\n 23716434\n 0\n JournalArticle\n Dai, Jiang 2013 – Fake meat scandals add\n 0\n PubMed\n [\"b97192f6-db5b-4949-9e97-e6cd9ae8b1e0\"]\n 0\n 0\n Fake meat scandals add to Chinese food fears\n Letter\n 346\n 2013\n \n \n _Jane Doe\n 2017-05-22T11:17:26\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n In anticipation of Food Fraud 2017, New Food speaks exclusively to Eoghan Daly of Crowe Clark Whitehill about tackling food fraud in the 21st Century.\n 2017-05-22\n Daly.20170411\n 0\n 2017-04-11\n 2017-04-11T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/\n -1\n 0\n InterviewMaterial\n Manuell 2017-04-11 – Fighting food fraud in 2017\n 0\n [\"97fcd513-dd0c-4c0d-9235-d0dcf2e7a8f9\"]\n 0\n 0\n Fighting food fraud in 2017\n \n \n _Jane Doe\n 2017-05-23T10:46:02\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Dries.Inpress\n 0\n 0\n 0\n false\n false\n 9789086863013\n eng\n en\n -1\n Wageningen\n 0\n BookEdited\n Dries, Karantininis et al. (Ed.) [In press] – It’s a jungle out there\n 0\n WorldCat\n [\"23681484-6956-4491-8af0-dced9966fb67\"]\n 0\n 0\n It’s a jungle out there - the strange animals of economic organization in agri-food value chains\n [In press]\n \n \n _Jane Doe\n 2017-05-22T11:59:43\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-22\n EuropeanCommissionFoodFraudNetwork.20130526\n 0\n 2013-05-26\n 2013-05-26T00:00:00\n 0\n 1\n Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.</p>\n false\n false\n eng\n en\n https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf\n <c>3</c> \n<in>true</in> \n<os>3</os> \n<ps>3</ps>\n -1\n 1\n UnpublishedWork\n European Commission Food Fraud Network 2013-05-26 – Food Fraud Network activity report\n 0\n [\"ee041024-d6d5-432d-924e-c90bacc2ed53\"]\n 0\n 0\n Food Fraud Network activity report 2015\n \n \n _Jane Doe\n 2017-05-23T10:25:46\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.\n 2017-05-23\n Europol.20170425\n 0\n 2017-04-25\n 2017-04-25T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud\n -1\n The Hague\n 0\n PressRelease\n Europol 2017-04-25 – EUR 230 million worth\n 0\n https://www.europol.europa.eu/contact-us/request-media\n [\"d4a8e294-f9f7-4f79-8768-afd6a3c8cf2a\"]\n 0\n 0\n EUR 230 million worth of fake food and beverages seized in global OPSON operation targeting food fraud\n \n \n _Jane Doe\n 2017-05-22T11:02:49\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Evershed.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Evershed, Temple 2016 - Sorting the beef.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 1522614370\n eng\n en\n -1\n 0\n AudioBook\n Evershed, Temple 2016 – Sorting the beef\n 0\n WorldCat\n 9:12 hours\n [\"da3db725-74ab-42d0-9a90-8a6f0fdff619\"]\n The science of food fraud forensics\n 0\n 0\n Sorting the beef from the bull\n 2016\n \n \n _Jane Doe\n 2017-05-23T15:28:57\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n The food supply system is vulnerable to various types of contamination and adulteration. This research focuses on economically motivated adulteration (often called \"food fraud\"). Economically motivated adulteration (EMA) refers to the knowingly selling a food product that is not up to standards in order to gain economic advantage. There is a long history of EMA in a wide variety of food products. The food safety paradigm is not sufficient for food defense, or for prevention and deterrence of EMA. The goal of this research was to develop methods to improve capabilities for preventing and detecting EMA incidents. First, the food ingredient monographs in the United States Pharmacopeial (USP) Convention Food Chemicals Codex (FCC) were evaluated for susceptibility to EMA. These evaluations can be used to help target the most susceptible ingredients for monograph modernization within USP, and for inspection and laboratory testing resources by regulatory agencies. Second, economic and production data for dairy products in China leading up to the melamine adulteration event was analyzed to evaluate the utility of this data for alerting to the potential for EMA in a food commodity. This analysis shed insight on variables that may be useful for tracking the production of global commodities for early indications of EMA. Finally, a surveillance technique for trade data was evaluated using melamine adulteration of wheat gluten as a case study. This biosurveillance-like methodology can be applied to food import data to identify supply chain shifts that could indicate changes in the market for food products and a heightened risk of EMA. Regulatory agencies have an enormous burden of responsibility for regulating the food supply for both domestically-produced and imported food products. Given the constrained resources of these agencies, they need improved methods for targeting those resources towards the riskiest food products. These preliminary efforts to shed light on EMA vulnerabilities and potential mitigation efforts can contribute to efforts in that area. An integrated, systems-based approach to food protection that encompasses both food safety and food defense is imperative for ensuring the integrity of our food supply.\n 2017-05-23\n Everstine.May2013\n 0\n May 2013\n 2013-05-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://hdl.handle.net/11299/153189\n -1\n Minneapolis, Minnesota\n 0\n Thesis\n Everstine May 2013 – Economically motivated adulteration\n 0\n conservancy.umn.edu\n [\"df9d1649-1819-476d-bdb3-55003909d8ef\"]\n Implications for food protection and alternate approaches to detection\n 0\n 0\n Economically motivated adulteration\n Dissertation\n \n \n 334763c8-e50b-45c5-9786-3506b14a6ac1\n _Jane Doe\n 2017-05-22T08:14:06\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n EwingChow.2016\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 9781785361890\n eng\n en\n -1\n Cheltenham\n 0\n BookEdited\n Ewing-Chow, Slade (Ed.) 2016 – International trade and food security\n 0\n The British Library\n [\"f544c2d2-f01a-4300-b8a2-08a437c59bf5\"]\n Exploring collective food security in Asia\n 0\n 0\n International trade and food security\n 2016\n \n \n _Jane Doe\n 2017-05-23T07:12:19\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-23\n FoodandDrugAdministration.20120827\n 0\n 2012-08-27\n 2012-08-27T00:00:00\n 0\n 1\n Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.</p>\n false\n false\n eng\n en\n https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf\n <c>30</c> \n<in>true</in> \n<os>30</os> \n<ps>30</ps>\n -1\n Silver Spring, Maryland\n 3\n UnpublishedWork\n Food and Drug Administration 2012-08-27 – Vulnerability assessments of food systems\n 0\n [\"2c7b2a79-aba7-40ac-ae66-453e9e25424f\"]\n Final summary report, June 2009 – February 2012\n 0\n 1\n Vulnerability Assessments of Food Systems \n Table of Contents \n I. Executive Summary \n II. Background \n III. Method Overview \n IV. Assessment Results \n Commonalities of Critical Process Nodes \n Commonalities of Mitigation Strategies a \n Commonalities of Identified Research Gap \n Commonalities of Identified Threat Indic \n V. CARVER + Shock Vulnerability Assessm \n VI. Overall Assessment Observations \n Assessment Preparation and Conduct \n Selection of Threat Agent for CARVER + S \n Participant Perspective \n International Assessments and Food Defen \n Other Observations \n VII. Conclusion\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Vulnerability Assessments of Food Systems}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql \n\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Table of Contents }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 I. Executive Summary }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 II. Background }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 III. Method Overview } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 IV. Assessment Results }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1 \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Critical Process Nodes }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Mitigation Strategies a}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Identified Research Gap} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 Commonalities of Identified Threat Indic}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 V. CARVER + Shock Vulnerability Assessm}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 VI. Overall Assessment Observations }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Assessment Preparation and Conduct } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 Selection of Threat Agent for CARVER + S}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Participant Perspective }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 International Assessments and Food Defen}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Other Observations } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 VII. Conclusion}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Vulnerability Assessments of Food Systems</p><p> Table of Contents </p><p> I. Executive Summary </p><p> II. Background </p><p> III. Method Overview </p><p> IV. Assessment Results </p><p> Commonalities of Critical Process Nodes </p><p> Commonalities of Mitigation Strategies a</p><p> Commonalities of Identified Research Gap</p><p> Commonalities of Identified Threat Indic</p><p> V. CARVER + Shock Vulnerability Assessm</p><p> VI. Overall Assessment Observations </p><p> Assessment Preparation and Conduct </p><p> Selection of Threat Agent for CARVER + S</p><p> Participant Perspective </p><p> International Assessments and Food Defen</p><p> Other Observations </p><p> VII. Conclusion</p>\n Vulnerability assessments of food systems\n \n \n dfbd6cd9-7faa-46e7-9534-6b88fdc65d74\n _Jane Doe\n 2017-05-22T08:08:45\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n The Food and Drug Administration (FDA or we) is issuing this final rule to require domestic and foreign food facilities that are required to register under the Federal Food, Drug, and Cosmetic Act (the FD&C Act) to address hazards that may be introduced with the intention to cause wide scale public health harm. These food facilities are required to conduct a vulnerability assessment to identify significant vulnerabilities and actionable process steps and implement mitigation strategies to significantly minimize or prevent significant vulnerabilities identified at actionable process steps in a food operation. FDA is issuing these requirements as part of our implementation of the FDA Food Safety Modernization Act (FSMA).\n 2017-05-30\n FoodandDrugAdministration.20160527\n 0\n 2016-05-27\n 2016-05-27T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 103\n https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf\n \n 34165\n true\n 34165\n 34165\n\n\n 34223\n true\n 34223\n 34223\n\n34165-223]]>\n 34165\n 30\n 27236872\n 0\n StatuteOrRegulation\n Food and Drug Administration 2016-05-27 – Mitigation strategies to protect food\n 0\n PubMed\n [\"79436db7-2da2-459a-b0fd-c353bbda401c\"]\n 0\n 0\n Mitigation strategies to protect food against intentional adulteration. Final rule\n 81\n 2016\n \n \n f318673c-c4f2-4cf9-b62d-e32d7ee99a71\n _Jane Doe\n 2017-05-22T07:54:02\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n The food industry has been abuzz lately about the potential of blockchain to solve the problem of end-to-end traceability in the supply chain.\n 2017-05-22\n Garver.20170307\n 0\n 2017-03-07\n 2017-03-07T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/\n -1\n 0\n NewspaperArticle\n Garver 2017-03-07 – What is blockchain and how\n 0\n [\"f578087a-7148-40a3-afd2-9d760c68c09d\"]\n 0\n 0\n What is blockchain and how will it impact the food industry?\n \n \n _Jane Doe\n 2017-05-23T11:34:32\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-23\n GlobalFoodSafetyInitiative.July2014\n 0\n July 2014\n 2014-07-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf\n <c>4</c> \n<in>true</in> \n<os>4</os> \n<ps>4</ps>\n -1\n 0\n UnpublishedWork\n Global Food Safety Initiative July 2014 – GFSI position on mitigating the public\n 0\n [\"cd664384-0a2c-40e3-9468-f892fc8b71d4\"]\n 0\n 0\n GFSI position on mitigating the public health risk of food fraud\n \n \n e79c323b-c950-4415-9046-4d5c1c7944e3\n _Jane Doe\n 2017-05-22T08:07:14\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n This review provides current information on the analytical methods used to identify food adulteration in the six most adulterated food categories: animal origin and seafood, oils and fats, beverages, spices and sweet foods (e.g. honey), grain-based food, and others (organic food and dietary supplements). The analytical techniques, both conventional and emerging, used to identify adulteration in these six food categories involve sensory, physicochemical, DNA-based, chromatographic, and spectroscopic methods, and have been combined with chemometrics, making these techniques more convenient and effective for the analysis of a broad variety of food products. Despite recent advances, a need remains for suitably sensitive and widely applicable methodologies that will encompass all the various aspects of food adulteration.\n Hong.Inpress\n 0\n 2017-04-10\n 10.1002/jsfa.8364\n 0\n 1\n Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10 \n\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.</p>\n false\n false\n eng\n en\n -1\n 5\n JournalArticle\n Hong, Lee et al. [In press] – Modern analytical methods\n 0\n PubMed\n [\"1ab907ad-d95e-44cb-a59e-77264735b7d6\"]\n 0\n 0\n Modern analytical methods for the detection of food fraud and adulteration by food category\n [In press]\n \n \n _Jane Doe\n 2017-05-23T09:58:56\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.</p>\n 2017-05-23\n InternationalBusinessMachinesCorporation.20161019\n 0\n 2016-10-19\n 2016-10-19T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www-03.ibm.com/press/us/en/pressrelease/50816.wss\n -1\n 0\n PressRelease\n International Business Machines Corporation 2016-10-19 – Walmart, IBM and Tsinghua University\n 0\n hslocum@us.ibm.com\n [\"0616600e-57f9-4033-866b-8da1e0f43ff1\"]\n 0\n 0\n Walmart, IBM and Tsinghua University explore the use of blockchain to help bring safer food to dinner tables across China\n \n \n _Jane Doe\n 2017-05-22T12:15:04\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-22\n InternationalOrganizationforStandardization.200509\n 0\n 2005-09\n 2005-09-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n ISO 22000:2005\n https://www.iso.org/standard/35466.html\n -1\n Geneva, Switzerland\n 0\n Standard\n International Organization for Standardization 2005-09 – Food safety management systems\n 0\n [\"2f4f57cd-d30d-4f50-8a5c-469fa5abc004\"]\n 0\n 0\n Food safety management systems – Requirements for any organization in the food chain\n 67.020\n \n \n _Jane Doe\n 2017-05-22T12:10:22\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Jen.2017\n 0\n 2017-01-01T00:00:00\n 0\n 0\n false\n false\n 1119237963\n eng\n en\n <c>696</c> \n<in>true</in> \n<os>696</os> \n<ps>696</ps>\n -1\n Chichester, West Sussex; Hoboken, New Jersey\n 0\n BookEdited\n Jen, Chen (Ed.) 2017 – Food safety in China\n 0\n WorldCat\n [\"b27c82ac-4a36-4780-b975-caf29b75dda3\"]\n Science, technology, management and regulation\n 0\n 0\n Food safety in China\n 2017\n \n \n 4bc2cd0d-43cf-465e-a518-8a395784f486\n _Jane Doe\n 2017-05-22T08:24:18\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Kelepouris.2007\n 0\n 2007-01-01T00:00:00\n 10.1108/02635570710723804\n 0\n 0\n false\n false\n eng\n en\n 2\n \n 183\n true\n 183\n 183\n\n\n 200\n true\n 200\n 200\n\n183-200]]>\n 183\n 30\n 0\n JournalArticle\n Kelepouris, Pramatari et al. 2007 – RFID-enabled traceability in the food\n 0\n EndNote Tagged Import Format\n [\"e3991426-b94d-4d2c-b83b-1217780f05cc\"]\n 0\n 0\n RFID-enabled traceability in the food supply chain\n 107\n 2007\n \n \n 24593c6d-4296-4052-aae0-3e87b48503bc\n _Jane Doe\n 2017-05-23T15:05:04\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n With the Europewide scandal over the contamination of meat products, from beefburgers to lasagne, showing no sign of abating, study the issue in depth and learn all you need to know about how it came to this with our essential guide\n 2017-05-23\n Lawrence.20130215\n 0\n 2013-02-15\n 2013-02-15T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide\n -1\n 0\n NewspaperArticle\n Lawrence 2013-02-15 – Horsemeat scandal\n 0\n [\"53c63961-4e08-4334-9c6b-0ef1ec62adab\"]\n The essential guide\n 0\n 0\n Horsemeat scandal\n \n \n 81f9afba-db76-4ce6-8482-46e8810f4aea\n _Jane Doe\n 2017-05-24T12:28:24\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Manning.2016b\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 1\n -1\n 0\n SpecialIssue\n Manning (Ed.) 2016 – Food and supply chain integrity\n 0\n [\"2c00daa5-5641-401d-869d-c9cdda61773f\"]\n 0\n 0\n Food and supply chain integrity\n 119\n 2016\n \n \n 7f2b5e6b-dfc0-46e5-b94b-2c3e21cb1ebc\n _Jane Doe\n 2017-05-22T08:06:12\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. Successful models of food crime are dependent on how well the crime has been executed and at what point, or even if, detection actually occurs. The aim of this paper is to undertake a literature review and critique the often contradictory definitions that can be found in the literature in order to compare and contrast existing food crime risk assessment tools and their application. Food safety, food defense, and food fraud risk assessments consider different criteria in order to determine the degree of situational risk for each criteria and the measures that need to be implemented to mitigate that risk. Further research is required to support the development of global countermeasures, that are of value in reducing overall risk even when the potential hazards may be largely unknown, and specific countermeasures that can act against unique risks.\n Manning.2016c\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food safety.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 10.1111/1750-3841.13256\n 0\n 1\n A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}{\\f1\\fnil\\fcharset0 Arial;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10 \n\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned. }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned. </p>\n false\n false\n eng\n en\n 4\n \n Other\n Omit\n R823-R834\n R823-R834\n\nR823-R834]]>\n 2147483647\n 100\n 26934423\n 3\n JournalArticle\n Manning, Soon 2016 – Food safety\n 0\n PubMed\n [\"1a3b109f-d918-4f92-8f02-1102f3f02776\"]\n A fast evolving literature\n 0\n 0\n Food safety, food fraud, and food defense\n 81\n 2016\n \n \n d47914ed-11a6-4b74-a863-8dd7f6e70091\n _Jane Doe\n 2017-05-22T08:04:33\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n BACKGROUND: Food regulatory bodies play an important role in public health, and in reducing the costs of food borne illness that are absorbed by both industry and government. Regulation in the food industry involves a relationship between regulators and members of the industry, and it is imperative that these relationships are built on trust. Research has shown in a variety of contexts that businesses find the most success when there are high levels of trust between them and their key stakeholders. An evidence-based understanding of the barriers to communication and trust is imperative if we are to put forward recommendations for facilitating the (re)building of trusting and communicative relationships. METHODS: We present data from 72 interviews with regulators and industry representatives regarding their trust in and communication with one another. Interviews were conducted in the UK, New Zealand, and Australia in 2013. RESULTS: Data identify a variety of factors that shape the dynamic and complex relationships between regulators and industry, as well as barriers to communication and trust between the two parties. Novel in our approach is our emphasis on identifying solutions to these barriers from the voices of industry and regulators. CONCLUSIONS: We provide recommendations (e.g., development of industry advisory boards) to facilitate the (re)building of trusting and communicative relationships between the two parties.\n Meyer.2017\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Meyer, Wilson et al 2017 - In the interest of food.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2017-01-01T00:00:00\n 10.1186/s12889-017-4118-x\n 0\n 0\n false\n false\n eng\n en\n 189\n \n 1\n true\n 1\n 1\n\n\n 13\n true\n 13\n 13\n\n1-13]]>\n 1\n 30\n 28193265\n 0\n JournalArticle\n Meyer, Wilson et al. 2017 – In the interest of food\n 0\n PubMed\n [\"79627d7c-a838-47c9-9184-fde7757d8f95\"]\n A qualitative study investigating communication and trust between food regulators and food industry in the UK, Australia and New Zealand\n 0\n 0\n In the interest of food safety\n 17\n 2017\n \n \n bf222998-c7a3-47fb-bc1c-b191e74f8a50\n _Jane Doe\n 2017-05-22T07:56:38\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n Fake soy sauce, fake rice, fake eggs – those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Fake soy sauce, fake rice, fake eggs \\u8211 those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Fake soy sauce, fake rice, fake eggs – those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.</p>\n 2017-05-22\n Millward.20170324\n 0\n 2017-03-24\n 2017-03-24T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.techinasia.com/alibaba-fake-food-detection-blockchain\n -1\n 0\n NewspaperArticle\n Millward 2017-03-24 – Alibaba to use blockchain\n 0\n [\"208ddbaf-3caf-4f35-8591-17beb2fd739a\"]\n 0\n 0\n Alibaba to use blockchain to fight China’s fake food\n \n \n 506c8e72-ff94-480e-9267-3036d694b546\n _Jane Doe\n 2017-05-24T12:17:05\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Milk adulteration is a current fraudulent practice to mask the quality parameters (e.g. protein and fat content) and increase the product shelf life. Milk adulteration includes addition of toxic substances, such as formaldehyde, hydrogen peroxide, hypochlorite, dichromate, salicylic acid, melamine, and urea. In order to assure the food safety and avoid health risks to consumers, novel analytical procedures have been proposed for detection of these adulterants. The innovations encompass sample pretreatment and improved detection and data processing, including chemometric tools. This review focuses on critical evaluation of analytical approaches for assay of milk adulteration, with emphasis on applications published after 2010. Alternatives for fast, environmentally friendly and in-situ detection of milk adulterants are highlighted.\n Nascimento.2017\n 0\n 2017-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 1232\n true\n 1232\n 1232\n\n\n 1244\n true\n 1244\n 1244\n\n1232-1244]]>\n 1232\n 30\n 27979084\n 0\n JournalArticle\n Nascimento, Santos et al. 2017 – Recent advances on determination\n 0\n PubMed\n [\"04f160d3-f434-4e4c-9835-730086f32fab\"]\n 0\n 0\n Recent advances on determination of milk adulterants\n 221\n 2017\n \n \n _Jane Doe\n 2017-05-22T12:02:39\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-22\n NestecLtd..2016\n 0\n 2016\n 2016-01-01T00:00:00\n 0\n 1\n An example of an industry-created guide for preventing food fraud.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 An example of an industry-created guide for preventing food fraud. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>An example of an industry-created guide for preventing food fraud. </p>\n false\n false\n eng\n en\n http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf\n <c>13</c> \n<in>true</in> \n<os>13</os> \n<ps>13</ps>\n -1\n Vevey, Switzerland\n 0\n UnpublishedWork\n Nestec Ltd. 2016 – Food Fraud\n 0\n [\"6cabb958-863a-4430-a9cb-5cbd22e8f2ca\"]\n Economically-motivated adulteration\n 0\n 0\n Food Fraud\n \n \n _Jane Doe\n 2017-05-22T12:07:01\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Seafood is a global commodity traded all over the world, following a long, complex and non-transparent supply chain. It also serves as an important source of protein for millions of people every day. However, seafood fraud and species substitutions occur regularly, cheating consumers out of what they ordered and putting public health and the oceans at risk. In addition, seafood fraud allows illegally caught fish to be laundered into the legal seafood trade.\n 2017-05-22\n Oceana.2016\n 0\n 2016-01-01T00:00:00\n 0\n 1\n This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}{\\f1\\fnil\\fcharset0 Arial;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.</p>\n false\n false\n eng\n en\n https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU\n -1\n 3\n Map\n Oceana 2016 – Global seafood fraud\n 0\n [\"1838e3cb-d17d-46fa-a49f-337949a9a637\"]\n 0\n 0\n Global seafood fraud\n Interactive map\n 2016\n \n \n a9fef79e-b3b7-4040-8ce2-5445c3b89297\n _Jane Doe\n 2017-05-23T06:40:56\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Consumers' interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester-FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry-ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry-PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.\n Oliveira.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 3\n \n 359\n true\n 359\n 359\n\n\n 375\n true\n 375\n 375\n\n359-375]]>\n 359\n 30\n PMC5224536\n 28231211\n 0\n JournalArticle\n Oliveira, Alewijn et al. 2015 – Compositional signatures of conventional\n 0\n PubMed\n [\"e9a69d09-d2e9-4ede-a994-58217467226f\"]\n 0\n 0\n Compositional signatures of conventional, free range, and organic pork meat using fingerprint techniques\n 4\n 2015\n \n \n _Jane Doe\n 2017-05-22T08:02:48\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n [Description from publisher - J.S.] \nYou've seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn't. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we're eating is not what we're really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It's a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 [Description from publisher - J.S.]}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 You've seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn't. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we're eating is not what we're really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It's a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>[Description from publisher - J.S.]</p><p>You&#39;ve seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn&#39;t. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we&#39;re eating is not what we&#39;re really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It&#39;s a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters</p>\n Olmsted.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Olmsted 2016 - Real food fake food.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 9781616204211\n eng\n en\n <c>318</c> \n<in>true</in> \n<os>318</os> \n<ps>318</ps>\n -1\n Chapel Hill, North Carolina\n 0\n Book\n Olmsted 2016 – Real food fake food\n 0\n GBV Gemeinsamer Bibliotheksverbund\n [\"504afdaa-2da2-46e7-b4aa-1d5aa96d3be5\"]\n Why you don't know what you're eating & what you can do about it\n 0\n 1\n Real food, perfected : a day in the life of Parma \nWhat is fake food? \nFishy fish \nSpoiled oils : olive and \"truffle\" \nWhat's in a name? : real foods come from real places \nQ:Where's the Kobe beef? A:not on your plate \nChampagne and scotch : the sincerest form of flattery \nCheesy cheeses \nFine wines and not-so-fine wines \nThe other red (and white) meat? \nFakes, fakes, and more fakes : what else is there?\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0 \n;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Real food, perfected : a day in the life of Parma}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 What is fake food?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Fishy fish}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Spoiled oils : olive and \"truffle\"}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 What's in a name? : real foods come from real places} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Q:Where's the Kobe beef? A:not on your plate}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1 \n\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Champagne and scotch : the sincerest form of flattery}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Cheesy cheeses}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Fine wines and not-so-fine wines}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 The other red (and white) meat?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Fakes, fakes, and more fakes : what else is there?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Real food, perfected : a day in the life of Parma</p><p>What is fake food?</p><p>Fishy fish</p><p>Spoiled oils : olive and &quot;truffle&quot;</p><p>What&#39;s in a name? : real foods come from real places</p><p>Q:Where&#39;s the Kobe beef? A:not on your plate</p><p>Champagne and scotch : the sincerest form of flattery</p><p>Cheesy cheeses</p><p>Fine wines and not-so-fine wines</p><p>The other red (and white) meat?</p><p>Fakes, fakes, and more fakes : what else is there?</p>\n Real food fake food\n 2016\n \n \n 21d7a947-9a3c-4f93-ad14-8ef4c050bfe9\n _Jane Doe\n 2017-05-22T08:24:49\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Opara.2003\n 0\n 2003-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 101\n true\n 101\n 101\n\n\n 106\n true\n 106\n 106\n\n101-106]]>\n 101\n 30\n 0\n JournalArticle\n Opara 2003 – Traceability in agriculture and food\n 0\n EndNote Tagged Import Format\n [\"5c6cde77-701b-4cc5-a446-e247ad3dc371\"]\n A review of basic concepts, technological implications, and future prospects\n 0\n 0\n Traceability in agriculture and food supply chain\n 1\n 2003\n \n \n _Jane Doe\n 2017-05-23T14:19:18\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-23\n Pawar.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n 9780853583080\n eng\n en\n http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf\n -1\n ISL 2015\n Nottingham\n 0\n ConferenceProceedings\n Pawar, Rogers et al. (Ed.) 2015 – Reflections on supply chain research\n 0\n WorldCat\n Bologna, Italy\n July 5th - 8th, 2015\n [\"e1e0c888-30c2-47a4-a2f9-05c597655820\"]\n The proceedings of 20th International Symposium on Logistics (ISL 2015)\n 0\n 0\n Reflections on supply chain research and practice\n 2015\n \n \n ae89202c-4fd6-431a-89c6-03922e44af4d\n _Jane Doe\n 2017-05-23T09:54:08\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Leveraging blockchain for food supply chain tracking and authentication, is critical to finding and helping to address sources of contamination worldwide.\n 2017-05-23\n Ramamurthy.20161116\n 0\n 2016-11-16T00:00:00\n 0\n 1\n This blog article discusses IBM, Walmart, and Tsinghua University's pilot program to apply blockchain technology to tracing the food supply chain.\n {\\rtf1\\ansi \n\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 This blog article discusses IBM, Walmart, and Tsinghua University's pilot program to apply blockchain technology to tracing the food supply chain. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>This blog article discusses IBM, Walmart, and Tsinghua University&#39;s pilot program to apply blockchain technology to tracing the food supply chain. </p>\n false\n false\n eng\n en\n https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/\n -1\n 0\n InternetDocument\n Ramamurthy 2016-11-16 – Leveraging blockchain to improve food\n 0\n [\"423a99b9-dd6a-489d-b496-535526d374ef\"]\n 0\n 0\n Leveraging blockchain to improve food supply chain traceability\n Blog post\n 2016-11-16\n \n \n _Jane Doe\n 2017-05-22T08:10:38\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Food Fraud provides an overview of the current state on the topic to help readers understand which products are being impacted, how pervasive food fraud is, and what laws are in effect across the developed world. As international food trade increases, food processors, distributors, and consumers are purchasing more and more food from foreign countries that, in many cases, have inadequate oversight or control over what is coming into our supermarkets, restaurants, and refrigerators. This book is an essential quick reference that will familiarize readers with the latest issues surrounding the food industry.\n Ryan.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Ryan 2016 - Food fraud.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 0128033932\n eng\n en\n <c>92</c> \n<os>92 pages</os> \n<ps>92 pages</ps>\n -1\n Amsterdam; Boston\n 0\n Book\n Ryan 2016 – Food fraud\n 0\n Library of Congress\n [\"78818239-2d41-44da-9d70-7b402dc63d44\"]\n 0\n 1\n Table of Contents \n Introduction \n Chapter 1. Background \n Abstract \n 1.1 Risk \n 1.2 Prevention Versus Corrective Action \n Chapter 2. Some Food Fraud Laws \n Abstract \n 2.1 Defining Food Fraud in the European Union \n 2.2 Defining Food Fraud in the United States \n 2.3 Executive Responsibilities and Prosecution: The Park Doctrine \n 2.4 FDA Ties with Customs and Border Protection and Homeland Security \n 2.5 Introduction of an Adulterated Food into Interstate Commerce \n 2.6 The Potential for Terrorism \n Chapter 3. Food Fraud Through the Supply Chain \n Abstract \n 3.1 Labeling \n 3.2 Blends: Walking on the Edge \n 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates \n 3.4 Supply Chain Food Fraud Examples \n Chapter 4. Unprotected Customers \n Abstract \n 4.1 Detection Testing and the Authentication Dilemma \n 4.2 Whistle Blowers \n 4.3 What are Consumers Being Told? \n Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems \n Abstract \n 5.1 Item Level Traceability \n 5.2 Barcode: Case Level Traceability \n 5.3 Pallet Level Traceability and Temperature Monitoring \n 5.4 Pallet and Container Level Traceability and Temperature Monitoring \n 5.5 Container Level Traceability and Temperature Control \n 5.6 Recall and the Chain of Custody \n Chapter 6. Recommendations \n Abstract \n 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement \n 6.2 Take Responsibility \n 6.3 Get Training and Get Involved \n 6.4 Establish Preventive Purchasing Practices \n 6.5 Know Your Supply Chain \n 6.6 Establish a System of Distributed Authority \n 6.7 Invest in Prevention by Establishing a System of Continuous Improvement \n 6.8 Hire Honest People \n 6.9 Proactively Cooperate with the Competition \n 6.10 Help Prosecute and Publicize \n Chapter 7. Available Resources \n Abstract \n 7.1 Some International Experts \n 7.2 Better Seafood Board (BSB) \n 7.3 FDA DNA Seafood Labeling Training \n 7.4 FDA Fish Substitutes \n 7.5 The University of Michigan Food Fraud Initiative \n 7.6 The US Pharmacopeial Food Fraud Database \n 7.7 Food Fraudster \n 7.8 UK Food Standards Agency “Reporting food fraud” \n 7.9 European Commission Official Controls and Enforcement \n 7.10 National Center for Food Protection and Defense: Food Fraud Resources \n 7.11 National Science Foundation (NSF) \n 7.12 Rapid Alert System for Food and Feed (RASFF) \n Chapter 8. Summary: Confusion Reigns\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;} \n{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Table of Contents}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Introduction}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 1. Background}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 1.1 Risk}{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cf1 1.2 Prevention Versus Corrective Action}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 2. Some Food Fraud Laws}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.1 Defining Food Fraud in the European Union}{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cf1 2.2 Defining Food Fraud in the United States}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1 \n\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.3 Executive Responsibilities and Prosecution: The Park Doctrine}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.4 FDA Ties with Customs and Border Protection and Homeland Security} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.5 Introduction of an Adulterated Food into Interstate Commerce}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 2.6 The Potential for Terrorism}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 3. Food Fraud Through the Supply Chain}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.1 Labeling}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.2 Blends: Walking on the Edge}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 3.4 Supply Chain Food Fraud Examples} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 4. Unprotected Customers}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 4.1 Detection Testing and the Authentication Dilemma}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 4.2 Whistle Blowers}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 4.3 What are Consumers Being Told?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1 \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.1 Item Level Traceability} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.2 Barcode: Case Level Traceability}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1 \n\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.3 Pallet Level Traceability and Temperature Monitoring}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.4 Pallet and Container Level Traceability and Temperature Monitoring} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.5 Container Level Traceability and Temperature Control}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql \n\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 5.6 Recall and the Chain of Custody}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 6. Recommendations}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cf1 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.2 Take Responsibility}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.3 Get Training and Get Involved}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 6.4 Establish Preventive Purchasing Practices}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.5 Know Your Supply Chain}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.6 Establish a System of Distributed Authority}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.7 Invest in Prevention by Establishing a System of Continuous Improvement} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.8 Hire Honest People}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.9 Proactively Cooperate with the Competition}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 6.10 Help Prosecute and Publicize}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 7. Available Resources} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Abstract}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.1 Some International Experts}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.2 Better Seafood Board (BSB)}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.3 FDA DNA Seafood Labeling Training}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1\\cf1 7.4 FDA Fish Substitutes}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.5 The University of Michigan Food Fraud Initiative}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.6 The US Pharmacopeial Food Fraud Database}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.7 Food Fraudster} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.8 UK Food Standards Agency \\u8220 Reporting food fraud\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.9 European Commission Official Controls and Enforcement}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1 \n\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.10 National Center for Food Protection and Defense: Food Fraud Resources} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.11 National Science Foundation (NSF)}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 7.12 Rapid Alert System for Food and Feed (RASFF)}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par} \n\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Chapter 8. Summary: Confusion Reigns}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Table of Contents</p><p> Introduction</p><p> Chapter 1. Background</p><p> Abstract</p><p> 1.1 Risk</p><p> 1.2 Prevention Versus Corrective Action</p><p> Chapter 2. Some Food Fraud Laws</p><p> Abstract</p><p> 2.1 Defining Food Fraud in the European Union</p><p> 2.2 Defining Food Fraud in the United States</p><p> 2.3 Executive Responsibilities and Prosecution: The Park Doctrine</p><p> 2.4 FDA Ties with Customs and Border Protection and Homeland Security</p><p> 2.5 Introduction of an Adulterated Food into Interstate Commerce</p><p> 2.6 The Potential for Terrorism</p><p> Chapter 3. Food Fraud Through the Supply Chain</p><p> Abstract</p><p> 3.1 Labeling</p><p> 3.2 Blends: Walking on the Edge</p><p> 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates</p><p> 3.4 Supply Chain Food Fraud Examples</p><p> Chapter 4. Unprotected Customers</p><p> Abstract</p><p> 4.1 Detection Testing and the Authentication Dilemma</p><p> 4.2 Whistle Blowers</p><p> 4.3 What are Consumers Being Told?</p><p> Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems</p><p> Abstract</p><p> 5.1 Item Level Traceability</p><p> 5.2 Barcode: Case Level Traceability</p><p> 5.3 Pallet Level Traceability and Temperature Monitoring</p><p> 5.4 Pallet and Container Level Traceability and Temperature Monitoring</p><p> 5.5 Container Level Traceability and Temperature Control</p><p> 5.6 Recall and the Chain of Custody</p><p> Chapter 6. Recommendations</p><p> Abstract</p><p> 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement</p><p> 6.2 Take Responsibility</p><p> 6.3 Get Training and Get Involved</p><p> 6.4 Establish Preventive Purchasing Practices</p><p> 6.5 Know Your Supply Chain</p><p> 6.6 Establish a System of Distributed Authority</p><p> 6.7 Invest in Prevention by Establishing a System of Continuous Improvement</p><p> 6.8 Hire Honest People</p><p> 6.9 Proactively Cooperate with the Competition</p><p> 6.10 Help Prosecute and Publicize</p><p> Chapter 7. Available Resources</p><p> Abstract</p><p> 7.1 Some International Experts</p><p> 7.2 Better Seafood Board (BSB)</p><p> 7.3 FDA DNA Seafood Labeling Training</p><p> 7.4 FDA Fish Substitutes</p><p> 7.5 The University of Michigan Food Fraud Initiative</p><p> 7.6 The US Pharmacopeial Food Fraud Database</p><p> 7.7 Food Fraudster</p><p> 7.8 UK Food Standards Agency “Reporting food fraud”</p><p> 7.9 European Commission Official Controls and Enforcement</p><p> 7.10 National Center for Food Protection and Defense: Food Fraud Resources</p><p> 7.11 National Science Foundation (NSF)</p><p> 7.12 Rapid Alert System for Food and Feed (RASFF)</p><p> Chapter 8. Summary: Confusion Reigns</p>\n Food fraud\n 2016\n \n \n ffa21229-056a-4d12-87ed-9c9b99dd4517\n _Jane Doe\n 2017-05-22T11:16:01\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n From fake eggs to horsemeat burgers, food fraud is common, but hard to detect. How can we be sure that what we’re eating is the real thing?\n 2017-05-22\n Sample.20160226\n 0\n 2016-02-26T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast\n -1\n 0\n AudioOrVideoDocument\n Sample, Chambers 2016-02-26 – A proper mouthful\n 0\n [\"36069b58-90be-414b-831b-2081bf44c26b\"]\n How do we prevent food fraud?\n 0\n 0\n A proper mouthful\n Podcast\n 2016-02-26\n \n \n _Jane Doe\n 2017-05-24T12:46:57\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n [Description from publisher - J.S.] \nA powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 [Description from publisher - J.S.]}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240 \n\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 A powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>[Description from publisher - J.S.]</p><p>A powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.</p>\n 2017-05-24\n Sciex.20170329\n 0\n 2017-03-29T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://sciex.com/products/software/markerview-software\n -1\n 0\n ComputerProgram\n Sciex 2017-03-29 – MarkerView Software\n 0\n Windows 7 or later\n 1.3.1\n [\"1ce6bdd0-3df6-43b7-aa18-a8b22bde8a67\"]\n 0\n 0\n MarkerView Software\n 2017-03-29\n \n \n 01555634-9293-4288-bfef-2fa44000717d\n _Jane Doe\n 2017-05-23T14:48:56\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.  They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.\\~ They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.&#160; They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.</p>\n 2017-05-23\n Spink.20140508\n 0\n 2014-05-08T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/\n -1\n 0\n InternetDocument\n Spink 2014-05-08 – GFSI direction on food fraud\n 0\n [\"ef55aa5c-a0ab-4b7c-bb5a-72c4727f8b39\"]\n 0\n 0\n GFSI direction on food fraud and vulnerability assessment (VACCP)\n Blog post\n 2014-05-08\n \n \n 7f2b5e6b-dfc0-46e5-b94b-2c3e21cb1ebc\n _Jane Doe\n 2017-05-22T08:06:30\n _Jkli14\n 2024-10-10T12:11:38\n 1\n 1\n Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that—economically motivated—but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud—it focuses specifically on the public health threat—and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications ofthe crime triangle and the chemistry ofthe crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0\\fprq2{\\*\\panose 02020603050405020304}Times New Roman \n;}{\\f1\\froman\\fcharset2\\fprq2{\\*\\panose 05050102010706020507}Symbol;}{\\f2\\fswiss\\fcharset0\\fprq2{\\*\\panose 020b0604020202020204}Arial;}{\\f3\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\sqformat\\spriority0\\sa120\\aspalpha\\aspnum \n\\adjustright\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\af3\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3 Normal;}{\\s1\\sbasedon0\\snext0\\styrsid15694742\\sqformat\\spriority0\\keepn\\sb240\\sa480\\aspalpha\\aspnum\\adjustright\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\rtlch\\ab\\af3\\afs32\\ltrch\\b\\fs28\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\kerning32 heading 1;}{\\*\\cs10\\additive\\ssemihidden\\spriority0 Default Paragraph Font;}}{\\*\\rsidtbl\\rsid10976062}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{ \n\\info\\version1\\edmins0\\nofpages1\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055 \n\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1{\\*\\wgrffmtfilter 013f}\\viewkind1\\viewscale100\\fet0\\ftnbj\\aenddoc\\ftnrstcont\\aftnrstcont\\ftnnar\\aftnnrlc\\widowctrl\\nospaceforul\\nolnhtadjtbl\\alntblind\\lyttblrtgr\\dntblnsbdb\\noxlattoyen\\wrppunct \n\\nobrkwrptbl\\expshrtn\\snaptogridincell\\asianbrkrule\\htmautsp\\noultrlspc\\useltbaln\\splytwnine\\ftnlytwnine\\lytcalctblwd\\allowfieldendsel\\lnbrkrule\\nouicompat\\nofeaturethrottle1\\formshade\\nojkernpunct\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\sectlinegrid360\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\guttersxn0\\headery708\\footery708\\colsx708\\ltrsect\\pard\\plain\\itap0\\s0\\sa120\\aspalpha\\aspnum\\adjustright\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\af3\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that\\u8212 economically motivated\\u8212 but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud\\u8212 it focuses specifically on the public health threat\\u8212 and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications } \n{\\rtlch\\af3\\afs18\\ltrch\\b0\\i\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 ofthe crime triangle }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 and }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i\\fs18\\lang2055\\langnp2055 \n\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 the chemistry ofthe crime. }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 The research provides a }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i\\fs18\\lang2055\\langnp2055 \n\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 food risk matrix }{\\rtlch\\af3\\afs18\\ltrch\\b0\\i0\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10 and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.} \n{\\rtlch\\af3\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af3\\dbch\\af3\\hich\\f3\\insrsid10976062\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef0\\lsdunhideuseddef0\\lsdqformatdef0\\lsdprioritydef0{\\lsdlockedexcept\\lsdqformat1 Normal;\\lsdqformat1 heading 1;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 2;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 3 \n;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 4;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 5;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 6;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 7;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 8 \n;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 heading 9;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1 caption;\\lsdqformat1 Title;\\lsdqformat1 Subtitle;\\lsdqformat1 Strong;\\lsdqformat1 Emphasis;\\lsdsemihidden1\\lsdpriority99 Placeholder Text;\\lsdqformat1\\lsdpriority1 No Spacing \n;\\lsdpriority60 Light Shading;\\lsdpriority61 Light List;\\lsdpriority62 Light Grid;\\lsdpriority63 Medium Shading 1;\\lsdpriority64 Medium Shading 2;\\lsdpriority65 Medium List 1;\\lsdpriority66 Medium List 2;\\lsdpriority67 Medium Grid 1;\\lsdpriority68 Medium Grid 2 \n;\\lsdpriority69 Medium Grid 3;\\lsdpriority70 Dark List;\\lsdpriority71 Colorful Shading;\\lsdpriority72 Colorful List;\\lsdpriority73 Colorful Grid;\\lsdpriority60 Light Shading Accent 1;\\lsdpriority61 Light List Accent 1;\\lsdpriority62 Light Grid Accent 1;\\lsdpriority63 Medium Shading 1 Accent 1 \n;\\lsdpriority64 Medium Shading 2 Accent 1;\\lsdpriority65 Medium List 1 Accent 1;\\lsdsemihidden1\\lsdpriority99 Revision;\\lsdqformat1\\lsdpriority34 List Paragraph;\\lsdqformat1\\lsdpriority29 Quote;\\lsdqformat1\\lsdpriority30 Intense Quote;\\lsdpriority66 Medium List 2 Accent 1 \n;\\lsdpriority67 Medium Grid 1 Accent 1;\\lsdpriority68 Medium Grid 2 Accent 1;\\lsdpriority69 Medium Grid 3 Accent 1;\\lsdpriority70 Dark List Accent 1;\\lsdpriority71 Colorful Shading Accent 1;\\lsdpriority72 Colorful List Accent 1;\\lsdpriority73 Colorful Grid Accent 1 \n;\\lsdpriority60 Light Shading Accent 2;\\lsdpriority61 Light List Accent 2;\\lsdpriority62 Light Grid Accent 2;\\lsdpriority63 Medium Shading 1 Accent 2;\\lsdpriority64 Medium Shading 2 Accent 2;\\lsdpriority65 Medium List 1 Accent 2;\\lsdpriority66 Medium List 2 Accent 2 \n;\\lsdpriority67 Medium Grid 1 Accent 2;\\lsdpriority68 Medium Grid 2 Accent 2;\\lsdpriority69 Medium Grid 3 Accent 2;\\lsdpriority70 Dark List Accent 2;\\lsdpriority71 Colorful Shading Accent 2;\\lsdpriority72 Colorful List Accent 2;\\lsdpriority73 Colorful Grid Accent 2 \n;\\lsdpriority60 Light Shading Accent 3;\\lsdpriority61 Light List Accent 3;\\lsdpriority62 Light Grid Accent 3;\\lsdpriority63 Medium Shading 1 Accent 3;\\lsdpriority64 Medium Shading 2 Accent 3;\\lsdpriority65 Medium List 1 Accent 3;\\lsdpriority66 Medium List 2 Accent 3 \n;\\lsdpriority67 Medium Grid 1 Accent 3;\\lsdpriority68 Medium Grid 2 Accent 3;\\lsdpriority69 Medium Grid 3 Accent 3;\\lsdpriority70 Dark List Accent 3;\\lsdpriority71 Colorful Shading Accent 3;\\lsdpriority72 Colorful List Accent 3;\\lsdpriority73 Colorful Grid Accent 3 \n;\\lsdpriority60 Light Shading Accent 4;\\lsdpriority61 Light List Accent 4;\\lsdpriority62 Light Grid Accent 4;\\lsdpriority63 Medium Shading 1 Accent 4;\\lsdpriority64 Medium Shading 2 Accent 4;\\lsdpriority65 Medium List 1 Accent 4;\\lsdpriority66 Medium List 2 Accent 4 \n;\\lsdpriority67 Medium Grid 1 Accent 4;\\lsdpriority68 Medium Grid 2 Accent 4;\\lsdpriority69 Medium Grid 3 Accent 4;\\lsdpriority70 Dark List Accent 4;\\lsdpriority71 Colorful Shading Accent 4;\\lsdpriority72 Colorful List Accent 4;\\lsdpriority73 Colorful Grid Accent 4 \n;\\lsdpriority60 Light Shading Accent 5;\\lsdpriority61 Light List Accent 5;\\lsdpriority62 Light Grid Accent 5;\\lsdpriority63 Medium Shading 1 Accent 5;\\lsdpriority64 Medium Shading 2 Accent 5;\\lsdpriority65 Medium List 1 Accent 5;\\lsdpriority66 Medium List 2 Accent 5 \n;\\lsdpriority67 Medium Grid 1 Accent 5;\\lsdpriority68 Medium Grid 2 Accent 5;\\lsdpriority69 Medium Grid 3 Accent 5;\\lsdpriority70 Dark List Accent 5;\\lsdpriority71 Colorful Shading Accent 5;\\lsdpriority72 Colorful List Accent 5;\\lsdpriority73 Colorful Grid Accent 5 \n;\\lsdpriority60 Light Shading Accent 6;\\lsdpriority61 Light List Accent 6;\\lsdpriority62 Light Grid Accent 6;\\lsdpriority63 Medium Shading 1 Accent 6;\\lsdpriority64 Medium Shading 2 Accent 6;\\lsdpriority65 Medium List 1 Accent 6;\\lsdpriority66 Medium List 2 Accent 6 \n;\\lsdpriority67 Medium Grid 1 Accent 6;\\lsdpriority68 Medium Grid 2 Accent 6;\\lsdpriority69 Medium Grid 3 Accent 6;\\lsdpriority70 Dark List Accent 6;\\lsdpriority71 Colorful Shading Accent 6;\\lsdpriority72 Colorful List Accent 6;\\lsdpriority73 Colorful Grid Accent 6 \n;\\lsdqformat1\\lsdpriority19 Subtle Emphasis;\\lsdqformat1\\lsdpriority21 Intense Emphasis;\\lsdqformat1\\lsdpriority31 Subtle Reference;\\lsdqformat1\\lsdpriority32 Intense Reference;\\lsdqformat1\\lsdpriority33 Book Title;\\lsdsemihidden1\\lsdunhideused1\\lsdpriority37 Bibliography \n;\\lsdsemihidden1\\lsdunhideused1\\lsdqformat1\\lsdpriority39 TOC Heading;}}}\n <p>Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that—economically motivated—but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud—it focuses specifically on the public health threat—and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications <em>ofthe crime triangle </em>and <em>the chemistry ofthe crime. </em>The research provides a <em>food risk matrix </em>and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.</p>\n Spink.2011\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defining the public health threat.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2011-01-01T00:00:00\n 10.1111/j.1750-3841.2011.02417.x\n 0\n 1\n Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0 \n\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead \n\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0 \n\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.</p>\n false\n false\n eng\n en\n 9\n \n Other\n Omit\n R157-R163\n R157-R163\n\nR157-R163]]>\n 2147483647\n 100\n 22416717\n 4\n JournalArticle\n Spink, Moyer 2011 – Defining the public health threat\n 0\n PubMed\n [\"b04843d7-7503-400f-98ac-48f6b9b81dfe\"]\n 0\n 0\n Defining the public health threat of food fraud\n 76\n 2011\n \n \n 506c8e72-ff94-480e-9267-3036d694b546\n _Jane Doe\n 2017-05-22T08:05:56\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n This paper introduces the topic of Food Fraud with translations to Russian, Korean, and Chinese. The concepts provide a system-wide focus leading to prevention. The goal is not to detect Food Fraud but to adjust entire food supply chains to reduce fraud opportunities. Food Fraud is a recently defined area of Food Protection between Food Safety (such as Salmonella or pesticide residue), and Food Defense (malicious intent to harm such as terrorism). Food Fraud is intentional with no intent to harm but only for economic gain. As with improving Food Safety and Food Defense, preventing Food Fraud is good for society and the economy. Society benefits through fewer public health threats from unauthorized acts. Society also benefits from increased consumer satisfaction and harmony. Food Security is increased through the production of more, higher-value products for consumers, commerce, and exporting. Food Fraud can reduce economic output because sickened citizens cannot work and it also reduces consumer confidence leading to less commerce.\n Spink.2015\n 0\n 2015-01-01T00:00:00\n 10.1016/j.foodchem.2014.09.106\n 0\n 0\n false\n false\n eng\n en\n \n 102\n true\n 102\n 102\n\n\n 107\n true\n 107\n 107\n\n102-7]]>\n 102\n 30\n 26190607\n 0\n JournalArticle\n Spink, Moyer et al. 2015 – Introducing food fraud including translation\n 0\n PubMed\n [\"209a8163-390b-479b-815c-64837ced9916\"]\n 0\n 0\n Introducing food fraud including translation and interpretation to Russian, Korean, and Chinese languages\n 189\n 2015\n \n \n 16b93298-3e3b-4cbe-95a3-46c388ae976b\n _Jane Doe\n 2017-05-22T08:26:04\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n [Description from publisher - J.S.] \nModern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially. \nDriving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 [Description from publisher - J.S.]}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql \n\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Modern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Driving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>[Description from publisher - J.S.]</p><p>Modern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially.</p><p>Driving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.</p>\n Tarnanidis.2017\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Tarnanidis, Vlachopoulou et al (Ed) 2017 - Driving agribusiness with technology innovations.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2017-01-01T00:00:00\n 0\n 0\n false\n false\n 9781522521075\n eng\n en\n Jane Doe, 2017-05-24\n -1\n Hershey, Pennsylvania\n 0\n BookEdited\n Tarnanidis, Vlachopoulou et al. (Ed.) 2017 – Driving agribusiness with technology innovations\n 0\n OriginalSource\n [\"6ec6a891-18c7-4e1c-936a-552eca647a4e\"]\n 0\n 1\n Driving agribusiness with technology innovations\n 2017\n \n \n abec8f64-7960-4c81-a220-72a849ff4bc2\n _Jane Doe\n 2017-05-22T08:07:31\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Coffee is a ubiquitous food product of considerable economic importance to the countries that produce and export it. The adulteration of roasted coffee is a strategy used to reduce costs. Conventional methods employed to identify adulteration in roasted and ground coffee involve optical and electron microscopy, which require pretreatment of samples and are time-consuming and subjective. Other analytical techniques have been studied that might be more reliable, reproducible, and widely applicable. The present review provides an overview of three analytical approaches (physical, chemical, and biological) to the identification of coffee adulteration. A total of 30 published articles are considered. It is concluded that despite the existence of a number of excellent studies in this area, there still remains a lack of a suitably sensitive and widely applicable methodology able to take into account the various different aspects of adulteration, considering coffee varieties, defective beans, and external agents.\n Toci.2016\n 0\n 2016-01-01T00:00:00\n 10.1080/10408347.2014.966185\n 0\n 0\n false\n false\n eng\n en\n 2\n \n 83\n true\n 83\n 83\n\n\n 92\n true\n 92\n 92\n\n83-92]]>\n 83\n 30\n 25633422\n 0\n JournalArticle\n Toci, Farah et al. 2016 – Coffee adulteration\n 0\n PubMed\n [\"2cbb47e0-a653-4cf6-bfaa-091267c24bd2\"]\n More than two decades of research\n 0\n 0\n Coffee adulteration\n 46\n 2016\n \n \n _Jane Doe\n 2017-05-23T15:45:39\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-23\n UnitedStatesCongress.20170104\n 0\n 2017-01-04\n 2017-01-04T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf\n <c>89</c> \n<in>true</in> \n<os>89</os> \n<ps>89</ps>\n -1\n 0\n StatuteOrRegulation\n United States Congress 2017-01-04 – FDA Food Safety Modernization Act\n 0\n [\"85e8a727-9877-450a-b022-ab229fa2544e\"]\n 21 USC 2201\n 0\n 0\n FDA Food Safety Modernization Act\n \n \n _Jane Doe\n 2017-05-22T11:48:54\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-22\n UnitedStatesSupremeCourt.19140224\n 0\n 1914-02-24\n 1914-02-24T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://supreme.justia.com/cases/federal/us/232/399/\n -1\n 0\n CourtDecision\n United States Supreme Court 1914-02-24 – United States v\n 0\n 232 U.S. 399\n Ruling\n [\"a2ed45ae-8d38-4a63-9b44-32009c481476\"]\n 0\n 0\n United States v. Lexington Mill & Elevator Co.\n \n \n e63abf5c-e6a1-4d1d-a611-c05d83e4fad1\n _Jane Doe\n 2017-05-22T12:35:14\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Uyttendaele.2016\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 1\n -1\n 0\n SpecialIssue\n Uyttendaele, Franz et al. (Ed.) 2016 – Food safety\n 0\n [\"6c9e36bb-f02c-439d-856c-dece1d39d8a9\"]\n 0\n 0\n Food safety\n 13\n 2016\n \n \n 87ec0bec-c333-4236-8a6e-9c01a30afb01\n _Jane Doe\n 2017-05-22T08:05:31\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Wang.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Wang, He et al 2016 - DNA barcoding reveals commercial fraud.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 10.1007/s11427-015-4979-0\n 0\n 1\n Example of how DNA barcode tests can be used to detect when another species of animal is used.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aendnotes\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af0\\dbch\\af0\\hich\\f0 Example of how DNA barcode tests can be used to detect when another species of animal is used. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Example of how DNA barcode tests can be used to detect when another species of animal is used. </p>\n false\n false\n eng\n en\n 1\n \n 106\n true\n 106\n 106\n\n\n 108\n true\n 108\n 108\n\n106-8]]>\n 106\n 30\n 26758743\n 0\n JournalArticle\n Wang, He et al. 2016 – DNA barcoding reveals commercial fraud\n 0\n PubMed\n [\"dd370c61-685e-4abf-bdae-449aab92782a\"]\n 0\n 0\n DNA barcoding reveals commercial fraud related to yak jerky sold in China\n Letter to the editor\n 59\n 2016\n \n \n _Jane Doe\n 2017-05-23T11:02:22\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-23\n Wikipedia.20170522\n 0\n 2017-05-22\n 2017-05-22T00:00:00\n 0\n 0\n false\n false\n eng\n en\n https://en.wikipedia.org/w/index.php?oldid=781647563\n -1\n 0\n InternetDocument\n Wikipedia 2017-05-22 – 2008 Chinese milk scandal\n 0\n [\"65065a44-35ea-4024-b6dd-c656b0f597bf\"]\n 0\n 0\n 2008 Chinese milk scandal\n \n \n _Jane Doe\n 2017-05-22T12:44:27\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n 2017-05-22\n Winter.2008\n 0\n 2008-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html\n -1\n Davis, California\n 0\n MusicAlbum\n Winter 2008 – Still seems like food\n 0\n [\"f9b87794-01fa-420c-a7ac-3305c7534406\"]\n 0\n 0\n Still seems like food to me\n 2008\n \n \n 8efd2054-f646-4847-abfb-ba2bd171a5c9\n _Jane Doe\n 2017-05-22T08:22:13\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Yan.2012\n 0\n 2012-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n 3\n \n 705\n true\n 705\n 705\n\n\n 729\n true\n 729\n 729\n\n705-729]]>\n 705\n 30\n 0\n JournalArticle\n Yan 2012 – Food safety and social risk\n 0\n EndNote Tagged Import Format\n [\"03e71533-1bd7-49db-a724-b50be5568662\"]\n 0\n 0\n Food safety and social risk in contemporary China\n 71\n 2012\n \n \n _Jane Doe\n 2017-05-24T12:56:43\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Yang.2016\n 0\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n 978-1-5090-2842-9\n eng\n en\n -1\n Piscataway, NJ\n 0\n ConferenceProceedings\n Yang (Ed.) 2016 – 2016 13th International Conference\n 0\n WorldCat\n Kunming, China\n 2016 13th International Conference on Service Systems and Service Management (ICSSSM)\n [\"299148cd-198d-4e27-be59-d2d3b6600568\"]\n June 24-26, 2016, KUST, Kunming, China\n 0\n 0\n 2016 13th International Conference on Service Systems and Service Management (ICSSSM)\n 2016\n \n \n _Jane Doe\n 2017-05-22T08:25:43\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Bitzios.Inpress\n 0\n 0\n 0\n false\n false\n eng\n en\n -1\n 0\n Contribution\n Bitzios, Jack et al. [In press] – Dissonance in the food traceability\n 0\n EndNote Tagged Import Format\n [\"237e20c1-eb0c-4fe3-8775-d0db944ab6a0\"]\n 0\n 0\n Dissonance in the food traceability regulatory environment and food fraud\n \n \n _Jane Doe\n 2017-05-23T13:59:14\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Fassam.2015\n 0\n 2015-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 659\n true\n 659\n 659\n\n\n 666\n true\n 666\n 666\n\n659-666]]>\n 659\n 30\n 0\n Contribution\n Fassam, Dani et al. 2015 – Supply Chain Food Crime & Fraud\n 1\n [\"0537ba4b-5e79-430c-b93f-2d329447bd62\"]\n A systematic literature review of food criminality\n 0\n 0\n Supply chain food crime & fraud\n \n \n _Jane Doe\n 2017-05-22T08:26:04\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Karipidis.2017\n 0\n 2017-01-01T00:00:00\n 10.4018/978-1-5225-2107-5.ch005\n 0\n 0\n false\n false\n eng\n en\n Jane Doe, 2017-05-24\n \n 70\n true\n 70\n 70\n\n\n 90\n true\n 90\n 90\n\n70-90]]>\n 70\n 30\n 0\n Contribution\n Karipidis, Tselempis et al. 2017 – Eco-certification and transparency in global\n 0\n OriginalSource\n [\"b20c68ba-f1bf-4abf-bd02-0474850b7b48\"]\n 0\n 0\n Eco-certification and transparency in global food supply chains\n \n \n _Jane Doe\n 2017-05-22T08:26:26\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Manning.2016\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning 2016 - Food Integrity.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 0\n 0\n false\n false\n eng\n en\n \n 2\n true\n 2\n 2\n\n\n 6\n true\n 6\n 6\n\n2-6]]>\n 2\n 30\n 0\n Contribution\n Manning 2016 – Food Integrity\n 0\n EndNote Tagged Import Format\n [\"4c5a0397-68e9-4d01-9900-f2ea39269954\"]\n 0\n 0\n Food Integrity\n Guest editorial\n 119\n \n \n _Jane Doe\n 2017-05-24T12:56:43\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Tian.2016\n 0\n 2016-01-01T00:00:00\n 10.1109/ICSSSM.2016.7538424\n 0\n 0\n false\n false\n eng\n en\n \n 1\n true\n 1\n 1\n\n\n 6\n true\n 6\n 6\n\n1-6]]>\n 1\n 30\n 0\n Contribution\n Tian 2016 – An agri-food supply chain traceability\n 0\n CrossRef\n [\"04fc0ae6-e5f0-4289-afce-a172e65947ac\"]\n 0\n 0\n An agri-food supply chain traceability system for China based on RFID & blockchain technology\n \n \n _Jane Doe\n 2017-05-22T12:34:38\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 0\n Uyttendaele.2016b\n 0\n {\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Uyttendaele, Franz et al 2016 - Food safety.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}\n 2016-01-01T00:00:00\n 10.3390/ijerph13010067\n 0\n 0\n false\n false\n eng\n en\n Article number: 67\n \n Omit\n 1\n 1\n\n\n Omit\n 6\n 6\n\n1–6]]>\n 2147483647\n 100\n 0\n Contribution\n Uyttendaele, Franz et al. 2016 – Food safety\n 0\n CrossRef\n [\"f2bd722f-ef64-4402-85b0-282576cefe2c\"]\n 0\n 0\n Food safety, a global challenge\n 13\n \n \n _Jane Doe\n 2017-05-24T12:31:04\n _Jkli14\n 2024-10-10T12:11:38\n 0\n 1\n Purpose – The purpose of this paper is to describe the development of a comprehensive categorisation of food scares. \nDesign/methodology/approach – Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews. \nFindings – The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues). \nPractical implications – The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies. \nOriginality/value – The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery720\\footery720\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Purpose \\u8211 The purpose of this paper is to describe the development of a comprehensive categorisation of food scares.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1 \n\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Design/methodology/approach \\u8211 Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Findings \\u8211 The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues).} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Practical implications \\u8211 The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cf1 Originality/value \\u8211 The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Purpose – The purpose of this paper is to describe the development of a comprehensive categorisation of food scares.</p><p>Design/methodology/approach – Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews.</p><p>Findings – The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues).</p><p>Practical implications – The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies.</p><p>Originality/value – The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.</p>\n Whitworth.2016\n 0\n 2016-01-01T00:00:00\n 10.1108/BFJ-06-2016-0263\n 0\n 0\n false\n false\n eng\n en\n \n 131\n true\n 131\n 131\n\n\n 142\n true\n 142\n 142\n\n131-142]]>\n 131\n 30\n 0\n Contribution\n Whitworth, Druckman et al. 2016 – Food scares\n 0\n CrossRef\n [\"8d051049-c47a-4530-916a-c5d3178e38e4\"]\n A comprehensive categorisation\n 0\n 0\n Food scares\n 119\n \n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33;c9d75a8e-d769-4139-99b7-3870f391145a;6bd54f95-2c0b-460d-9d33-caf496c18736;57bd2669-0137-44b1-b7a0-92e48219970a\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32;93bde32b-f267-444e-b9fb-bd07d193beb2;2f82c9f9-d1d0-4d88-94a6-8281e1fac790;0955c7e5-8357-421a-8857-91ab1e2da9a5;37b9ba83-abc4-4b8d-bb22-52ebd1f99b15;f48de064-9816-4b68-99bf-74cd651e32f5;b0478930-1384-4181-98b9-b40ca4ad2476;02e873f4-2938-4189-ab21-89a64f7da357;f5b15b96-78d6-4b3e-8d10-7a73fdedb117;b81b03f3-38e7-40e7-8dac-8176d10bbfa4;61e7f1c2-97f8-494a-a1ae-b413ff35da26;96d01d00-5f47-481f-bce7-1c9489ed0457\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;4912a898-3fe3-4c90-8102-b8f30e34c74b;f73871ea-2cc7-4416-b8f9-f63c80303284;78714884-e825-4bcb-822c-479e32307d6d;4e8597e2-732f-41d8-9701-1b3fb46fcf9d;71f1c601-24c8-47e9-aa27-070c5458581e;a712620d-9df9-46f7-a647-c5b9c030d276\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;2367d88b-a780-41a8-9840-e18e26563e6b\n 60accf57-c086-423f-9068-7c1afdc2de1d;cd06eb60-d682-49cc-9895-d81017ca6d8f\n 2485a5d8-95f5-437f-8911-05111eb7e25e;47f7fda0-7e1a-46d2-b3f2-47ba54f9d513;2ef2837d-0a4f-457c-b043-869f736c23bb;e8f4f758-096f-47ce-aa24-df31a9851a06;61ecb063-2cb9-4c03-8f12-5b0f5d6cafea;9638b127-a3e8-49da-be7c-96245bc368d1;b5388801-8474-4085-b34a-e7135ece3ca5\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38;e2233367-e146-4e7e-83c5-f0e96e2acac8;d6a83194-336b-48f2-bfdd-4024d3bb6dfc\n 27dd2250-00b8-4587-8456-c68d0ca5af8a;9acad0e6-6104-4c20-a884-a112539adfcc\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;8027e748-f588-488e-a38d-30d68a4ed859;0782a361-f350-4c5c-a925-e3659d5e9e76\n 43ecc385-004b-4af0-b1cb-2d14c240e032;0c368006-04f3-48c6-9e61-8cff75a68301\n 1810f594-4e9e-47b4-905f-445171ad46c6;e0d1768c-bf89-4f01-9529-fb323eec75c9\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9;20ef3760-25e0-4a46-9976-aa058e40b904;32460ffc-d33c-4860-bdbc-ba0e16473dfa;19ce8a5e-7f6a-46bd-8e69-f3415f29e6d8;534f8d73-f994-40e9-b62b-330a1ff701bf;9ef2ff3b-1842-4e48-8ffa-7d469722c6ee;06cdff90-b237-4c38-9469-7987dbd5c5d1;fd81ebd9-da73-441d-b263-d429c1537da5\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f;a534ff7d-2405-4653-ad89-4ae0ca8098bd;03314236-dd07-48f7-b2c8-464416ac2f7c;fd6c664f-2af6-4659-ac91-144c38783953\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb;41ceda41-a523-4532-9ef8-673c2bd73773\n 27384b10-b549-45fc-80c7-94688793e9fc;98d60973-99bd-42cc-92fa-f43762154bb1;05f87947-2c3f-4243-8a47-71005a9c3025\n bc5000cc-1af0-4d23-837f-422c907de172;8c00e094-dc2a-45c7-9a10-1f6f7f652124;cb2115d4-0787-4855-b0c2-34633c934f5f;f3141c00-2101-4a2c-a14d-d0615f2b767c;2bd5e471-002a-4595-920e-1b33ebf080ba;f1707b56-e8ba-4d1b-93f2-8afe25d06161;87f34a41-7fc9-4d58-91c3-fcec681ce042;a8137b23-8cfe-4dfb-8095-e5e5c6229b92;860f9886-89a1-416e-ab57-c2c1ca2c429d;6eca11d9-bdfe-4ae1-a97e-c90b6c76fd25\n 7d50376a-ef59-4b6a-804f-79e6880ebd42;4a3f90ee-0ad1-4f84-a8b1-87b23f341495\n f16b35ce-1d93-423c-909a-61d0d5f693f8;bf11462d-2b92-4742-bca3-9482c7c19f84;41bb7862-195a-44e3-b6e0-5cba038c6551;af7c5b71-fca0-4d13-9f42-e747d80a0862;0b52f2e2-a76e-46ab-b60e-65fc3ad8a86b\n e365933e-9b5b-4bb1-ae02-326f41d2833a;35996983-3808-4ae1-b01b-c92a783358a9\n d0abc9c9-e230-4a30-ac87-7847e7fa0789;aaedf869-7717-44bd-9961-a55ad310309d;5b2c8e0a-55b4-4658-8cbd-dda3a8e8a816;3b59d029-272c-40ca-9429-6297ca888fc6;20912ce4-8b70-4541-b488-9c71b645fffe\n 24cba909-5cee-4d53-ae8c-95938ad33f89;07fd7721-9909-4a82-be3b-19bbaecf79bf\n 92976b82-1442-47c0-a23d-dd1a0178ce0c;ff1140f2-d280-4359-b9d7-a5229f6c6d01\n 89c1b839-ce76-43f4-be84-84d394af9179;695a0520-21e3-4846-8ece-0ff331721d76\n 5c99255f-527b-4ab4-a482-10c4441d08f0;f064500d-23cb-4e41-8e39-7d541ec17c96\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;31d76fbc-69f8-4860-afaf-821e88076602;f34a32c6-c26d-4bdc-a731-fc5c24edf84c\n d69a676f-1c2b-425b-bc36-ea52e1409bb2;a91ead06-d1e7-4226-b6b6-67526c201176\n 0d576b32-d148-4660-9d3c-05e19c6b7691;c7399cdd-9772-4a4e-96a6-c30c83ac9194\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;c7399cdd-9772-4a4e-96a6-c30c83ac9194;fba9bcc3-0c9a-4025-8b93-4eb0f9012353\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;c7399cdd-9772-4a4e-96a6-c30c83ac9194;fba9bcc3-0c9a-4025-8b93-4eb0f9012353;60fb854e-0061-4986-8ae2-869d00cc5362;22573de6-316a-4694-b0db-14793a798f62;963ca047-c1e2-42be-b196-8d39d8e1a25a;1bc42489-068e-454d-abf8-cc10bc27ea09;bb2ba502-8136-4dcf-87f4-4f9d376b4012;aac84b40-65c3-43f6-a9be-8bea001cc54d;a1992082-7358-4c74-9fd6-f50450925cd1\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;ae92db15-3070-4f5a-b265-6ff1140c772d;db3c00be-a7ee-4f64-a41b-f84e92a8b9ab;d3a15ce1-ef41-420b-978e-9ba7f26aedfe;11b980d3-c539-4169-82b4-67ed0b5a0467\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;6f14def1-b6fc-45ac-9dea-543ce0f82a8a;e4bb7295-65fb-41d4-8d55-d12f2bc81398;7b60f215-38b4-44a3-8678-ea81cc58d115;dfaf0ad4-db06-47c7-90d0-d619d1db69e8;c0bcaf9c-c4ef-457a-963e-1a0876e59425;fa651857-027b-4b7c-9cae-a2a77aa84d66;65d50ae2-b221-42f0-8ad3-f72273a994e8;968c4bdd-6f78-49f5-96ec-3077891b0705\n 57e829e1-dc28-4a02-956f-04d36967db37;a273d73a-27c9-4f78-8174-e6739eec07cb\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b;80acf8dc-9292-41bd-a033-800f931fd43f\n b213355e-df97-4b43-9e69-8a185817ce57;e1606424-50f4-410c-aa65-48466b299f46;37fa6c8e-f8b0-43bd-b758-a50a6e39cfa5;60d942c8-48a6-46b4-aa12-4fff8966c86c;e08e2cd2-602b-4ed9-b321-5cc7706a46d2\n 5fb48a7c-65db-4581-ab2c-7197305a0811;68a56870-e74a-4eed-9bbb-a31ed774ba11;02eaf2ee-8c67-4c3b-afc3-03e8d889418a;d560939c-c19b-4e59-8b70-d4f5c9166511\n cb44c440-80f8-4486-bf68-af79d9d716e2;2c27a537-7c52-4d90-a7c4-12172e99c7eb;9b2bc353-f12d-451d-ba12-14717ae4e0b6;404d7675-8ee4-451d-9a86-7e1cc76b8416\n 3012ebe2-c183-4d12-9851-5ab7b6d2421c;69a05370-5520-45b7-8043-6517fa20c97f\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa;885679a0-061d-4ed2-96c9-29431dd2f4fa\n d0c8a959-aa18-4a58-a996-96af08a09256;830c0ae9-16a8-4ba6-a3dc-fef48b1ee034;84ece7e8-f3d5-4b7a-a668-64524a235c02;42832498-f178-4e25-b572-da57fb3370f7\n 31cd5301-52f8-4c11-98f8-765ec869a45d;142121f0-c806-46d3-9b97-2126ad7fe4e4;db9b3dbc-0095-4487-bede-8dfc2fdb6ddc;675a90ee-5959-4841-9e2b-265e8c38c3e6\n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33;f1ba83e7-fdda-4bb8-bbe1-e84af8112dfa\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32;ddb219dd-dfc6-4f0b-b61b-cf5c1b179ae5\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;c8122f49-7dc9-49e0-8919-eefad7f416a9\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;ac5840bd-bca9-4faa-be65-b59301e55ff1;6aaba073-4a78-4cfc-b277-a12ecde05560\n 60accf57-c086-423f-9068-7c1afdc2de1d;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906\n 2485a5d8-95f5-437f-8911-05111eb7e25e;530cb647-c5aa-46b6-bb8f-d49dab51a26a\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 27dd2250-00b8-4587-8456-c68d0ca5af8a;d3100956-91ed-4965-ac76-7b66f51d147a\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d\n 43ecc385-004b-4af0-b1cb-2d14c240e032;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;fc506b83-b591-4183-b9a9-0041d2242545\n 3ab6253b-74b7-4701-9431-acfe6df2d2be;6aaba073-4a78-4cfc-b277-a12ecde05560\n 436a30e7-3930-4333-8204-e1bae37af76e;6aaba073-4a78-4cfc-b277-a12ecde05560\n 1810f594-4e9e-47b4-905f-445171ad46c6;de4970f8-9818-44d8-88cc-53d9ad4885a3\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8;721654e5-7ac1-42ac-9c9c-69111c7e8b90\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d\n ddf7203d-0229-46d5-badc-e6c35789df3f;de4970f8-9818-44d8-88cc-53d9ad4885a3\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8;fb23b54d-bb22-492a-b6a3-a60a2a1288f3\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f;55496d4d-9f92-44aa-89ce-3b30e5c437d7\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 27384b10-b549-45fc-80c7-94688793e9fc;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;73aa7410-7c17-4acc-83af-249657be15e6\n bc5000cc-1af0-4d23-837f-422c907de172;4afcfa69-74cc-4a95-8aba-4a6aadaf59c5;d3100956-91ed-4965-ac76-7b66f51d147a\n 7d50376a-ef59-4b6a-804f-79e6880ebd42;de4970f8-9818-44d8-88cc-53d9ad4885a3\n f16b35ce-1d93-423c-909a-61d0d5f693f8;c5730108-95c7-4468-a834-88a85d582130\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1;4bbd6753-30f2-4e3b-9e32-3c65b5037589\n e365933e-9b5b-4bb1-ae02-326f41d2833a;c8122f49-7dc9-49e0-8919-eefad7f416a9\n d0abc9c9-e230-4a30-ac87-7847e7fa0789;a5607a6f-cc37-4e62-968b-bb5deada2317\n 24cba909-5cee-4d53-ae8c-95938ad33f89;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906\n 92976b82-1442-47c0-a23d-dd1a0178ce0c;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe;adbb0c87-4c1c-4156-844b-3bb40145b49a\n 0293a42d-151c-4ca2-9091-4e1dd5400666;145b6eba-876a-46a4-b946-75ddf0389eda\n 89c1b839-ce76-43f4-be84-84d394af9179;de4970f8-9818-44d8-88cc-53d9ad4885a3\n 5c99255f-527b-4ab4-a482-10c4441d08f0;f1ba83e7-fdda-4bb8-bbe1-e84af8112dfa\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;145b6eba-876a-46a4-b946-75ddf0389eda\n d69a676f-1c2b-425b-bc36-ea52e1409bb2;a5607a6f-cc37-4e62-968b-bb5deada2317\n 0d576b32-d148-4660-9d3c-05e19c6b7691;721654e5-7ac1-42ac-9c9c-69111c7e8b90\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;145b6eba-876a-46a4-b946-75ddf0389eda;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;3a09dee3-91ad-4c6d-8dc6-af6a6cdd2cfe\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;fab7624c-e13e-4fc5-9991-758d7e0fdbf6\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc;6aaba073-4a78-4cfc-b277-a12ecde05560\n 03798623-1bd2-422e-bb17-0f77830aff20;ac5840bd-bca9-4faa-be65-b59301e55ff1;6aaba073-4a78-4cfc-b277-a12ecde05560\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;530cb647-c5aa-46b6-bb8f-d49dab51a26a;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01;ce01d132-7d6c-48cf-9bc2-04b52702cb7b\n 57e829e1-dc28-4a02-956f-04d36967db37;4a05cca9-2d0d-4ea5-8440-5a09c4f40249\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b;93fe40ba-b05c-4d30-8855-f546b7388d2a\n 5fb48a7c-65db-4581-ab2c-7197305a0811;fab7624c-e13e-4fc5-9991-758d7e0fdbf6\n cb44c440-80f8-4486-bf68-af79d9d716e2;adbb0c87-4c1c-4156-844b-3bb40145b49a\n 3012ebe2-c183-4d12-9851-5ab7b6d2421c;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa;de4970f8-9818-44d8-88cc-53d9ad4885a3;55496d4d-9f92-44aa-89ce-3b30e5c437d7;93fe40ba-b05c-4d30-8855-f546b7388d2a\n d0c8a959-aa18-4a58-a996-96af08a09256;721654e5-7ac1-42ac-9c9c-69111c7e8b90\n 31cd5301-52f8-4c11-98f8-765ec869a45d;fab7624c-e13e-4fc5-9991-758d7e0fdbf6\n \n \n 60accf57-c086-423f-9068-7c1afdc2de1d;46ba2844-da6b-4949-92d6-2f2dad753fc4;cd6f9fe5-4adb-4bbd-b279-d72ce4c54e7f;9df23599-26e9-4745-84d0-a714f84b5b37;c2a05de9-6128-470a-bef8-b2ae70dc035c;8280c9ea-bdf0-4f9b-b492-3c695e7e608a;597f86fa-2e78-45df-92ca-725714eb4282;9c67e3ed-0fd6-47aa-83c8-85fbeaee4c9c;b48da91f-cfc9-40c5-bb23-84048a539d1d\n 27dd2250-00b8-4587-8456-c68d0ca5af8a;936b3fa2-060e-4e74-a234-ab5aa85c3861\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;1e1bb2a5-6863-4ebe-b809-e1235f456f29\n 43ecc385-004b-4af0-b1cb-2d14c240e032;87905475-fdfa-4e31-aa00-bf1fe93bcc02\n ddf7203d-0229-46d5-badc-e6c35789df3f;793415f8-111c-4582-bd67-74ea9e0488dc\n \n \n 515c0c9b-1bbe-4706-aa5e-f62aeaf73271;a0fcbfd6-d965-410a-93dd-d92c40376f4f\n e245ae31-ac6d-42fa-aca4-3435cb4bf378;b3754582-b3cc-4f65-a24d-3e7a2fedbcf7;8f61fa70-6006-4a83-a760-32bfaf9277c7;1a166434-62e2-4192-9d79-88db09ff76e1;f24b7566-0b83-463b-b473-68e180e41ec1;f29d7406-7fd7-4784-848a-a32d271653da\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;757cbe66-4b2e-4ed1-ba43-13e9c443c060;3b370f13-6828-4acc-a844-07cc64bd3956\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;ad7a565d-93b6-4f12-818a-924b328ae087;9321e9e8-106a-40a2-a996-8ada12c4329f\n 30642deb-def4-40a6-86a2-b9ad1c335df6;98d60973-99bd-42cc-92fa-f43762154bb1\n 0293a42d-151c-4ca2-9091-4e1dd5400666;e4855c5b-60bd-4592-bd19-883f420415a7;851b72ed-14ee-47c0-94d4-3ace6af19302;3db63a4c-63d9-46ae-9aea-61110bd43a25\n b3b260b4-1492-4b1c-81c8-436cdedebaad;52028500-53e9-410d-80f1-9a8b581dd984;070e314a-9bc6-40d0-a0a8-9ad588d37a4e;578474ff-3c91-49a1-854e-463ae6d5c909\n 9735e0ee-c250-4570-b2b9-6388450b3dae;830c0ae9-16a8-4ba6-a3dc-fef48b1ee034;84ece7e8-f3d5-4b7a-a668-64524a235c02;42832498-f178-4e25-b572-da57fb3370f7\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;ec74ae3c-ab7f-40b6-8304-d5b2b631dd47\n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33;20e8c689-ea77-4c27-938a-7392c9dd8841\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32;20e8c689-ea77-4c27-938a-7392c9dd8841\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;138f13cd-bc93-4bff-9cbc-97f064086c24\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;20e8c689-ea77-4c27-938a-7392c9dd8841\n e245ae31-ac6d-42fa-aca4-3435cb4bf378;20e8c689-ea77-4c27-938a-7392c9dd8841\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;138f13cd-bc93-4bff-9cbc-97f064086c24\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;20e8c689-ea77-4c27-938a-7392c9dd8841\n 3ab6253b-74b7-4701-9431-acfe6df2d2be;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n 436a30e7-3930-4333-8204-e1bae37af76e;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9;20e8c689-ea77-4c27-938a-7392c9dd8841\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;20e8c689-ea77-4c27-938a-7392c9dd8841\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f;20e8c689-ea77-4c27-938a-7392c9dd8841\n 30642deb-def4-40a6-86a2-b9ad1c335df6;20e8c689-ea77-4c27-938a-7392c9dd8841\n 27384b10-b549-45fc-80c7-94688793e9fc;20e8c689-ea77-4c27-938a-7392c9dd8841\n bc5000cc-1af0-4d23-837f-422c907de172;20e8c689-ea77-4c27-938a-7392c9dd8841\n f16b35ce-1d93-423c-909a-61d0d5f693f8;20e8c689-ea77-4c27-938a-7392c9dd8841\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1;9f98e834-ded2-4b01-b75f-63ec44fdc14b\n d0abc9c9-e230-4a30-ac87-7847e7fa0789;20e8c689-ea77-4c27-938a-7392c9dd8841\n 24cba909-5cee-4d53-ae8c-95938ad33f89;138f13cd-bc93-4bff-9cbc-97f064086c24\n 92976b82-1442-47c0-a23d-dd1a0178ce0c;20e8c689-ea77-4c27-938a-7392c9dd8841\n 0293a42d-151c-4ca2-9091-4e1dd5400666;20e8c689-ea77-4c27-938a-7392c9dd8841\n 5c99255f-527b-4ab4-a482-10c4441d08f0;20e8c689-ea77-4c27-938a-7392c9dd8841\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;138f13cd-bc93-4bff-9cbc-97f064086c24\n 0d576b32-d148-4660-9d3c-05e19c6b7691;138f13cd-bc93-4bff-9cbc-97f064086c24\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;20e8c689-ea77-4c27-938a-7392c9dd8841\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;20e8c689-ea77-4c27-938a-7392c9dd8841\n b3b260b4-1492-4b1c-81c8-436cdedebaad;20e8c689-ea77-4c27-938a-7392c9dd8841\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;20e8c689-ea77-4c27-938a-7392c9dd8841\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc;8ab20b28-5742-483a-ba66-20b6078c0b62\n 03798623-1bd2-422e-bb17-0f77830aff20;8ab20b28-5742-483a-ba66-20b6078c0b62\n 9735e0ee-c250-4570-b2b9-6388450b3dae;20e8c689-ea77-4c27-938a-7392c9dd8841\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;20e8c689-ea77-4c27-938a-7392c9dd8841\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01;b8e192e1-3a0e-4f12-97ea-361c33eaea6c\n 57e829e1-dc28-4a02-956f-04d36967db37;138f13cd-bc93-4bff-9cbc-97f064086c24\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b;20e8c689-ea77-4c27-938a-7392c9dd8841\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;20e8c689-ea77-4c27-938a-7392c9dd8841\n b213355e-df97-4b43-9e69-8a185817ce57;20e8c689-ea77-4c27-938a-7392c9dd8841\n 5fb48a7c-65db-4581-ab2c-7197305a0811;20e8c689-ea77-4c27-938a-7392c9dd8841\n cb44c440-80f8-4486-bf68-af79d9d716e2;20e8c689-ea77-4c27-938a-7392c9dd8841\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa;20e8c689-ea77-4c27-938a-7392c9dd8841\n d0c8a959-aa18-4a58-a996-96af08a09256;20e8c689-ea77-4c27-938a-7392c9dd8841\n 31cd5301-52f8-4c11-98f8-765ec869a45d;20e8c689-ea77-4c27-938a-7392c9dd8841\n \n \n 08c4afc4-6416-4b23-8046-dd47c21ccaec;1daa0cd2-5790-41a8-b51a-e1bdfa42da53;ea079d52-17ce-4746-8c95-2356a1f9b38c;8465dfc1-e41f-4be5-a9ac-aca7510e673e;8d18452a-35af-43b5-947e-e4237075a71c;3975e2c6-2bed-4088-afda-19059d7dc90f;d97e281c-35cd-4076-a571-92fb24ec9890;42c24c74-5d0d-4254-a419-dd33bc8ace1a\n 60accf57-c086-423f-9068-7c1afdc2de1d;d43bed11-a65d-4885-b093-c68e15b16d79\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99;a7a245b8-7bce-485d-82c2-c74effa8b4e1;5b256307-1522-4bec-9ccb-c16870e43d1f\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;bd03d0aa-1df2-4487-b304-75f5ed88bef5\n 43ecc385-004b-4af0-b1cb-2d14c240e032;a2dea300-9539-4a47-b93d-530fdddc982f;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;0acf267d-20d2-4eb8-b51f-5fea2f6811e3;c2c611de-36e7-4013-97af-1d24484678a1\n 436a30e7-3930-4333-8204-e1bae37af76e;1edf30ce-913d-4138-a962-bf182291a3b2;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;a7a245b8-7bce-485d-82c2-c74effa8b4e1;3975e2c6-2bed-4088-afda-19059d7dc90f;12f721b3-d642-4cdd-985c-9c965ea285ef;5f15b255-bab9-4864-b6fb-19b889dbe46d;2520fdfa-0155-42fb-91a8-1e55d9201b98\n ddf7203d-0229-46d5-badc-e6c35789df3f;0c4e80e7-ee54-4d2e-88ec-53541ad08b04;559abbb3-53e6-4ee6-bf48-17b5e56a0cd7;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;984b5e01-d021-4381-8161-98ec1e78cd3b;60f12d0e-c7ae-461e-94c4-ddab2d03f786;1af43651-d73e-4c1f-abbe-d6d8f88ac711;31feb041-5a63-432d-a1a3-d0907021756c\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;ea079d52-17ce-4746-8c95-2356a1f9b38c;8465dfc1-e41f-4be5-a9ac-aca7510e673e\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb;9545e837-af5b-41ee-adad-c1c0c2932155;3d482503-f306-41a2-b5ed-c808fa8d6011;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;34149888-6c19-4c8e-9f78-cebc46455709;f7eb2f43-91f4-4101-83e8-a84912100c34;5b256307-1522-4bec-9ccb-c16870e43d1f;8b72bc37-af32-4f7f-8381-b386d44b107d;3c0c21e4-eeaa-4cb4-8f4d-63d8157e928b;988cc0d1-c014-4751-bb33-6f00972ed469\n 27384b10-b549-45fc-80c7-94688793e9fc;91a389bb-12c1-4667-9429-6d784ae5f97a;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99;a7a245b8-7bce-485d-82c2-c74effa8b4e1;e213f459-ed5d-4fe0-adad-fa17125c3450\n 7d50376a-ef59-4b6a-804f-79e6880ebd42;0c4e80e7-ee54-4d2e-88ec-53541ad08b04;1d5c2bf9-943f-4863-91a7-6dd93d457123;df73c80e-4d37-4725-bbc2-8ff83f07bea6;7588197c-3535-46f8-ba5f-658b2ef59310\n 24cba909-5cee-4d53-ae8c-95938ad33f89;49d67f33-3783-4ca6-9bc2-a407ea8fd95a;073bcd98-64ae-4634-94eb-185e900c215c;9e73a213-5047-428f-aee2-fa0550bc75c7;416f01f6-2ec5-4684-96b5-904a0fe35ed8;7414bc37-18b4-4d73-8012-dd3fc662bd99;f5429526-470c-436c-bb58-9cae3964f8f5;7dc5b8c8-22b8-4047-a51f-d3d706303aee\n 5c99255f-527b-4ab4-a482-10c4441d08f0;ea079d52-17ce-4746-8c95-2356a1f9b38c;d6782bb2-c971-4a98-aa24-3847ee143895;3975e2c6-2bed-4088-afda-19059d7dc90f;2520fdfa-0155-42fb-91a8-1e55d9201b98\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4;3d482503-f306-41a2-b5ed-c808fa8d6011;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;5fe71ba9-94e3-486f-8a45-2a0ca6981eaf;34149888-6c19-4c8e-9f78-cebc46455709;3c0c21e4-eeaa-4cb4-8f4d-63d8157e928b\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a;3b351781-0b1f-4b21-bccb-9ea29e7932a2;25687b84-4550-48cb-bea7-4eb626fae8c4;7414bc37-18b4-4d73-8012-dd3fc662bd99;e213f459-ed5d-4fe0-adad-fa17125c3450;a34414c2-9669-4f7f-a3d4-5752536b5eba;ad0222b8-be14-4d9b-bb8d-59ffe559a1f5\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;3f0ea640-5c09-4cb4-8f19-fb5fbae2d0b1;64245294-c22d-46c2-8ad6-746d666e8868;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;58b0d02a-d2ac-498b-b6ca-9bbf752d8f68;3420e4bf-76be-4222-874b-d7aaa8adf120;1c6153c3-9b06-4475-ac66-ab5168d9b448;19be1760-2f48-46f4-9826-94ab329e5772;e0a6c457-2f61-4fd1-9ac9-111505678402\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf;0d8aa489-ba02-44ba-9ab1-12420dcb200b;83cb67dd-d6a7-4070-9164-0c5aedf6174b;c084501a-a75d-41f4-914c-5d0a7049c6bc\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87;d688f4f9-d82f-4e43-a756-fc3920a60220;64d057f1-7dee-489d-b2e4-60ab5f91f0a0;1db9120c-b80d-4b2b-998d-cd7e03f2409d;8465dfc1-e41f-4be5-a9ac-aca7510e673e;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;7414bc37-18b4-4d73-8012-dd3fc662bd99;0248fe18-2a62-440a-9991-e90fe2343be7;5b256307-1522-4bec-9ccb-c16870e43d1f;2e217af7-da91-47cd-9063-3713dfa3af69;bf938725-aae2-40e8-a65f-486422497333\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;8c342252-ebd3-4548-a6bb-9e8a36ba8387;dcb312ac-4bb0-4b88-b681-492f4b8e0fef;14b33d32-bf7f-458d-a48b-55a5da05d882\n 31cd5301-52f8-4c11-98f8-765ec869a45d;f50d2630-738a-42fd-b2fa-f7664a90716a;9d618f41-533f-4aad-9c41-353a2a788324;675601b8-7348-4172-b59b-31430dca68b3;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1;a14a5847-0f4a-49a3-a234-00aefeff084f\n \n \n f8870bd1-4f3f-4b48-b29b-a7cf3d461475;52052788-e8ca-402c-9d27-fbb85823e647\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d;da24dece-40e5-4886-b225-d92b6884e984\n 43ecc385-004b-4af0-b1cb-2d14c240e032;48ac70f5-b6cf-4517-8471-fd3c7b90c964\n 3ab6253b-74b7-4701-9431-acfe6df2d2be;889ad4b4-64a9-439c-9932-699f5f3878ad\n 436a30e7-3930-4333-8204-e1bae37af76e;889ad4b4-64a9-439c-9932-699f5f3878ad\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8;23d961e4-3993-4ac5-990b-f26896edb650\n ddf7203d-0229-46d5-badc-e6c35789df3f;676f3a30-2aea-4860-8e27-83405e03edeb\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8;8d70c3b3-4980-4866-9efe-1394a51cc5bc\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1;40885ed5-e6e8-432c-a755-8e46dcc41cf7\n 0293a42d-151c-4ca2-9091-4e1dd5400666;95892647-2ad0-4d43-93de-c86e854cb5ac\n 89c1b839-ce76-43f4-be84-84d394af9179;676f3a30-2aea-4860-8e27-83405e03edeb\n 0d576b32-d148-4660-9d3c-05e19c6b7691;b0240fc6-2cc6-4fb1-9e38-f511c7724575\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc;f115bfdf-3d79-40f6-812a-27b8a9afb7d2\n 03798623-1bd2-422e-bb17-0f77830aff20;5ad8fad3-518c-4c14-8838-a7cb3caee20d\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01;2fe7b5dd-b6ec-4f3d-b1d2-f2e193107f6b\n \n \n 515c0c9b-1bbe-4706-aa5e-f62aeaf73271;a85e90b8-b053-4dc1-aa61-6b7ea0f58f7f\n 09bd55a6-be76-417d-9682-f1a5a07d28d7;06059828-2a96-4352-80a9-1abafb422ae7\n 08c4afc4-6416-4b23-8046-dd47c21ccaec;e182783d-3907-4e12-a8d9-dd4037c7c63d\n 60accf57-c086-423f-9068-7c1afdc2de1d;98ea327a-1348-4ab1-af17-55632a26aad2\n e245ae31-ac6d-42fa-aca4-3435cb4bf378;9de3e2ad-4fec-4cb4-a52e-6f54ca933f95\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4;f4c370d5-a112-4d11-92e7-c6685741e79a\n 7d6705ad-48de-4613-b9f9-94a06f701cb4;a17f80e8-76e4-4245-b7b1-c8a6d7a7235e\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8;547fb64b-ffbc-4e77-9f4e-117db63563d8\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3;1cbaf789-56f9-4286-bf17-556c2e08005b\n 24cba909-5cee-4d53-ae8c-95938ad33f89;bbb324fc-6795-4f4d-b193-fc5f57df7e8c\n 0293a42d-151c-4ca2-9091-4e1dd5400666;890d151a-8b4c-4c09-96be-33715ccc07f4\n 5c99255f-527b-4ab4-a482-10c4441d08f0;24bf0155-d87e-44f7-aabc-49e362270b5f\n b3b260b4-1492-4b1c-81c8-436cdedebaad;81be0346-d1ec-4a69-ab05-687055d9bade\n 57e829e1-dc28-4a02-956f-04d36967db37;d6f5e8dc-6373-4533-820a-1149d38cbfb9\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;e48245dd-1d2d-4401-b639-122b3a82753b\n \n \n e245ae31-ac6d-42fa-aca4-3435cb4bf378;b213355e-df97-4b43-9e69-8a185817ce57\n 0293a42d-151c-4ca2-9091-4e1dd5400666;5fb48a7c-65db-4581-ab2c-7197305a0811\n b3b260b4-1492-4b1c-81c8-436cdedebaad;cb44c440-80f8-4486-bf68-af79d9d716e2\n 30642deb-def4-40a6-86a2-b9ad1c335df6;3012ebe2-c183-4d12-9851-5ab7b6d2421c;31cd5301-52f8-4c11-98f8-765ec869a45d\n 26c0c55a-7828-45c1-a29c-f85a34eb8676;3c9fc64a-c430-4733-a4a1-1e9103e4f8fa\n 9735e0ee-c250-4570-b2b9-6388450b3dae;d0c8a959-aa18-4a58-a996-96af08a09256\n \n \n \n _Jane Doe\n 2017-05-22T08:14:06\n _Jane Doe\n 2017-05-22T08:14:06\n HMNTS YK.2017.a.1845\n 1389a042-91f8-428a-9349-c5fd166ad96b\n 2\n 0\n 7d6705ad-48de-4613-b9f9-94a06f701cb4\n \n \n _Jane Doe\n 2017-11-09T09:39:30\n _Jane Doe\n 2017-11-09T09:39:30\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Europol 4 25 2017 - EUR 230 million worth.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n
\n \n _Jane Doe\n 2017-11-09T09:43:18\n _Jane Doe\n 2017-11-09T09:43:18\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Millward 3 24 2017 - Alibaba to use blockchain.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n
\n \n _Jane Doe\n 2017-11-09T09:55:27\n _Jane Doe\n 2017-11-09T09:55:27\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/861472798\",\"UriString\":\"http://www.worldcat.org/oclc/861472798\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 60accf57-c086-423f-9068-7c1afdc2de1d\n
\n \n _Jane Doe\n 2017-11-09T09:55:40\n _Jane Doe\n 2017-11-09T10:00:14\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.google.com/patents/US20100216136\",\"UriString\":\"https://www.google.com/patents/US20100216136\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 2485a5d8-95f5-437f-8911-05111eb7e25e\n
\n \n _Jane Doe\n 2017-11-09T09:58:19\n _Jane Doe\n 2017-11-09T09:59:55\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/\",\"UriString\":\"https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 27dd2250-00b8-4587-8456-c68d0ca5af8a\n
\n \n _Jane Doe\n 2017-11-09T09:58:39\n _Jane Doe\n 2017-11-09T09:58:39\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/967319191\",\"UriString\":\"http://www.worldcat.org/oclc/967319191\",\"LinkedResourceStatus\":8}
\n 0\n 0\n e245ae31-ac6d-42fa-aca4-3435cb4bf378\n
\n \n _Jane Doe\n 2017-11-09T09:58:54\n _Jane Doe\n 2017-11-09T09:59:36\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf\",\"UriString\":\"https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n
\n \n _Jane Doe\n 2017-11-09T09:59:10\n _Jane Doe\n 2017-11-09T09:59:15\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud\",\"UriString\":\"https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n
\n \n _Jane Doe\n 2017-11-09T10:00:48\n _Jane Doe\n 2017-11-09T10:00:48\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/935194461\",\"UriString\":\"http://www.worldcat.org/oclc/935194461\",\"LinkedResourceStatus\":8}
\n 0\n 0\n de7347ad-5e9f-45cd-9b8e-5e91b02465b4\n
\n \n _Jane Doe\n 2017-11-09T10:01:00\n _Jane Doe\n 2017-11-09T10:01:00\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://hdl.handle.net/11299/153189\",\"UriString\":\"http://hdl.handle.net/11299/153189\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 43ecc385-004b-4af0-b1cb-2d14c240e032\n
\n \n _Jane Doe\n 2017-11-09T10:01:15\n _Jane Doe\n 2017-11-09T10:01:15\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf\",\"UriString\":\"https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 3ab6253b-74b7-4701-9431-acfe6df2d2be\n
\n \n _Jane Doe\n 2017-11-09T10:01:57\n _Jane Doe\n 2017-11-09T10:01:57\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf\",\"UriString\":\"https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 436a30e7-3930-4333-8204-e1bae37af76e\n
\n \n _Jane Doe\n 2017-11-09T10:02:07\n _Jane Doe\n 2017-11-09T10:02:07\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"27236872\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/27236872\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 436a30e7-3930-4333-8204-e1bae37af76e\n
\n \n _Jane Doe\n 2017-11-09T10:02:20\n _Jane Doe\n 2017-11-09T10:02:20\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/\",\"UriString\":\"http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 1810f594-4e9e-47b4-905f-445171ad46c6\n
\n \n _Jane Doe\n 2017-11-09T10:02:33\n _Jane Doe\n 2017-11-09T10:02:33\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf\",\"UriString\":\"http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n
\n \n _Jane Doe\n 2017-11-09T10:02:49\n _Jane Doe\n 2017-11-09T10:02:49\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Némorin 07 2014 - GFSI Position on Mitigating the Public.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n
\n \n _Jane Doe\n 2017-11-09T10:03:12\n _Jane Doe\n 2017-11-09T10:03:12\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www-03.ibm.com/press/us/en/pressrelease/50816.wss\",\"UriString\":\"https://www-03.ibm.com/press/us/en/pressrelease/50816.wss\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n ddf7203d-0229-46d5-badc-e6c35789df3f\n
\n \n _Jane Doe\n 2017-11-09T10:03:33\n _Jane Doe\n 2017-11-09T10:03:33\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.iso.org/standard/35466.html\",\"UriString\":\"https://www.iso.org/standard/35466.html\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 14bf1930-bb04-4aaa-90b2-494f7548d8a8\n
\n \n _Jane Doe\n 2017-11-09T10:04:09\n _Jane Doe\n 2017-11-09T10:04:09\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.iso.org/standard/35466.html\",\"UriString\":\"https://www.iso.org/standard/35466.html\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 2f99e8ce-0e1f-4571-9e89-94bfebc477d3\n
\n \n _Jane Doe\n 2017-11-09T10:04:39\n _Jane Doe\n 2017-11-09T10:04:39\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.4018/978-1-5225-2107-5.ch005\",\"UriString\":\"https://doi.org/10.4018/978-1-5225-2107-5.ch005\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n cb44c440-80f8-4486-bf68-af79d9d716e2\n
\n \n _Jane Doe\n 2017-11-09T10:05:04\n _Jane Doe\n 2017-11-09T10:05:04\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1108/02635570710723804\",\"UriString\":\"https://doi.org/10.1108/02635570710723804\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 4b33d12a-af3c-4821-8907-b9263bb8ee7f\n
\n \n _Jane Doe\n 2017-11-09T10:05:27\n _Jane Doe\n 2017-11-09T10:05:27\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide\",\"UriString\":\"https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 647ed0dd-03b8-481f-8882-d6fefa91f4bb\n
\n \n _Jane Doe\n 2017-11-09T10:05:51\n _Jane Doe\n 2017-11-09T10:05:51\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food Safety.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n
\n \n _Jane Doe\n 2017-11-09T10:06:34\n _Jane Doe\n 2017-11-09T10:06:34\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1111/1750-3841.13256\",\"UriString\":\"https://doi.org/10.1111/1750-3841.13256\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n
\n \n _Jane Doe\n 2017-11-09T10:06:43\n _Jane Doe\n 2017-11-09T10:06:43\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"26934423\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/26934423\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n
\n \n _Jane Doe\n 2017-11-09T10:07:12\n _Jane Doe\n 2017-11-09T10:07:12\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1186/s12889-017-4118-x\",\"UriString\":\"https://doi.org/10.1186/s12889-017-4118-x\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n bc5000cc-1af0-4d23-837f-422c907de172\n
\n \n _Jane Doe\n 2017-11-09T10:07:19\n _Jane Doe\n 2017-11-09T10:07:19\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"28193265\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/28193265\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n bc5000cc-1af0-4d23-837f-422c907de172\n
\n \n _Jane Doe\n 2017-11-09T10:07:40\n _Jane Doe\n 2017-11-09T10:07:40\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.techinasia.com/alibaba-fake-food-detection-blockchain\",\"UriString\":\"https://www.techinasia.com/alibaba-fake-food-detection-blockchain\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n
\n \n _Jane Doe\n 2017-11-09T10:07:51\n _Jane Doe\n 2017-11-09T10:07:51\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"27979084\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/27979084\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n f16b35ce-1d93-423c-909a-61d0d5f693f8\n
\n \n _Jane Doe\n 2017-11-09T10:08:01\n _Jane Doe\n 2017-11-09T10:08:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf\",\"UriString\":\"http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n
\n \n _Jane Doe\n 2017-11-09T10:08:18\n _Jane Doe\n 2017-11-09T10:08:18\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU\",\"UriString\":\"https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n e365933e-9b5b-4bb1-ae02-326f41d2833a\n
\n \n _Jane Doe\n 2017-11-09T10:08:32\n _Jane Doe\n 2017-11-09T10:08:32\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"28231211\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/28231211\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n d0abc9c9-e230-4a30-ac87-7847e7fa0789\n
\n \n _Jane Doe\n 2017-11-09T10:08:37\n _Jane Doe\n 2017-11-09T10:08:37\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"PMC5224536\",\"UriString\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5224536\",\"LinkedResourceStatus\":8}
\n 0\n PmcId\n 0\n d0abc9c9-e230-4a30-ac87-7847e7fa0789\n
\n \n _Jane Doe\n 2017-11-09T10:09:42\n _Jane Doe\n 2017-11-09T10:09:42\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://gso.gbv.de/DB=2.1/PPNSET?PPN=859218589\",\"UriString\":\"http://gso.gbv.de/DB=2.1/PPNSET?PPN=859218589\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 24cba909-5cee-4d53-ae8c-95938ad33f89\n
\n \n _Jane Doe\n 2017-11-09T10:09:57\n _Jane Doe\n 2017-11-09T10:09:57\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf\",\"UriString\":\"http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 0293a42d-151c-4ca2-9091-4e1dd5400666\n
\n \n _Jane Doe\n 2017-11-09T10:10:19\n _Jane Doe\n 2017-11-09T10:10:19\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/\",\"UriString\":\"https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 89c1b839-ce76-43f4-be84-84d394af9179\n
\n \n _Jane Doe\n 2017-11-09T10:10:35\n _Jane Doe\n 2017-11-09T10:10:35\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Ramamurthy 11 16 2016 - Leveraging blockchain to improve food.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 89c1b839-ce76-43f4-be84-84d394af9179\n
\n \n _Jane Doe\n 2017-11-09T10:10:44\n _Jane Doe\n 2017-11-09T10:10:44\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast\",\"UriString\":\"https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n
\n \n _Jane Doe\n 2017-11-09T10:10:54\n _Jane Doe\n 2017-11-09T10:10:54\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://sciex.com/products/software/markerview-software\",\"UriString\":\"https://sciex.com/products/software/markerview-software\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n d69a676f-1c2b-425b-bc36-ea52e1409bb2\n
\n \n _Jane Doe\n 2017-11-09T10:11:01\n _Jane Doe\n 2017-11-09T10:11:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/\",\"UriString\":\"http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 0d576b32-d148-4660-9d3c-05e19c6b7691\n
\n \n _Jane Doe\n 2017-11-09T10:11:09\n _Jane Doe\n 2017-11-09T10:11:09\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"22416717\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/22416717\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n
\n \n _Jane Doe\n 2017-11-09T10:11:21\n _Jane Doe\n 2017-11-09T10:11:21\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defining the public health threat.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n
\n \n _Jane Doe\n 2017-11-09T10:11:34\n _Jane Doe\n 2017-11-09T10:11:34\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"26190607\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/26190607\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d\n
\n \n _Jane Doe\n 2017-11-09T10:12:01\n _Jane Doe\n 2017-11-09T10:12:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1016/j.foodchem.2014.09.106\",\"UriString\":\"https://doi.org/10.1016/j.foodchem.2014.09.106\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d\n
\n \n _Jane Doe\n 2017-11-09T10:12:30\n _Jane Doe\n 2017-11-09T10:12:30\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1109/ICSSSM.2016.7538424\",\"UriString\":\"https://doi.org/10.1109/ICSSSM.2016.7538424\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 3c9fc64a-c430-4733-a4a1-1e9103e4f8fa\n
\n \n _Jane Doe\n 2017-11-09T10:13:04\n _Jane Doe\n 2017-11-09T10:13:04\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1080/10408347.2014.966185\",\"UriString\":\"https://doi.org/10.1080/10408347.2014.966185\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf\n
\n \n _Jane Doe\n 2017-11-09T10:13:09\n _Jane Doe\n 2017-11-09T10:13:09\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"25633422\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/25633422\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf\n
\n \n _Jane Doe\n 2017-11-09T10:13:24\n _Jane Doe\n 2017-11-09T10:13:24\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf\",\"UriString\":\"https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc\n
\n \n _Jane Doe\n 2017-11-09T10:13:32\n _Jane Doe\n 2017-11-09T10:13:32\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"United States Congress 1 4 2017 - FDA Food Safety Modernization Act.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc\n
\n \n _Jane Doe\n 2017-11-09T10:13:40\n _Jane Doe\n 2017-11-09T10:13:40\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://supreme.justia.com/cases/federal/us/232/399/\",\"UriString\":\"https://supreme.justia.com/cases/federal/us/232/399/\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 03798623-1bd2-422e-bb17-0f77830aff20\n
\n \n _Jane Doe\n 2017-11-09T10:14:02\n _Jane Doe\n 2017-11-09T10:14:02\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.3390/ijerph13010067\",\"UriString\":\"https://doi.org/10.3390/ijerph13010067\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n d0c8a959-aa18-4a58-a996-96af08a09256\n
\n \n _Jane Doe\n 2017-11-09T10:14:21\n _Jane Doe\n 2017-11-09T10:14:21\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"26758743\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/26758743\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n
\n \n _Jane Doe\n 2017-11-09T10:14:18\n _Jane Doe\n 2017-11-09T10:14:18\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1007/s11427-015-4979-0\",\"UriString\":\"https://doi.org/10.1007/s11427-015-4979-0\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n
\n \n _Jane Doe\n 2017-11-09T10:14:29\n _Jane Doe\n 2017-11-09T10:14:29\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Wang, He et al.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n
\n \n _Jane Doe\n 2017-11-09T10:14:45\n _Jane Doe\n 2017-11-09T10:14:45\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1108/BFJ-06-2016-0263\",\"UriString\":\"https://doi.org/10.1108/BFJ-06-2016-0263\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 31cd5301-52f8-4c11-98f8-765ec869a45d\n
\n \n _Jane Doe\n 2017-11-09T10:15:06\n _Jane Doe\n 2017-11-09T10:15:06\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://en.wikipedia.org/w/index.php?oldid=781647563\",\"UriString\":\"https://en.wikipedia.org/w/index.php?oldid=781647563\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01\n
\n \n _Jane Doe\n 2017-11-09T10:15:12\n _Jane Doe\n 2017-11-09T10:15:12\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://en.wikipedia.org/wiki/2008_Chinese_milk_scandal\",\"UriString\":\"https://en.wikipedia.org/wiki/2008_Chinese_milk_scandal\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 8b7d04f3-dfc8-4e36-8d34-0db8113eab01\n
\n \n _Jane Doe\n 2017-11-09T10:15:21\n _Jane Doe\n 2017-11-09T10:15:21\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html\",\"UriString\":\"http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 57e829e1-dc28-4a02-956f-04d36967db37\n
\n \n _Jane Doe\n 2017-11-09T10:15:33\n _Jane Doe\n 2017-11-09T10:15:33\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.journals.cambridge.org/abstract_S0021911812000678\",\"UriString\":\"http://www.journals.cambridge.org/abstract_S0021911812000678\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b\n
\n \n _Jane Doe\n 2017-11-09T10:15:46\n _Jane Doe\n 2017-11-09T10:15:46\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"http://www.worldcat.org/oclc/958898445\",\"UriString\":\"http://www.worldcat.org/oclc/958898445\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 26c0c55a-7828-45c1-a29c-f85a34eb8676\n
\n \n _Jane Doe\n 2017-11-09T10:16:38\n _Jane Doe\n 2017-11-09T10:16:38\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1136/bmj.f3385\",\"UriString\":\"https://doi.org/10.1136/bmj.f3385\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n
\n \n _Jane Doe\n 2017-11-09T10:16:42\n _Jane Doe\n 2017-11-09T10:16:42\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"23716434\",\"UriString\":\"http://www.ncbi.nlm.nih.gov/pubmed/23716434\",\"LinkedResourceStatus\":8}
\n 0\n PubMedId\n 0\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n
\n \n _Jane Doe\n 2017-11-09T10:17:17\n _Jane Doe\n 2017-11-09T10:17:17\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1002/jsfa.8364\",\"UriString\":\"https://doi.org/10.1002/jsfa.8364\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n
\n \n _Jane Doe\n 2017-11-09T10:52:16\n _Jane Doe\n 2018-07-12T11:35:01\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"10.1016/j.tifs.2015.10.007\",\"UriString\":\"https://doi.org/10.1016/j.tifs.2015.10.007\",\"LinkedResourceStatus\":8}
\n 0\n Doi\n 0\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n
\n \n _Jane Doe\n 2019-04-25T11:16:46\n _Jane Doe\n 2019-04-25T11:16:47\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Agbaraji, Ochulor et al.pdf\",\"LinkedResourceStatus\":8}
\n 0\n 0\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n
\n \n _Jennifer Schultz\n 2020-01-10T08:24:49\n _Jennifer Schultz\n 2020-01-10T08:24:50\n
{\"$id\":\"1\",\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":5,\"OriginalString\":\"https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede&region=caption&pgtype=article\",\"UriString\":\"https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede&region=caption&pgtype=article\",\"LinkedResourceStatus\":8}
\n 0\n OnlineAddress\n 0\n 09bd55a6-be76-417d-9682-f1a5a07d28d7\n
\n
\n \n \n _Jane Doe\n 2017-11-09T11:30:15\n _Jane Doe\n 2017-11-09T11:30:15\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":141.12840000000003,\"X2\":569.5451065,\"Y1\":698.0221889723075,\"Y2\":707.04677186461527},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.5759866599999,\"Y1\":686.07005897230772,\"Y2\":695.09464186461548},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.51421854000046,\"Y1\":674.10895897230773,\"Y2\":683.13354186461549},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.5550652,\"Y1\":662.15682897230761,\"Y2\":671.18141186461537},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.55506519999983,\"Y1\":650.2046989723076,\"Y2\":659.22928186461536},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57897544000025,\"Y1\":638.24359897230761,\"Y2\":647.26818186461537},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.58893804,\"Y1\":626.2914689723076,\"Y2\":635.31605186461536},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57997170000021,\"Y1\":614.33933897230759,\"Y2\":623.36392186461535},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57299788000023,\"Y1\":602.37823897230771,\"Y2\":611.40282186461548},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57598666000013,\"Y1\":590.42610897230759,\"Y2\":599.45069186461535},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.5191998400004,\"Y1\":578.4739789723078,\"Y2\":587.49856186461557},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.57698292000009,\"Y1\":566.51287897230748,\"Y2\":575.53746186461524},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.53514072951384,\"Y1\":554.56074897230758,\"Y2\":563.59514119384608},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3089,\"X2\":569.58296422,\"Y1\":542.59964897230759,\"Y2\":551.62423186461535},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":97.3089,\"X2\":183.85201368000003,\"Y1\":532.85461804923079,\"Y2\":539.67210186461546},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":97.3079,\"X2\":569.58893804,\"Y1\":532.85461804923079,\"Y2\":707.04677186461527}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:04:22\n _Jane Doe\n 2017-11-09T11:04:22\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":521.88480879680026,\"Y1\":561.00753686153871,\"Y2\":569.45010455384613},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":506.708816,\"Y1\":547.4827518769232,\"Y2\":555.9003045538459},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":500.74675224224052,\"Y1\":533.9079368615387,\"Y2\":542.35050455384612},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":462.26533650200031,\"Y1\":520.35813686153847,\"Y2\":528.80070455384634},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":521.88480879680026,\"Y1\":520.35813686153847,\"Y2\":569.45010455384613}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:04:34\n _Jane Doe\n 2017-11-09T11:04:34\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":162.77703927872,\"X2\":515.38081807807953,\"Y1\":449.98672941538484,\"Y2\":458.34174455384596},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":68.237298839840008,\"Y1\":438.11710461538473,\"Y2\":443.95394153846178},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":162.77703927872,\"X2\":515.38081807807953,\"Y1\":449.98672941538484,\"Y2\":458.34174455384596},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":68.237298839840008,\"Y1\":438.11710461538473,\"Y2\":443.95394153846178}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:04:45\n _Jane Doe\n 2017-11-09T11:04:45\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":519.71662400000048,\"Y1\":336.08085686153845,\"Y2\":344.5234245538461},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":519.716488502,\"Y1\":322.53105686153845,\"Y2\":330.97362455384609},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":510.50264076176006,\"Y1\":308.95207267692308,\"Y2\":317.42382455384609},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":139.78025367968004,\"Y1\":295.45647187692293,\"Y2\":303.786472},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":519.71662400000048,\"Y1\":295.45647187692293,\"Y2\":344.5234245538461}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:05:47\n _Jane Doe\n 2017-11-09T11:05:47\n 3431d878-e7b8-4416-b757-ab492eb537d1\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":157.12401935936003,\"Y1\":177.47210952307682,\"Y2\":187.39368999999988},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":517.00666400000023,\"Y1\":160.0210094153847,\"Y2\":168.37602455384604},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":488.28097960160051,\"Y1\":146.38365686153861,\"Y2\":154.82622455384603},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":517.00695125576021,\"Y1\":132.8588718769231,\"Y2\":141.27642455384603},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":522.42684415615986,\"Y1\":119.37160941538468,\"Y2\":127.72662455384602},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":514.83876645896,\"Y1\":105.7342568615386,\"Y2\":114.17682455384602},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":229.75092567967997,\"Y1\":92.272009415384673,\"Y2\":100.62702455384601},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":204.27724748048004,\"Y1\":61.540281296153807,\"Y2\":71.511370657692169},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":38.427728,\"X2\":196.68929444144004,\"Y1\":45.714896615384532,\"Y2\":52.3021839999999},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":498.03686270119994,\"Y1\":812.01840886153855,\"Y2\":820.46097655384619},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":508.87700079679985,\"Y1\":798.46860886153854,\"Y2\":806.91117655384619},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":519.71658064064047,\"Y1\":784.91880886153854,\"Y2\":793.36137655384618},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":443.83785239840006,\"Y1\":771.36900886153876,\"Y2\":779.81157655384618},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":296.41592000000009,\"Y1\":740.67037352307693,\"Y2\":750.69592265769234},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":523.5588026822694,\"Y1\":722.9941382769232,\"Y2\":731.89531458461556},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":512.12875767967989,\"Y1\":709.58192086153872,\"Y2\":718.02448855384614},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":521.88436436336,\"Y1\":696.03212086153871,\"Y2\":704.47468855384614},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":490.99083120320034,\"Y1\":682.48232086153871,\"Y2\":690.92488855384613},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":518.632775498,\"Y1\":668.93252086153871,\"Y2\":677.37508855384613},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":503.99885600000033,\"Y1\":655.3827208615387,\"Y2\":663.82528855384612},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":144.11621135936,\"Y1\":643.60064861538467,\"Y2\":650.27548855384612},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":40.978710906559996,\"X2\":115.39054864064002,\"Y1\":472.92632552307691,\"Y2\":482.84790600000019},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":512.128465004,\"Y1\":455.25009027692317,\"Y2\":464.15126658461554},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":501.28904775775976,\"Y1\":441.70029027692317,\"Y2\":450.60146658461554},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":493.1592598963997,\"Y1\":428.31308787692319,\"Y2\":436.73064055384611},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":526.22057135935984,\"Y1\":414.73827286153869,\"Y2\":423.18084055384611},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":117.55859793943999,\"Y1\":401.27602541538477,\"Y2\":409.543488},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":106.17677135935999,\"Y1\":370.48983752307686,\"Y2\":380.41141800000014},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":514.29642216416,\"Y1\":352.81360227692335,\"Y2\":361.71477858461549},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":524.5945194804799,\"Y1\":339.26380227692334,\"Y2\":348.16497858461548},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":494.24286992191981,\"Y1\":325.87659987692314,\"Y2\":334.29415255384629},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":512.12873600000012,\"Y1\":312.32679987692313,\"Y2\":320.74435255384628},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":481.77743873623979,\"Y1\":298.75198486153863,\"Y2\":307.19455255384628},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":515.38057960160018,\"Y1\":285.22719987692312,\"Y2\":293.64475255384627},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":471.47933599999971,\"Y1\":271.65238486153839,\"Y2\":280.00740000000019},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.0525600000002,\"Y1\":806.9923508615384,\"Y2\":815.43491855384616},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":521.34273007808,\"Y1\":793.467565876923,\"Y2\":801.797566},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":511.58642964463991,\"Y1\":779.89275086153839,\"Y2\":788.33531855384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.96859767967987,\"Y1\":766.34295086153838,\"Y2\":774.78551855384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":516.4649971952,\"Y1\":752.818165876923,\"Y2\":761.23571855384614},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":233.00293729880002,\"Y1\":739.268365876923,\"Y2\":747.68591855384614},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":148.45212567968,\"Y1\":708.59917529615382,\"Y2\":718.46629599999994},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":516.46480749799957,\"Y1\":691.00606286153845,\"Y2\":699.4486305538461},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":512.12875767968012,\"Y1\":677.45626286153845,\"Y2\":685.811278},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":514.29659560160007,\"Y1\":663.90646286153844,\"Y2\":672.34903055384609},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":268.2322059219199,\"Y1\":650.219080276923,\"Y2\":659.12025658461539},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":151.16206400000002,\"Y1\":619.7619961807693,\"Y2\":629.579608},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.42677911712008,\"Y1\":601.981792276923,\"Y2\":610.88296858461536},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.59448696096024,\"Y1\":588.5695748615384,\"Y2\":597.012142553846},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":507.2506670820801,\"Y1\":575.01977486153839,\"Y2\":583.462342553846},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.96877111711979,\"Y1\":561.46997486153839,\"Y2\":569.91254255384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":230.83484464064003,\"Y1\":547.92017486153838,\"Y2\":556.36274255384615},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":40.959643628,\"X2\":66.06932,\"Y1\":519.32071623076922,\"Y2\":527.14312},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":525.13637056256039,\"Y1\":499.68288686153852,\"Y2\":508.12545455384617},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":503.45708079680008,\"Y1\":486.13308686153852,\"Y2\":494.57565455384616},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":522.42631300399989,\"Y1\":472.60830187692312,\"Y2\":481.02585455384622},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":511.58644048448036,\"Y1\":459.03348686153851,\"Y2\":467.47605455384621},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.427728,\"X2\":369.58487793944,\"Y1\":445.4836868615385,\"Y2\":453.92625455384621},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":38.427728,\"X2\":183.68158400000004,\"Y1\":22.585433296153951,\"Y2\":32.452554000000077},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":522.42684415615986,\"Y1\":92.272009415384673,\"Y2\":187.39368999999988},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":38.427728,\"X2\":204.27724748048004,\"Y1\":45.714896615384532,\"Y2\":71.511370657692169},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":519.71658064064047,\"Y1\":771.36900886153876,\"Y2\":820.46097655384619},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":523.5588026822694,\"Y1\":643.60064861538467,\"Y2\":750.69592265769234},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":526.22057135935984,\"Y1\":401.27602541538477,\"Y2\":482.84790600000019},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":524.5945194804799,\"Y1\":271.65238486153839,\"Y2\":380.41141800000014},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":38.427728,\"X2\":183.68158400000004,\"Y1\":22.585433296153951,\"Y2\":32.452554000000077},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.0525600000002,\"Y1\":739.268365876923,\"Y2\":815.43491855384616},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":516.46480749799957,\"Y1\":650.219080276923,\"Y2\":718.46629599999994},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":524.59448696096024,\"Y1\":547.92017486153838,\"Y2\":629.579608},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.427728,\"X2\":525.13637056256039,\"Y1\":445.4836868615385,\"Y2\":527.14312}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:06:41\n _Jane Doe\n 2017-11-09T11:06:41\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":54.056990781939788,\"X2\":395.614537633432,\"Y1\":320.39400621960817,\"Y2\":562.66204751728492},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":54.056990781939788,\"X2\":395.614537633432,\"Y1\":320.39400621960817,\"Y2\":562.66204751728492}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:07:01\n _Jane Doe\n 2017-11-09T11:07:01\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":528.34608000000014,\"X2\":545.36976000000016,\"Y1\":689.45242187499991,\"Y2\":698.966875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.35872000000006,\"Y1\":673.9724218749999,\"Y2\":683.48687499999994},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.71976,\"Y1\":658.612421875,\"Y2\":668.126875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.63143999999988,\"Y1\":643.132421875,\"Y2\":652.646875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.7796,\"Y1\":627.652421875,\"Y2\":637.166875},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":56.64,\"X2\":432.75071999999994,\"Y1\":612.292421875,\"Y2\":621.806875},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":56.64,\"X2\":545.7796,\"Y1\":612.292421875,\"Y2\":698.966875}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:07:16\n _Jane Doe\n 2017-11-09T11:07:16\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.79112,\"Y1\":709.1378125,\"Y2\":718.646875},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.7316,\"Y1\":693.652421875,\"Y2\":703.166875},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.6655199999999,\"Y1\":678.17242187499994,\"Y2\":687.686875},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":56.64,\"X2\":302.54495999999989,\"Y1\":662.812421875,\"Y2\":672.32687500000009},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":56.64,\"X2\":545.79112,\"Y1\":662.812421875,\"Y2\":718.646875}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:07:47\n _Jane Doe\n 2017-11-09T11:07:47\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":304.52983,\"X2\":539.64315320000026,\"Y1\":459.617692533077,\"Y2\":468.19107345615396},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.63179375,\"Y1\":448.6559025330771,\"Y2\":457.22928345615406},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64693695000017,\"Y1\":437.702642533077,\"Y2\":446.27602345615395},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64315115,\"Y1\":428.8376033023078,\"Y2\":435.314233456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65356210000016,\"Y1\":417.87582330230777,\"Y2\":424.35245345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65166920000013,\"Y1\":406.92255330230779,\"Y2\":413.399183456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66018725,\"Y1\":393.86402253307705,\"Y2\":402.437403456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64788340000018,\"Y1\":383.71182130230784,\"Y2\":391.47562345615404},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66870530000017,\"Y1\":371.94897253307704,\"Y2\":380.522353456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6573479000001,\"Y1\":360.987192533077,\"Y2\":369.560573456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6422047,\"Y1\":350.025402533077,\"Y2\":358.59878345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6497763000001,\"Y1\":339.072142533077,\"Y2\":347.64552345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":404.2790328,\"Y1\":330.20710330230776,\"Y2\":336.68373345615396},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66870530000017,\"Y1\":330.20710330230776,\"Y2\":468.19107345615396}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:08:04\n _Jane Doe\n 2017-11-09T11:08:04\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":304.52983,\"X2\":539.64504610000006,\"Y1\":317.148572533077,\"Y2\":325.721953456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65261565,\"Y1\":306.19530253307704,\"Y2\":314.768683456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.63652599999978,\"Y1\":295.233522533077,\"Y2\":303.806903456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64220470000009,\"Y1\":284.27173253307694,\"Y2\":292.84511345615391},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64220470000009,\"Y1\":273.47980585615392,\"Y2\":281.89185345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.65072275,\"Y1\":262.51801585615397,\"Y2\":270.930063456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.64504405,\"Y1\":251.39490253307704,\"Y2\":259.968283456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6497763000001,\"Y1\":240.44163253307707,\"Y2\":249.01501345615398},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.68100915000014,\"Y1\":229.47985253307709,\"Y2\":238.053233456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.61286475,\"Y1\":218.52658253307703,\"Y2\":227.09996345615394},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66113370000016,\"Y1\":207.56480253307703,\"Y2\":216.13818345615394},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6478834,\"Y1\":196.60302253307705,\"Y2\":205.17640345615396},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.63368665000007,\"Y1\":185.64975253307711,\"Y2\":194.22313345615402},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.66208015000007,\"Y1\":174.68797253307704,\"Y2\":183.26135345615396},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6488298500002,\"Y1\":163.72618253307704,\"Y2\":172.29956345615395},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6374724499999,\"Y1\":152.77292253307706,\"Y2\":161.34630345615398},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6516692,\"Y1\":141.81113253307703,\"Y2\":150.38451345615394},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6516692,\"Y1\":130.84935253307708,\"Y2\":139.422733456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":540.99278885000012,\"Y1\":119.89608253307705,\"Y2\":128.469463456154},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":424.2983432,\"Y1\":108.93430253307703,\"Y2\":117.50768345615396},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":295.566,\"X2\":540.99278885000012,\"Y1\":108.93430253307703,\"Y2\":325.721953456154}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:08:23\n _Jane Doe\n 2017-11-09T11:08:23\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":304.52983,\"X2\":539.64220675,\"Y1\":97.97252253307704,\"Y2\":106.54590345615397},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6573479000001,\"Y1\":87.019252533077037,\"Y2\":95.592633456153962},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.62138279999988,\"Y1\":76.057472533077046,\"Y2\":84.630853456153972},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":295.566,\"X2\":539.6573479000001,\"Y1\":76.057472533077046,\"Y2\":106.54590345615397}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:12\n _Jane Doe\n 2017-11-09T11:09:12\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":248.14699909999996,\"X2\":288.77336535,\"Y1\":511.11637252307685,\"Y2\":519.68975344615376},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78188340000008,\"Y1\":500.1545825230769,\"Y2\":508.72796344615386},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78472275000018,\"Y1\":489.19280252307686,\"Y2\":497.76618344615383},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":237.70103045000013,\"Y1\":478.23953252307683,\"Y2\":486.8129134461538},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78472275000018,\"Y1\":478.23953252307683,\"Y2\":519.68975344615376}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:24\n _Jane Doe\n 2017-11-09T11:09:24\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":239.70466510000011,\"X2\":288.79513370000012,\"Y1\":478.23953252307683,\"Y2\":486.8129134461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78093695000007,\"Y1\":467.2777525230768,\"Y2\":475.85113344615377},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78850855000019,\"Y1\":456.31597252307688,\"Y2\":464.88935344615385},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.7733673,\"Y1\":445.3627025230769,\"Y2\":453.93608344615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.79134790000006,\"Y1\":434.40092252307693,\"Y2\":442.9743034461539},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.76200795000017,\"Y1\":423.43913252307692,\"Y2\":432.01251344615389},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77999050000005,\"Y1\":412.48587252307692,\"Y2\":421.05925344615389},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77715115000012,\"Y1\":401.52408252307691,\"Y2\":410.09746344615388},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.79891950000012,\"Y1\":390.56230252307694,\"Y2\":399.13568344615391},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.7790440500001,\"Y1\":379.60903252307691,\"Y2\":388.18241344615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77620470000011,\"Y1\":368.64725252307693,\"Y2\":377.2206334461539},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78661565000004,\"Y1\":357.6939825230769,\"Y2\":366.26736344615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.77715115000007,\"Y1\":346.73220252307692,\"Y2\":355.30558344615389},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.78472275000007,\"Y1\":335.77042252307689,\"Y2\":344.34380344615386},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":44.7,\"X2\":177.02033515000005,\"Y1\":324.81715252307686,\"Y2\":333.39053344615382},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":44.7,\"X2\":288.79891950000012,\"Y1\":324.81715252307686,\"Y2\":486.8129134461538}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:42\n _Jane Doe\n 2017-11-09T11:09:42\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":481.35072445000014,\"X2\":540.85025015000019,\"Y1\":149.01963252307695,\"Y2\":157.59301344615386},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.75417,\"X2\":540.94868095000015,\"Y1\":138.06637252307689,\"Y2\":146.6397534461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.75417,\"X2\":540.84078565,\"Y1\":127.1045825230769,\"Y2\":135.67796344615383},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.75417,\"X2\":494.26124890000011,\"Y1\":116.14280252307691,\"Y2\":124.71618344615383},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":296.75417,\"X2\":540.94868095000015,\"Y1\":116.14280252307691,\"Y2\":157.59301344615386}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:09:59\n _Jane Doe\n 2017-11-09T11:09:59\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":38.908456409196525,\"X2\":547.08673055365909,\"Y1\":431.62871105012982,\"Y2\":754.91036047448233},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":38.908456409196525,\"X2\":547.08673055365909,\"Y1\":431.62871105012982,\"Y2\":754.91036047448233}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:10:20\n _Jane Doe\n 2017-11-09T11:10:20\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":304.52983,\"X2\":539.6355816,\"Y1\":244.38514252307692,\"Y2\":252.95852344615383},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":295.566,\"X2\":539.62611505000007,\"Y1\":233.42336252307695,\"Y2\":241.99674344615386},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":295.566,\"X2\":539.64031180000006,\"Y1\":222.47009252307691,\"Y2\":231.04347344615383},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":295.566,\"X2\":465.83140855,\"Y1\":211.50831252307691,\"Y2\":220.08169344615382},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":295.566,\"X2\":539.64031180000006,\"Y1\":211.50831252307691,\"Y2\":252.95852344615383}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:10:42\n _Jane Doe\n 2017-11-09T11:10:42\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":41.61513163766238,\"X2\":546.41006174654274,\"Y1\":334.73451460435217,\"Y2\":743.23266575981006},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":41.61513163766238,\"X2\":546.41006174654274,\"Y1\":334.73451460435217,\"Y2\":743.23266575981006}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:11:26\n _Jane Doe\n 2017-11-09T11:11:26\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":454.5964006,\"X2\":539.6406118,\"Y1\":94.39025252307691,\"Y2\":102.96363344615384},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.64061180000022,\"Y1\":83.436982523076921,\"Y2\":92.010363446153846},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.6406118,\"Y1\":72.4752025230769,\"Y2\":81.048583446153827},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.63209375000008,\"Y1\":61.51341252307693,\"Y2\":70.086793446153848},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":44.7,\"X2\":288.79229435000008,\"Y1\":372.16400129230766,\"Y2\":379.92780344615386},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":44.7,\"X2\":120.09136765000001,\"Y1\":360.39264252307692,\"Y2\":368.96602344615388},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":295.56629999999996,\"X2\":539.64061180000022,\"Y1\":61.51341252307693,\"Y2\":102.96363344615384},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":44.7,\"X2\":288.79229435000008,\"Y1\":360.39264252307692,\"Y2\":379.92780344615386}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:11:44\n _Jane Doe\n 2017-11-09T11:11:44\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":38.231787602080068,\"X2\":548.440068167892,\"Y1\":56.405941423992317,\"Y2\":270.79983863637653},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":38.231787602080068,\"X2\":548.440068167892,\"Y1\":56.405941423992317,\"Y2\":270.79983863637653}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:12:23\n _Jane Doe\n 2017-11-09T11:12:23\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":7,\"X1\":304.53011999999995,\"X2\":539.63303225,\"Y1\":686.45570252307687,\"Y2\":695.02908344615378},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64818339999988,\"Y1\":675.50243252307689,\"Y2\":684.0758134461538},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.67563045,\"Y1\":664.54065252307691,\"Y2\":673.11403344615383},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.66143370000009,\"Y1\":653.578862523077,\"Y2\":662.15224344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64912985000012,\"Y1\":642.62560252307685,\"Y2\":651.19898344615376},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63398664999988,\"Y1\":631.6638125230769,\"Y2\":640.23719344615381},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63020084999994,\"Y1\":620.70203252307681,\"Y2\":629.27541344615372},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.66711240000006,\"Y1\":609.74876252307683,\"Y2\":618.32214344615375},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64629050000008,\"Y1\":598.78698252307686,\"Y2\":607.36036344615377},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":414.15932434999996,\"Y1\":587.986525846154,\"Y2\":596.39857344615393},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63020085,\"Y1\":562.99413252307693,\"Y2\":571.56751344615384},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64818340000011,\"Y1\":552.04087252307693,\"Y2\":560.61425344615384},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.6311473,\"Y1\":541.07908252307686,\"Y2\":549.65246344615377},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":427.83552684999995,\"Y1\":530.11730252307689,\"Y2\":538.6906834461538},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":304.53011999999995,\"X2\":539.65953285,\"Y1\":506.28569252307688,\"Y2\":514.85907344615384},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64723695000009,\"Y1\":495.3324225230769,\"Y2\":503.90580344615387},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.75323935000006,\"Y1\":484.37064252307692,\"Y2\":492.94402344615389},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.63777245000017,\"Y1\":473.40885252307692,\"Y2\":481.98223344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64912985000012,\"Y1\":462.45559252307692,\"Y2\":471.02897344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.6708982,\"Y1\":451.49380252307691,\"Y2\":460.06718344615388},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.6481834,\"Y1\":440.53202252307693,\"Y2\":449.1054034461539},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":367.31099579999994,\"Y1\":429.57875252307684,\"Y2\":438.15213344615381},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.67563045,\"Y1\":587.986525846154,\"Y2\":695.02908344615378},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.64818340000011,\"Y1\":530.11730252307689,\"Y2\":571.56751344615384},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":295.56629999999996,\"X2\":539.75323935000006,\"Y1\":429.57875252307684,\"Y2\":514.85907344615384}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:12:38\n _Jane Doe\n 2017-11-09T11:12:38\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":8,\"X1\":53.664,\"X2\":288.76785870000009,\"Y1\":530.69952252307689,\"Y2\":539.2729034461538},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.70017205,\"X2\":288.79246640000008,\"Y1\":519.73773862307689,\"Y2\":528.3111195461538},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.70017205,\"X2\":273.25175740000003,\"Y1\":508.77595472307689,\"Y2\":517.3493356461538},{\"IsContainer\":true,\"PageIndex\":8,\"X1\":44.70017205,\"X2\":288.79246640000008,\"Y1\":508.77595472307689,\"Y2\":539.2729034461538}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:13:08\n _Jane Doe\n 2017-11-09T11:13:08\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":246.58437939999993,\"X2\":287.6025759499999,\"Y1\":324.57370252307692,\"Y2\":333.14708344615389},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59500435000018,\"Y1\":313.62044252307692,\"Y2\":322.19382344615389},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.57228954999994,\"Y1\":302.65865252307691,\"Y2\":311.23203344615388},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58837920000019,\"Y1\":291.69687252307688,\"Y2\":300.27025344615384},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.57418245,\"Y1\":280.7436025230769,\"Y2\":289.31698344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58459339999985,\"Y1\":269.78182252307687,\"Y2\":278.35520344615384},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":208.66675305000007,\"Y1\":258.82003252307686,\"Y2\":267.39341344615383},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.6025759499999,\"Y1\":258.82003252307686,\"Y2\":333.14708344615389}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:13:14\n _Jane Doe\n 2017-11-09T11:13:14\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":172.6609557,\"X2\":287.59595080000008,\"Y1\":423.2042025230769,\"Y2\":431.77758344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59973660000014,\"Y1\":412.2509425230769,\"Y2\":420.82432344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.60352240000009,\"Y1\":401.45048584615375,\"Y2\":409.8625334461538},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.6035224000002,\"Y1\":392.42412329230763,\"Y2\":398.90075344615383},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.57891470000015,\"Y1\":379.37410252307694,\"Y2\":387.94748344615391},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59121855,\"Y1\":368.41232252307691,\"Y2\":376.98570344615388},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58648630000016,\"Y1\":357.4505325230769,\"Y2\":366.02391344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61014755000008,\"Y1\":346.4972725230769,\"Y2\":355.07065344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.59027210000016,\"Y1\":335.53548252307695,\"Y2\":344.10886344615392},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":243.86144274999995,\"Y1\":324.57370252307692,\"Y2\":333.14708344615389},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61014755000008,\"Y1\":324.57370252307692,\"Y2\":431.77758344615387}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:13:34\n _Jane Doe\n 2017-11-09T11:13:34\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":180.9821441,\"X2\":287.57891470000004,\"Y1\":532.796492523077,\"Y2\":541.36987344615386},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.60825465000016,\"Y1\":521.83470252307688,\"Y2\":530.4080834461538},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.6035224000002,\"Y1\":510.88144252307688,\"Y2\":519.4548234461538},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.58553985000015,\"Y1\":499.91965252307688,\"Y2\":508.49303344615385},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61109400000004,\"Y1\":491.05462329230767,\"Y2\":497.53125344615387},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":142.4237711,\"Y1\":478.00460252307687,\"Y2\":486.57798344615384},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":43.502710000000008,\"X2\":287.61109400000004,\"Y1\":478.00460252307687,\"Y2\":541.36987344615386}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:14:05\n _Jane Doe\n 2017-11-09T11:14:05\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":167.99272326,\"X2\":527.74420178,\"Y1\":633.18292898230777,\"Y2\":642.20751187461553},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":55.46416,\"X2\":527.73423918000015,\"Y1\":621.22182898230767,\"Y2\":630.24641187461543},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":55.46416,\"X2\":140.59856204,\"Y1\":609.26969898230777,\"Y2\":618.29428187461554},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":55.46416,\"X2\":527.74420178,\"Y1\":609.26969898230777,\"Y2\":642.20751187461553}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:14:48\n _Jane Doe\n 2017-11-09T11:14:48\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":308.48998,\"X2\":542.16469920000009,\"Y1\":475.90802252307691,\"Y2\":484.48140344615388},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":540.83493694999993,\"Y1\":464.946242523077,\"Y2\":473.51962344615396},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":540.82357955,\"Y1\":453.98445252307687,\"Y2\":462.55783344615384},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":540.85197305000008,\"Y1\":443.03119252307687,\"Y2\":451.60457344615384},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":296.754,\"X2\":480.78363090000016,\"Y1\":432.06940252307692,\"Y2\":440.64278344615389},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":296.754,\"X2\":542.16469920000009,\"Y1\":432.06940252307692,\"Y2\":484.48140344615388}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:15:18\n _Jane Doe\n 2017-11-09T11:15:18\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":52.476,\"X2\":287.59973415000013,\"Y1\":408.76742252307685,\"Y2\":417.34080344615381},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":43.502710000000008,\"X2\":124.24530595000002,\"Y1\":397.96697584615384,\"Y2\":406.37902344615389},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":43.502710000000008,\"X2\":287.59973415000013,\"Y1\":397.96697584615384,\"Y2\":417.34080344615381}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:15:36\n _Jane Doe\n 2017-11-09T11:15:36\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":53.664,\"X2\":200.41012605000009,\"Y1\":83.480422523076911,\"Y2\":92.053803446153836},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":53.664,\"X2\":200.41012605000009,\"Y1\":83.480422523076911,\"Y2\":92.053803446153836}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:15:57\n _Jane Doe\n 2017-11-09T11:15:57\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":7,\"X1\":88.842687250000012,\"X2\":287.57447245000014,\"Y1\":642.62370252307676,\"Y2\":651.19708344615367},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.61043755000003,\"Y1\":631.6619225230769,\"Y2\":640.23530344615381},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.60191950000012,\"Y1\":621.50972129230774,\"Y2\":629.27352344615383},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.5792047,\"Y1\":609.74687252307683,\"Y2\":618.32025344615374},{\"IsContainer\":false,\"PageIndex\":7,\"X1\":43.503,\"X2\":168.22334165,\"Y1\":598.785092523077,\"Y2\":607.35847344615388},{\"IsContainer\":true,\"PageIndex\":7,\"X1\":43.503,\"X2\":287.61043755000003,\"Y1\":598.785092523077,\"Y2\":651.19708344615367}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:16:11\n _Jane Doe\n 2017-11-09T11:16:11\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":8,\"X1\":53.663827950000005,\"X2\":288.78377630000017,\"Y1\":610.79080617307682,\"Y2\":619.36418709615373},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.7,\"X2\":288.76484730000004,\"Y1\":599.82902227307682,\"Y2\":608.40240319615373},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.7,\"X2\":288.79418725000016,\"Y1\":588.87575642307684,\"Y2\":597.44913734615375},{\"IsContainer\":false,\"PageIndex\":8,\"X1\":44.7,\"X2\":167.79812635000002,\"Y1\":577.91397252307684,\"Y2\":586.48735344615375},{\"IsContainer\":true,\"PageIndex\":8,\"X1\":44.7,\"X2\":288.79418725000016,\"Y1\":577.91397252307684,\"Y2\":619.36418709615373}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:22:22\n _Jane Doe\n 2017-11-09T11:22:22\n f0382d41-3a6a-42d2-86f5-e5f2497898fe\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":26.562771135875096,\"X2\":569.20223862589523,\"Y1\":244.56036314714515,\"Y2\":664.83558102450468},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":26.562771135875096,\"X2\":569.20223862589523,\"Y1\":244.56036314714515,\"Y2\":664.83558102450468}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:23:05\n _Jane Doe\n 2017-11-09T11:23:05\n fa809b85-0dc0-4b81-8e82-1950cc0a51e7\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":339.23342891792,\"Y1\":120.4344141558156,\"Y2\":128.40933447384646},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":343.56928903904009,\"Y1\":106.34262215581566,\"Y2\":114.31754247384629},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":352.78292540239983,\"Y1\":92.25083015581572,\"Y2\":100.22575047384635},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":337.0652658008002,\"Y1\":78.159038155815551,\"Y2\":86.1339584738464},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":42.763664000000006,\"X2\":352.78292540239983,\"Y1\":78.159038155815551,\"Y2\":128.40933447384646}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:23:12\n _Jane Doe\n 2017-11-09T11:23:12\n fa809b85-0dc0-4b81-8e82-1950cc0a51e7\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":251.23861043359992,\"X2\":345.19519999999989,\"Y1\":757.47196703458485,\"Y2\":765.31881047384627},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":42.763664000000006,\"X2\":327.85135844143997,\"Y1\":743.2520981558157,\"Y2\":751.22701847384633},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":42.763664000000006,\"X2\":341.40119638088,\"Y1\":729.16030615581576,\"Y2\":737.13522647384639},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":42.763664000000006,\"X2\":345.19519999999989,\"Y1\":729.16030615581576,\"Y2\":765.31881047384627}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:06\n _Jane Doe\n 2017-11-09T11:24:06\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":162.82121410000002,\"X2\":329.42291470000009,\"Y1\":279.72875252307682,\"Y2\":288.30213344615379},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.4096644,\"Y1\":268.76697252307684,\"Y2\":277.34035344615381},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42102180000029,\"Y1\":258.61476129230766,\"Y2\":266.37856344615386},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":181.5987821,\"Y1\":248.94867329230769,\"Y2\":255.42530344615383},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42291470000009,\"Y1\":248.94867329230769,\"Y2\":288.30213344615379}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:19\n _Jane Doe\n 2017-11-09T11:24:19\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":183.60241675,\"X2\":329.5402745,\"Y1\":248.94867329230769,\"Y2\":255.42530344615383},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42102180000012,\"Y1\":235.89014252307695,\"Y2\":244.46352344615386},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42007534999993,\"Y1\":224.92835252307694,\"Y2\":233.50173344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":202.00140475000003,\"Y1\":213.97509252307691,\"Y2\":222.54847344615382},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.5402745,\"Y1\":213.97509252307691,\"Y2\":255.42530344615383}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:36\n _Jane Doe\n 2017-11-09T11:24:36\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":180.29193745000003,\"X2\":330.7178611,\"Y1\":663.83058887307686,\"Y2\":672.40396979615377},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.60996580000005,\"Y1\":652.86880497307686,\"Y2\":661.44218589615377},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":220.70345955000005,\"Y1\":641.91553912307688,\"Y2\":650.48892004615379},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.7178611,\"Y1\":641.91553912307688,\"Y2\":672.40396979615377}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:24:44\n _Jane Doe\n 2017-11-09T11:24:44\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.63930575000006,\"Y1\":532.99807312307678,\"Y2\":541.5714540461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.6345735000001,\"Y1\":522.03628922307678,\"Y2\":530.6096701461538},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61469805000007,\"Y1\":511.07450532307678,\"Y2\":519.64788624615369},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61469805000007,\"Y1\":500.1212394730768,\"Y2\":508.69462039615371},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":104.57404455,\"Y1\":489.1594555730768,\"Y2\":497.73283649615371},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.63930575000006,\"Y1\":489.1594555730768,\"Y2\":541.5714540461538}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:00\n _Jane Doe\n 2017-11-09T11:25:00\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":333.16403646011497,\"X2\":588.54921492181984,\"Y1\":91.6163665230979,\"Y2\":211.9411232191062},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":333.16403646011497,\"X2\":588.54921492181984,\"Y1\":91.6163665230979,\"Y2\":211.9411232191062}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:19\n _Jane Doe\n 2017-11-09T11:25:19\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":309.11806640000003,\"X2\":329.65129915000006,\"Y1\":546.61537087307693,\"Y2\":555.18875179615384},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.52352840000015,\"Y1\":535.65358697307693,\"Y2\":544.23628678846148},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.43361565000009,\"Y1\":524.70032112307683,\"Y2\":533.27370204615386},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.43550855,\"Y1\":513.73853722307683,\"Y2\":522.31191814615386},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":225.34777690000004,\"Y1\":502.78527137307685,\"Y2\":511.36797118846147},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.65129915000006,\"Y1\":502.78527137307685,\"Y2\":555.18875179615384}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:34\n _Jane Doe\n 2017-11-09T11:25:34\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":227.76027795000002,\"X2\":329.43077630000005,\"Y1\":502.78527137307685,\"Y2\":511.36797118846147},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.44686595000007,\"Y1\":491.82348747307685,\"Y2\":500.39686839615382},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.42888340000013,\"Y1\":480.86170357307685,\"Y2\":489.43508449615382},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.44686595000007,\"Y1\":469.90843772307687,\"Y2\":478.48181864615378},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.54340385,\"Y1\":458.94665382307687,\"Y2\":467.52003474615384},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":119.05197740000001,\"Y1\":447.98486992307687,\"Y2\":456.56756973846154},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.54340385,\"Y1\":447.98486992307687,\"Y2\":511.36797118846147}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:25:42\n _Jane Doe\n 2017-11-09T11:25:42\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":123.55140070000002,\"X2\":329.51784969999994,\"Y1\":447.98486992307687,\"Y2\":456.56756973846154},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.42604405000009,\"Y1\":437.03160407307689,\"Y2\":445.6049849961538},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":325.07805275000004,\"Y1\":426.06982017307689,\"Y2\":434.6432010961538},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":85.347000000000008,\"X2\":329.51784969999994,\"Y1\":426.06982017307689,\"Y2\":456.56756973846154}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:00\n _Jane Doe\n 2017-11-09T11:26:00\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":278.34161055000004,\"X2\":330.64338399999997,\"Y1\":700.03775522307694,\"Y2\":708.61113614615385},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.6159369500001,\"Y1\":689.084489373077,\"Y2\":697.65787029615387},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.62066920000012,\"Y1\":678.12270547307685,\"Y2\":686.69608639615387},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.62161565000008,\"Y1\":667.16092157307685,\"Y2\":675.73430249615387},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.62066920000018,\"Y1\":656.20765572307687,\"Y2\":664.78103664615378},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63013370000004,\"Y1\":647.30534702307693,\"Y2\":653.81925274615378},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63486595000012,\"Y1\":634.28408792307687,\"Y2\":642.85746884615378},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63013370000016,\"Y1\":623.33082207307689,\"Y2\":631.9042029961538},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.61972275000005,\"Y1\":612.36903817307689,\"Y2\":620.9424190961538},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.64054465000004,\"Y1\":601.40725427307689,\"Y2\":609.9806351961538},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.63202660000013,\"Y1\":590.45398842307691,\"Y2\":599.02736934615382},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.71436775000006,\"Y1\":579.49220452307691,\"Y2\":588.06558544615382},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":186.25391845000001,\"Y1\":568.53042062307691,\"Y2\":576.76832142307694},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":86.53405355,\"X2\":330.71436775000006,\"Y1\":568.53042062307691,\"Y2\":708.61113614615385}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:18\n _Jane Doe\n 2017-11-09T11:26:18\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":80.453048348794511,\"X2\":589.886310097012,\"Y1\":283.92661585820258,\"Y2\":493.15799833515064},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":80.453048348794511,\"X2\":589.886310097012,\"Y1\":283.92661585820258,\"Y2\":493.15799833515064}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:37\n _Jane Doe\n 2017-11-09T11:26:37\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":346.37429244999993,\"X2\":582.82400305,\"Y1\":689.084489373077,\"Y2\":697.65787029615387},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":581.50086595,\"Y1\":678.12270547307685,\"Y2\":686.69608639615387},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":581.4999195,\"Y1\":667.16092157307685,\"Y2\":675.73430249615387},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":406.05932235,\"Y1\":658.26713092307693,\"Y2\":664.78103664615378},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":337.40099999999995,\"X2\":582.82400305,\"Y1\":658.26713092307693,\"Y2\":697.65787029615387}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:26:59\n _Jane Doe\n 2017-11-09T11:26:59\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":95.507999999999981,\"X2\":330.61375160000006,\"Y1\":188.45177042307682,\"Y2\":197.02515134615379},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":86.534707549999979,\"X2\":278.3186033,\"Y1\":177.48998652307682,\"Y2\":186.06336744615373},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":86.534707549999979,\"X2\":330.61375160000006,\"Y1\":177.48998652307682,\"Y2\":197.02515134615379}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:27:13\n _Jane Doe\n 2017-11-09T11:27:13\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":458.26636360000003,\"X2\":582.66775160000009,\"Y1\":309.2668547230769,\"Y2\":317.84023564615381},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.6866806,\"Y1\":298.31358887307692,\"Y2\":306.88696979615383},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.68762705000017,\"Y1\":287.35180497307692,\"Y2\":295.92518589615383},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.66964450000012,\"Y1\":276.39002107307692,\"Y2\":284.96340199615383},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.68951995000009,\"Y1\":265.43675522307694,\"Y2\":274.01013614615385},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.71128830000021,\"Y1\":254.47497132307689,\"Y2\":263.0576711384615},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":432.62987245,\"Y1\":243.51318742307689,\"Y2\":252.08656834615383},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.71128830000021,\"Y1\":243.51318742307689,\"Y2\":317.84023564615381}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:27:23\n _Jane Doe\n 2017-11-09T11:27:23\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":6,\"X1\":414.8754169,\"X2\":582.71128830000009,\"Y1\":133.92942062307688,\"Y2\":142.50280154615382},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.69046640000022,\"Y1\":122.96763672307688,\"Y2\":131.54101764615382},{\"IsContainer\":false,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":563.78985990000012,\"Y1\":112.01437087307687,\"Y2\":120.58775179615381},{\"IsContainer\":true,\"PageIndex\":6,\"X1\":338.59817205,\"X2\":582.71128830000009,\"Y1\":112.01437087307687,\"Y2\":142.50280154615382}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:10\n _Jane Doe\n 2017-11-09T11:28:10\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":218.14405595000002,\"X2\":329.42480294999996,\"Y1\":192.05152252307693,\"Y2\":200.62490344615384},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42575415,\"Y1\":181.09825252307695,\"Y2\":189.68095233846157},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":358.71694689999993,\"Y1\":358.1544225230769,\"Y2\":366.72780344615387},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":85.34671,\"X2\":329.42575415,\"Y1\":181.09825252307695,\"Y2\":200.62490344615384},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":358.71694689999993,\"Y1\":358.1544225230769,\"Y2\":366.72780344615387}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:18\n _Jane Doe\n 2017-11-09T11:28:18\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":540.83948105000013,\"X2\":581.47720470000013,\"Y1\":259.52392252307686,\"Y2\":268.09730344615383},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.49708015,\"Y1\":248.56214252307691,\"Y2\":257.13552344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.4980266,\"Y1\":237.60887252307694,\"Y2\":246.18225344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.48099050000019,\"Y1\":226.64709252307694,\"Y2\":235.22047344615385},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.4734189,\"Y1\":215.68530252307693,\"Y2\":224.25868344615384},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":509.4750745,\"Y1\":204.73204252307693,\"Y2\":213.30542344615384},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":337.40099999999995,\"X2\":581.4980266,\"Y1\":204.73204252307693,\"Y2\":268.09730344615383}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:39\n _Jane Doe\n 2017-11-09T11:28:39\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":205.67478,\"X2\":330.61280515000016,\"Y1\":371.03492397307673,\"Y2\":379.6083048961537},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.62321610000009,\"Y1\":360.08165812307675,\"Y2\":368.65503904615372},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":245.92635205,\"Y1\":349.11987422307675,\"Y2\":357.69325514615372},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.62321610000009,\"Y1\":349.11987422307675,\"Y2\":379.6083048961537}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:28:48\n _Jane Doe\n 2017-11-09T11:28:48\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":198.88210834999995,\"X2\":330.61564450000009,\"Y1\":305.28977472307673,\"Y2\":313.8631556461537},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61280515000021,\"Y1\":294.32799082307673,\"Y2\":302.9013717461537},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":86.53470755,\"X2\":330.61564450000009,\"Y1\":294.32799082307673,\"Y2\":313.8631556461537}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:29:14\n _Jane Doe\n 2017-11-09T11:29:14\n 4f932deb-1966-4d90-b4eb-45baeee36add\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":544.2729092,\"X2\":581.4797516,\"Y1\":184.73430402307685,\"Y2\":193.30768494615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.50057350000009,\"Y1\":173.78103817307684,\"Y2\":182.35441909615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.4797516000001,\"Y1\":162.81925427307684,\"Y2\":171.39263519615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.47123355000008,\"Y1\":151.85747037307684,\"Y2\":160.43085129615378},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.50719865000019,\"Y1\":140.90420452307683,\"Y2\":149.47758544615377},{\"IsContainer\":false,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":475.4830303,\"Y1\":129.94242062307683,\"Y2\":138.51580154615377},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":337.40070755000005,\"X2\":581.50719865000019,\"Y1\":129.94242062307683,\"Y2\":193.30768494615378}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:31:03\n _Jane Doe\n 2017-11-09T11:31:03\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":250.09765800000008,\"X2\":287.61855,\"Y1\":229.74695692307694,\"Y2\":238.76977423076926},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.61454199999991,\"Y1\":217.55781961538463,\"Y2\":226.58545423076922},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.69169599999992,\"Y1\":205.37349961538462,\"Y2\":214.40113423076923},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.7728580000001,\"Y1\":193.1891796153846,\"Y2\":202.21681423076922},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":288.15774161538468,\"Y1\":181.0649796153846,\"Y2\":190.09261423076921},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":254.35515599999991,\"Y1\":169.64179423076919,\"Y2\":177.9082942307692},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":45.36,\"X2\":288.15774161538468,\"Y1\":169.64179423076919,\"Y2\":238.76977423076926}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:31:31\n _Jane Doe\n 2017-11-09T11:31:31\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":485.04962399999994,\"X2\":549.97020599999973,\"Y1\":375.75357961538458,\"Y2\":384.78121423076919},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":307.6836,\"X2\":362.2074300000001,\"Y1\":364.33039423076917,\"Y2\":372.59689423076918},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":367.32264000000004,\"X2\":550.07167776923029,\"Y1\":363.56925961538457,\"Y2\":372.59689423076918},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":307.6836,\"X2\":405.723288,\"Y1\":351.38493961538455,\"Y2\":360.41257423076917},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":485.04962399999994,\"X2\":549.97020599999973,\"Y1\":375.75357961538458,\"Y2\":384.78121423076919},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":307.6836,\"X2\":405.723288,\"Y1\":351.38493961538455,\"Y2\":372.59689423076918},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":367.32264000000004,\"X2\":550.07167776923029,\"Y1\":363.56925961538457,\"Y2\":372.59689423076918}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:32:05\n _Jane Doe\n 2017-11-09T11:32:05\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":549.96519599999988,\"Y1\":151.71109961538468,\"Y2\":160.7387342307693},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.03834200000028,\"Y1\":139.60135153846159,\"Y2\":148.61453423076927},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":549.95016599999951,\"Y1\":127.52281961538466,\"Y2\":136.55045423076928},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.00227,\"Y1\":115.86339346153849,\"Y2\":124.49600884615387},{\"IsContainer\":false,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.0036188461537,\"Y1\":103.33453961538464,\"Y2\":112.36217423076926},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.64660600000008,\"Y1\":756.85251153846161,\"Y2\":765.86569423076924},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.770854,\"Y1\":744.71385961538465,\"Y2\":753.74149423076926},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.69069399999995,\"Y1\":732.73649115384615,\"Y2\":741.67741423076927},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.36,\"X2\":64.566336,\"Y1\":720.58569961538467,\"Y2\":729.61333423076928},{\"IsContainer\":true,\"PageIndex\":2,\"X1\":307.68359999999996,\"X2\":550.03834200000028,\"Y1\":103.33453961538464,\"Y2\":160.7387342307693},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":45.36,\"X2\":287.770854,\"Y1\":720.58569961538467,\"Y2\":765.86569423076924}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:32:12\n _Jane Doe\n 2017-11-09T11:32:12\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":69.566315999999972,\"X2\":287.65361999999988,\"Y1\":708.4614996153847,\"Y2\":717.53730730769234},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.349979999999967,\"X2\":287.649612,\"Y1\":696.39741961538471,\"Y2\":705.42505423076932},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":45.349979999999967,\"X2\":160.934688,\"Y1\":684.3333396153846,\"Y2\":693.36097423076922},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":45.349979999999967,\"X2\":287.65361999999988,\"Y1\":684.3333396153846,\"Y2\":717.53730730769234}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:33:02\n _Jane Doe\n 2017-11-09T11:33:02\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":215.33928000000003,\"X2\":287.74079400000011,\"Y1\":302.78793961538457,\"Y2\":311.81557423076919},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.77813776923085,\"Y1\":290.60361961538462,\"Y2\":299.63125423076923},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.70472200000012,\"Y1\":278.4192996153846,\"Y2\":287.44693423076922},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":45.36,\"X2\":168.02483999999998,\"Y1\":266.23979692307694,\"Y2\":275.26261423076926},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":45.36,\"X2\":287.77813776923085,\"Y1\":266.23979692307694,\"Y2\":311.81557423076919}]\n false\n \n \n _Jane Doe\n 2019-04-25T11:17:04\n _Jane Doe\n 2019-04-25T11:17:07\n 1cca0ebd-cbd5-4c4a-9e79-662d408985b3\n [{\"IsContainer\":false,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":518.65541601085931,\"Y1\":419.07905145251129,\"Y2\":424.3144782033109},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":518.59699380566519,\"Y1\":407.31431008312569,\"Y2\":412.55313413953547},{\"IsContainer\":false,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":335.23456083308008,\"Y1\":395.31903244451132,\"Y2\":400.55445919531087},{\"IsContainer\":true,\"PageIndex\":1,\"X1\":92.400073920000068,\"X2\":518.65541601085931,\"Y1\":395.31903244451132,\"Y2\":424.3144782033109}]\n false\n \n \n _Jane Doe\n 2019-04-25T11:17:26\n _Jane Doe\n 2019-04-25T11:17:27\n 1cca0ebd-cbd5-4c4a-9e79-662d408985b3\n [{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.5968475178928,\"Y1\":396.03430105912582,\"Y2\":401.27312511553561},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.7889650308399,\"Y1\":384.03429145912582,\"Y2\":389.27311551553561},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.64497856615185,\"Y1\":372.51901420451139,\"Y2\":377.754440955311},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.92772645662774,\"Y1\":360.51427264312582,\"Y2\":365.7530966995356},{\"IsContainer\":false,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":175.63422825412886,\"Y1\":350.19124525311054,\"Y2\":354.22608208183891},{\"IsContainer\":true,\"PageIndex\":4,\"X1\":92.400073919999926,\"X2\":518.92772645662774,\"Y1\":350.19124525311054,\"Y2\":401.27312511553561}]\n false\n \n \n _Jane Doe\n 2019-04-25T11:23:03\n _Jane Doe\n 2019-04-25T11:24:10\n 1cca0ebd-cbd5-4c4a-9e79-662d408985b3\n [{\"IsContainer\":false,\"PageIndex\":5,\"X1\":89.667140825035574,\"X2\":538.00284495021344,\"Y1\":350.82185802908361,\"Y2\":638.99262732335683},{\"IsContainer\":true,\"PageIndex\":5,\"X1\":89.667140825035574,\"X2\":538.00284495021344,\"Y1\":350.82185802908361,\"Y2\":638.99262732335683}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:07\n _Jane Doe\n 2017-11-09T11:18:07\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":537.750728017274,\"Y1\":716.04654049846147,\"Y2\":721.912528436923},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":537.750728017274,\"Y1\":716.04654049846147,\"Y2\":721.912528436923}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:20\n _Jane Doe\n 2017-11-09T11:18:20\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.86424505000014,\"Y1\":626.39177049846148,\"Y2\":632.257758436923},{\"IsContainer\":false,\"PageIndex\":12,\"X1\":303.72799999999995,\"X2\":368.34965786999993,\"Y1\":618.92205049846154,\"Y2\":624.7880384369231},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.86424505000014,\"Y1\":618.92205049846154,\"Y2\":632.257758436923}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:31\n _Jane Doe\n 2017-11-09T11:18:31\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85453150000012,\"Y1\":603.97355049846158,\"Y2\":609.83953843692314},{\"IsContainer\":false,\"PageIndex\":12,\"X1\":303.72799999999995,\"X2\":518.84622057612819,\"Y1\":596.50383049846153,\"Y2\":602.36981843692308},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85453150000012,\"Y1\":596.50383049846153,\"Y2\":609.83953843692314}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:40\n _Jane Doe\n 2017-11-09T11:18:40\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.89921332489553,\"Y1\":708.57682049846153,\"Y2\":714.44280843692309},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.89921332489553,\"Y1\":708.57682049846153,\"Y2\":714.44280843692309}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:18:48\n _Jane Doe\n 2017-11-09T11:18:48\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85906448999992,\"Y1\":701.10710049846159,\"Y2\":706.97308843692315},{\"IsContainer\":false,\"PageIndex\":12,\"X1\":303.72799999999995,\"X2\":389.61391395999993,\"Y1\":693.63738049846154,\"Y2\":699.5033684369231},{\"IsContainer\":true,\"PageIndex\":12,\"X1\":296.75302,\"X2\":540.85906448999992,\"Y1\":693.63738049846154,\"Y2\":706.97308843692315}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:19:00\n _Jane Doe\n 2017-11-09T11:19:00\n fa0ab907-e953-4553-ba6f-a768969bf91e\n [{\"IsContainer\":false,\"PageIndex\":11,\"X1\":295.566,\"X2\":539.65196982,\"Y1\":480.48204049846146,\"Y2\":486.34802843692296},{\"IsContainer\":false,\"PageIndex\":11,\"X1\":302.53190999999993,\"X2\":381.71417931999991,\"Y1\":473.01232049846152,\"Y2\":478.878308436923},{\"IsContainer\":true,\"PageIndex\":11,\"X1\":295.566,\"X2\":539.65196982,\"Y1\":473.01232049846152,\"Y2\":486.34802843692296}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:21:14\n _Jane Doe\n 2017-11-09T11:21:14\n 02b36055-5e10-4575-bc9e-acc2a1bbdcf2\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":119.01600000000002,\"X2\":366.25680000000006,\"Y1\":239.99023437500003,\"Y2\":249.49929687500003},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":119.01600000000002,\"X2\":366.25680000000006,\"Y1\":239.99023437500003,\"Y2\":249.49929687500003}]\n false\n \n \n _Jane Doe\n 2017-11-09T11:32:32\n _Jane Doe\n 2017-11-09T11:32:32\n 9c47accb-fd7a-4112-8642-3f578a77018e\n [{\"IsContainer\":false,\"PageIndex\":3,\"X1\":307.68654000000009,\"X2\":549.8994899999999,\"Y1\":291.17094807692308,\"Y2\":298.36062115384618},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":319.02612,\"X2\":549.96732000000009,\"Y1\":281.02836807692313,\"Y2\":288.21804115384617},{\"IsContainer\":false,\"PageIndex\":3,\"X1\":319.02612,\"X2\":541.70642399999986,\"Y1\":271.55580115384618,\"Y2\":278.17766653846155},{\"IsContainer\":true,\"PageIndex\":3,\"X1\":307.68654000000009,\"X2\":549.96732000000009,\"Y1\":271.55580115384618,\"Y2\":298.36062115384618}]\n false\n \n \n \n \n _Jane Doe\n 2017-05-23T11:49:29\n _Jane Doe\n 2017-05-23T11:49:29\n Difficulty of defining key terms\n 1\n 0\n -1\n 0\n 0\n difficulty of defining key terms\n [\"7ffc45bb-55b4-4eab-a211-03bf72d10b34\"]\n 1\n A number of papers attempt to delineate key concepts and define them. It seems a major problem with defining processes for avoiding food fraud lies in the fact that there are no agreed-upon terms.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{ \n\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 A number of papers attempt to delineate key concepts and define them. It seems a major problem with defining processes for avoiding food fraud lies in the fact that there are no agreed-upon terms. }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>A number of papers attempt to delineate key concepts and define them. It seems a major problem with defining processes for avoiding food fraud lies in the fact that there are no agreed-upon terms. </p>\n \n \n _Jane Doe\n 2017-05-29T16:25:16\n _Jane Doe\n 2017-05-29T16:25:16\n Terminological difficulties\n 0\n 2\n -1\n 0\n 0\n terminological difficulties\n [\"8f27e6f7-4e9a-4262-9ea9-da1a3d5b1ea7\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-29T16:25:56\n _Jane Doe\n 2017-05-29T16:25:56\n Food fraud and food crime\n 0\n 2\n -1\n 0\n 0\n food fraud and food crime\n [\"d236ea39-11df-4710-97c8-15808d9c1f40\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-29T16:26:55\n _Jane Doe\n 2017-05-29T16:26:55\n Other important terms\n 0\n 2\n -1\n 0\n 0\n other important terms\n [\"6a244c60-7afc-48ed-b768-31cb9aa126dd\"]\n 0\n 0\n \n \n _Jane Doe\n 2019-04-25T11:02:20\n _Jane Doe\n 2019-04-25T11:03:12\n Food counterfeiting similar to drug counterfeiting\n 1\n 0\n \n 24\n true\n 24\n 24\n\n24]]>\n 24\n 30\n 0\n 1\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n 0\n food counterfeiting similar to drug counterfeiting\n [\"19713072-f8dd-41ce-8e7d-45a53012a7dd\"]\n 0\n \"Counterfeited drugs are drugs that are not authentic and have been manufactured using incorrect quantities, or incorrect ingredients, to either reduce the potency, or nullify the potency of drugs altogether, and the same is applicable to food counterfeit.\"\n 0\n \n \n _Jane Doe\n 2019-04-25T11:00:18\n _Jane Doe\n 2019-04-25T11:01:46\n Advantages of RFID\n 1\n 0\n \n 27\n true\n 27\n 27\n\n27]]>\n 27\n 30\n 1\n 1\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n 0\n advantages of rfid\n [\"0180c2d0-17c4-4853-83e3-1f108fc54f78\"]\n 0\n \"With RFID, drugs can be tracked at the item level throughout the supply chain. Individual packages are tagged at manufacturing and then read serially, in-bulk throughout the distribution chain. The read points include tag application, case packaging, total tracking throughout distribution and item level tracking and authentication at the pharmacy. With RFID, the entire drug supply chain becomes more efficient and secure.\"\n 0\n \n \n _Jane Doe\n 2019-04-25T11:23:03\n _Jane Doe\n 2019-04-25T11:24:10\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Agbaraji, Ochulor et al.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Digital mass serialization in the supply chain\n 1\n 1\n \n 28\n true\n 28\n 28\n\n28]]>\n 28\n 30\n 2\n 0\n 351d2c56-4a9b-4998-af82-82a1baba0c33\n 0\n digital mass serialization in the supply chain\n [\"a1da867b-e0a0-4c2b-9c19-7baf6923dc3e\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-10-16T09:10:34\n _Jane Doe\n 2018-07-12T11:35:01\n It's unrealistic to aim for completely risk-free food\n 1\n 0\n \n 176\n true\n 176\n 176\n\n176]]>\n 176\n 30\n 0\n 1\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n 0\n it's unrealistic to aim for completely risk-free food\n [\"2c396f83-5260-47c2-bbe3-98ed2f429fd0\"]\n 1\n \"…zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.\"\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\loch\\af0\\dbch\\af0\\hich\\f0 \"\\u8230 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.\"}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>&quot;…zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.&quot;</p>\n \n \n _Jane Doe\n 2017-05-23T15:26:26\n _Jane Doe\n 2017-05-23T15:26:26\n Sweeney Todd = fictional work with food fraud in the plot\n 1\n 0\n -1\n 0\n 4\n 60accf57-c086-423f-9068-7c1afdc2de1d\n 0\n sweeney todd = fictional work with food fraud in the plot\n [\"5fcbe42a-facb-420a-bfac-61fd5a6b0d4e\"]\n 1\n I wonder if there's any way to work this into the paper? Perhaps in the introduction?\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 I wonder if there's any way to work this into the paper? Perhaps in the introduction?}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>I wonder if there&#39;s any way to work this into the paper? Perhaps in the introduction?</p>\n \n \n _Jane Doe\n 2017-05-23T14:42:36\n _Jane Doe\n 2017-05-23T14:42:36\n Situation in China\n 1\n 0\n \n Omit\n f3385\n f3385\n\nf3385]]>\n 2147483647\n 100\n 0\n 1\n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n 0\n situation in china\n [\"e8eeac4d-0a61-4287-a051-3b030b855e5b\"]\n 1\n “Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.”</p>\n \n \n _Jane Doe\n 2017-05-23T14:29:15\n _Jane Doe\n 2017-05-23T14:29:15\n The 2013 horsemeat scandal --> Europe-wide process for information exchange related to food fraud.\n 1\n 0\n \n 1\n true\n 1\n 1\n\n1]]>\n 1\n 30\n 0\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n the 2013 horsemeat scandal --> europe-wide process for information exchange related to food fraud.\n [\"60905ce3-5073-45f1-af6d-5a1dccfb849d\"]\n 1\n “In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.”</p>\n \n \n _Jane Doe\n 2017-05-23T14:29:59\n _Jane Doe\n 2017-05-23T14:29:59\n 2015 statistics - European Food Fraud Network\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 1\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n 2015 statistics - european food fraud network\n [\"62cbd1b2-388a-4126-b442-9f93a71f5ce8\"]\n 1\n “In 2015, 108 cases were exchanged by the Food Fraud Network.”\n 0\n {\\rtf1 \n\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman \n;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 In 2015, 108 cases were exchanged by the Food Fraud Network.\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“In 2015, 108 cases were exchanged by the Food Fraud Network.”</p>\n \n \n _Jane Doe\n 2017-05-23T14:30:09\n _Jane Doe\n 2017-05-23T14:30:09\n Types of violations\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 2\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n types of violations\n [\"b87ee68b-3275-41a0-bc0c-c21e64d7d2c5\"]\n 1\n “...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 ...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).”</p>\n \n \n _Jane Doe\n 2017-05-23T14:30:29\n _Jane Doe\n 2017-05-23T14:30:29\n Illegal exports and exchanges on fish products most common incidents (2015 Food Fraud Network)\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 3\n 1\n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n 0\n illegal exports and exchanges on fish products most common incidents (2015 food fraud network)\n [\"7af8d596-89ee-4ae8-9512-ae79efbdfd6d\"]\n 1\n “The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential \"food fraud\" cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential \"food fraud\" cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential &quot;food fraud&quot; cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:35:05\n _Jane Doe\n 2017-05-23T10:35:05\n Results of recent 61-country operation to check for food fraud (12/1/2016 - 03/31/2017)\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 0\n 1\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n results of recent 61-country operation to check for food fraud (12/1/2016 - 03/31/2017)\n [\"ddc38a60-4730-4f32-b362-0967ccf78acc\"]\n 1\n “Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:35:45\n _Jane Doe\n 2017-05-23T10:35:45\n Summary of number and location of checks\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 1\n 1\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n summary of number and location of checks\n [\"34603694-05f6-48b8-a45a-93c88890a532\"]\n 1\n “More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10 \n\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.\\u8221 }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:36:12\n _Jane Doe\n 2017-05-23T10:36:12\n Quote from Françoise Dorcier, Coordinator of INTERPOL’s Illicit Goods and Global Health Programme\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 2\n 1\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n quote from françoise dorcier, coordinator of interpol’s illicit goods and global health programme\n [\"e64baa2d-e301-4232-83a9-8a48f6c55305\"]\n 1\n “This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.”</p>\n \n \n _Jane Doe\n 2017-05-23T10:42:07\n _Jennifer Schultz\n 2020-01-10T08:18:38\n Findings in Europe\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 3\n 3\n 6d2b6a75-5e45-4e60-bf35-b700d3de8b3d\n 0\n findings in europe\n [\"1ac0e3e9-0baa-4b90-a931-fdd8ad034c98\"]\n 1\n Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent.\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI \n;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent. } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent. </p>\n \n \n _Jane Doe\n 2017-05-23T14:07:53\n _Jane Doe\n 2017-05-23T14:07:53\n Research not having any effect on food fraud incidents\n 1\n 0\n \n 660\n true\n 660\n 660\n\n660]]>\n 660\n 30\n 0\n 1\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n research not having any effect on food fraud incidents\n [\"ab553cad-13ee-4dbb-840d-c1bacad6f7ad\"]\n 1\n “Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....”</p>\n \n \n _Jane Doe\n 2017-11-09T10:26:49\n _Jane Doe\n 2017-11-09T10:26:49\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"jpg (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Disconnect between academic and public interest in food fraud\n 1\n 1\n \n 662\n true\n 662\n 662\n\n662]]>\n 662\n 30\n 1\n 0\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n disconnect between academic and public interest in food fraud\n [\"24c61537-ef6d-470f-8b26-4c3b834a46b3\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-11-09T10:17:53\n _Jane Doe\n 2017-11-09T10:17:53\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"jpg (3).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Factors leading to food fraud in the supply chain\n 1\n 1\n \n 664\n true\n 664\n 664\n\n664]]>\n 664\n 30\n 2\n 0\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n factors leading to food fraud in the supply chain\n [\"f7d3ecde-fd9c-44ab-9c0b-6bed17e9a3f7\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T14:12:50\n _Jane Doe\n 2017-05-23T14:12:50\n Another problem of terminology: US uses \"food fraud\" and UK and Europe use \"food crime\" in the research\n 1\n 0\n \n 665\n true\n 665\n 665\n\n665]]>\n 665\n 30\n 3\n 1\n 5fb48a7c-65db-4581-ab2c-7197305a0811\n 0\n another problem of terminology: us uses \"food fraud\" and uk and europe use \"food crime\" in the resea\n [\"d4f4135c-a563-44fa-8c71-f9d6bb8aae4f\"]\n 1\n “Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of ‘fraud’ and European based research adopts ‘crime’, which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term ‘food crime’ in order to build and strengthen a coherent body of knowledge.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of \\u8216 fraud\\u8217 and European based research adopts \\u8216 crime\\u8217 , which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term \\u8216 food crime\\u8217 in order to build and strengthen a coherent body of knowledge.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of ‘fraud’ and European based research adopts ‘crime’, which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term ‘food crime’ in order to build and strengthen a coherent body of knowledge.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:38:31\n _Jane Doe\n 2017-05-23T11:38:31\n Food fraud definition (GFSI)\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 0\n 1\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n 0\n food fraud definition (gfsi)\n [\"db04fcd6-ddcc-417a-a41b-d7a2e6e468db\"]\n 1\n “It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers’ health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters’ part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers\\u8217 health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters\\u8217 part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers’ health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters’ part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:18:37\n _Jane Doe\n 2017-11-09T10:18:37\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Némorin 07 2014 - GFSI Po.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Different topic areas and how they relate intentional and unintentional food fraud\n 1\n 1\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 1\n 0\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n 0\n different topic areas and how they relate intentional and unintentional food fraud\n [\"0c03c952-6df5-4c97-881d-1c94be6f9e1a\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T11:41:13\n _Jane Doe\n 2017-05-23T11:41:13\n GFSI's recommendations to food industry to mitigate risk of food fraud\n 1\n 0\n \n 3\n true\n 3\n 3\n\n3]]>\n 3\n 30\n 2\n 1\n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n 0\n gfsi's recommendations to food industry to mitigate risk of food fraud\n [\"f68c8e2d-20fc-4566-ac17-6866463d808e\"]\n 1\n “Secondly, appropriate control measures shall be put in place to reduce the risks from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Secondly, }{\\rtlch\\af0\\afs24\\ltrch\\b\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 appropriate control measures shall be put in place to reduce the risks } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Secondly, <strong>appropriate control measures shall be put in place to reduce the risks </strong>from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:19:50\n _Jane Doe\n 2017-05-23T13:19:50\n Definition of food fraud (Hong et al)\n 1\n 0\n -1\n 0\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n definition of food fraud (hong et al)\n [\"3af0c525-b411-459c-8606-feb17b53dee7\"]\n 1\n “The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:24:24\n _Jane Doe\n 2017-05-23T13:24:24\n Typical kinds of adulterated foods\n 1\n 0\n -1\n 1\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n typical kinds of adulterated foods\n [\"c53c93a1-09d5-48b4-9079-f0111e37c6b5\"]\n 1\n “In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:31:25\n _Jane Doe\n 2017-05-23T13:31:25\n Mass spectrometry is the type of testing used for most types of food\n 1\n 0\n -1\n 2\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n mass spectrometry is the type of testing used for most types of food\n [\"e6b65286-04b5-4c1e-af74-687d0cd825f3\"]\n 1\n “A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:32:15\n _Jane Doe\n 2017-05-23T13:32:15\n Most common detection method by food category\n 1\n 0\n -1\n 3\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n most common detection method by food category\n [\"5d769f10-489a-4887-9fb0-c48fe171055b\"]\n 1\n “Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:39:56\n _Jane Doe\n 2017-05-23T13:39:56\n Four categories used when authenticating meat\n 1\n 0\n -1\n 4\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n four categories used when authenticating meat\n [\"b65417c3-b00a-4191-86a8-8d99d4584d9f\"]\n 1\n “Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).”</p>\n \n \n _Jane Doe\n 2017-05-23T13:41:11\n _Jane Doe\n 2017-05-23T13:41:11\n DNA-based techniques most popular for meat authentication testing\n 1\n 0\n -1\n 5\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n dna-based techniques most popular for meat authentication testing\n [\"cf8966e1-942f-405d-8df0-ad4ce55c1897\"]\n 1\n “The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:42:15\n _Jane Doe\n 2017-05-23T13:42:15\n Meat usually adulterated with pork and testing can be an issue to detect if the meat is minced or processed\n 1\n 0\n -1\n 6\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n meat usually adulterated with pork and testing can be an issue to detect if the meat is minced or pr\n [\"47c42fcc-9316-4057-b2ee-deda28c40029\"]\n 1\n “A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.”</p>\n \n \n _Jane Doe\n 2017-05-23T13:46:16\n _Jane Doe\n 2017-05-23T13:46:16\n How fish and seafood are typically adulterated\n 1\n 0\n -1\n 7\n 1\n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n 0\n how fish and seafood are typically adulterated\n [\"cf0f900f-358d-493d-9c6e-945f9e6f1b82\"]\n 1\n “Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.”</p>\n \n \n _Jane Doe\n 2017-05-24T12:26:50\n _Jane Doe\n 2017-05-24T12:26:50\n Difficulty: not yet enough academic literature since the field of food integrity is still developing\n 1\n 0\n \n 2\n true\n 2\n 2\n\n2]]>\n 2\n 30\n 0\n 1\n 3012ebe2-c183-4d12-9851-5ab7b6d2421c\n 0\n difficulty: not yet enough academic literature since the field of food integrity is still developing\n [\"04bcaed3-68a1-4e41-b7aa-d2b71f662a0e\"]\n 1\n “The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang1033\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...”</p>\n \n \n _Jane Doe\n 2017-05-23T06:51:31\n _Jane Doe\n 2017-05-23T06:51:31\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 0\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"9a3e17a4-26a8-4968-bc43-69dff760b6db\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T06:54:07\n _Jane Doe\n 2017-05-23T06:54:07\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 1\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"902c9e2d-a6a1-461a-8302-0a6f55ac01c2\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:49\n _Jane Doe\n 2017-11-09T11:13:49\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 2\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"e6f6ec26-a3bf-45d7-bc26-9eb10374cbc0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:56\n _Jane Doe\n 2017-11-09T11:13:56\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 3\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"6ec1cd25-88fd-414f-a13f-baa51bb6b6a2\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:14:05\n _Jane Doe\n 2017-11-09T11:14:05\n 0\n 0\n \n 823\n true\n 823\n 823\n\n823]]>\n 823\n 30\n 4\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"e51c887b-254e-459e-b3dd-66b9403ae409\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:07:48\n _Jane Doe\n 2017-05-23T07:07:48\n 0\n 0\n \n 824\n true\n 824\n 824\n\n824]]>\n 824\n 30\n 5\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"6ec86026-8bb5-4430-9257-524891c81d97\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:14:40\n _Jane Doe\n 2017-11-09T11:14:40\n 0\n 0\n \n 824\n true\n 824\n 824\n\n824]]>\n 824\n 30\n 6\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"3d70963d-5e78-4c42-b75e-98955a8032c1\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:14:48\n _Jane Doe\n 2017-11-09T11:14:48\n 0\n 0\n \n 824\n true\n 824\n 824\n\n824]]>\n 824\n 30\n 7\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"4e8990fb-2b37-4b8f-8053-4441113fd9f7\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:11:21\n _Jane Doe\n 2017-05-23T07:11:21\n 0\n 0\n \n 825\n true\n 825\n 825\n\n825]]>\n 825\n 30\n 8\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"b17d227a-5d6d-4946-bdd4-df8fdc8e1e80\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:13\n _Jane Doe\n 2017-11-09T11:15:13\n 0\n 0\n \n 825\n true\n 825\n 825\n\n825]]>\n 825\n 30\n 9\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"e836a05c-5b0e-4c44-9010-e7b6c07adf9c\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:18\n _Jane Doe\n 2017-11-09T11:15:18\n 0\n 0\n \n 825\n true\n 825\n 825\n\n825]]>\n 825\n 30\n 10\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"f2b27600-221f-49fd-9e9e-9abc397834d1\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:19:05\n _Jane Doe\n 2017-05-23T07:19:05\n 0\n 0\n \n 826\n true\n 826\n 826\n\n826]]>\n 826\n 30\n 11\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"d879a1f5-6fec-42e0-85a2-40bc147c12b0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:36\n _Jane Doe\n 2017-11-09T11:15:36\n 0\n 0\n \n 826\n true\n 826\n 826\n\n826]]>\n 826\n 30\n 12\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"27619d70-5d06-4014-af20-20be6670feaf\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:25:12\n _Jane Doe\n 2017-05-23T07:25:12\n 0\n 0\n \n 829\n true\n 829\n 829\n\n829]]>\n 829\n 30\n 13\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"200c35b7-1b10-492d-b171-fbabba5e7885\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:15:57\n _Jane Doe\n 2017-11-09T11:15:57\n 0\n 0\n \n 829\n true\n 829\n 829\n\n829]]>\n 829\n 30\n 14\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"d0b8f6be-e223-48e5-8c79-8eb44d67616c\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:30:19\n _Jane Doe\n 2017-05-23T07:30:19\n 0\n 0\n \n 830\n true\n 830\n 830\n\n830]]>\n 830\n 30\n 15\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"0d0609fe-0e80-4e96-8983-e8fc74bb8e99\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:30:26\n _Jane Doe\n 2017-05-23T07:30:26\n 0\n 0\n \n 830\n true\n 830\n 830\n\n830]]>\n 830\n 30\n 16\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"582d3a38-a296-47b5-8a92-6f3be692d787\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:16:11\n _Jane Doe\n 2017-11-09T11:16:11\n 0\n 0\n \n 830\n true\n 830\n 830\n\n830]]>\n 830\n 30\n 17\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"132fbe78-044d-44d1-ac8d-42c84b77b9de\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:35:25\n _Jane Doe\n 2017-05-23T07:35:25\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 18\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"2c5edbf5-4c3b-4b11-acb0-aaf22a987d73\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:35:52\n _Jane Doe\n 2017-05-23T07:35:52\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 19\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"f07a7a4e-d09d-4fee-80e6-6ab5018f1e3e\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:36:15\n _Jane Doe\n 2017-05-23T07:36:15\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 20\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"357157b5-f382-43fa-b8e5-141e9cb9e7b8\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:19\n _Jane Doe\n 2017-11-09T11:13:19\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 21\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"29f8f96b-7ca4-48ec-9df4-bd872e2235b0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:13:34\n _Jane Doe\n 2017-11-09T11:13:34\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 22\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"494a0e50-b408-4e6a-8b45-404d84412a57\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:17:04\n _Jane Doe\n 2017-11-09T11:17:04\n 0\n 0\n \n 833\n true\n 833\n 833\n\n833]]>\n 833\n 30\n 23\n 5\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n _\n [\"461d13e8-c315-439f-a4a7-09a0e0492f22\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T06:55:26\n _Jane Doe\n 2017-05-23T06:55:26\n Terminological difficulties - contamination vs. adulteration\n 1\n 0\n \n Other\n Omit\n R823\n R823\n\nR823]]>\n 2147483647\n 100\n 24\n 2\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n terminological difficulties - contamination vs. adulteration\n [\"cee55399-c332-44c0-b511-7eb738168acf\"]\n 1\n Sometimes in U.S. literature \"contamination\" = unintentional, while \"adulteration\" = intentional\n 0\n {\\rtf1\\ansi \n\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto \n\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Sometimes in U.S. literature \"contamination\" = unintentional, while \"adulteration\" = intentional}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Sometimes in U.S. literature &quot;contamination&quot; = unintentional, while &quot;adulteration&quot; = intentional</p>\n \n \n _Jane Doe\n 2017-05-23T06:58:59\n _Jane Doe\n 2017-05-23T06:58:59\n Concept of food safety is changing\n 1\n 0\n \n Other\n Omit\n R823\n R823\n\nR823]]>\n 2147483647\n 100\n 25\n 3\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n concept of food safety is changing\n [\"f7d2094c-d5b2-4889-b24d-66998c90bbdf\"]\n 1\n Unintentional and intentional contamination used to be considered together, now they are often looked at separately.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0 \n\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Unintentional and intentional contamination used to be considered together, now they are often looked at separately.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Unintentional and intentional contamination used to be considered together, now they are often looked at separately.</p>\n \n \n _Jane Doe\n 2017-05-23T06:59:55\n _Jane Doe\n 2017-05-23T06:59:55\n High demand and low supply can create the conditions for food fraud\n 1\n 0\n \n Other\n Omit\n R823\n R823\n\nR823]]>\n 2147483647\n 100\n 26\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n high demand and low supply can create the conditions for food fraud\n [\"48c0f246-4561-47fd-a928-3236c20e6ac0\"]\n 1\n “The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.”</p>\n \n \n _Jane Doe\n 2017-05-23T07:03:33\n _Jennifer Schultz\n 2020-01-10T08:16:29\n Definition of food crime (Manning & Soon)\n 1\n 0\n \n Other\n Omit\n R824\n R824\n\nR824]]>\n 2147483647\n 100\n 27\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n definition of food crime (manning & soon)\n [\"8ff83742-4311-46ac-801a-5a76f57c493c\"]\n 1\n “...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang8192\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 ...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.”</p>\n \n \n _Jane Doe\n 2017-05-23T07:04:21\n _Jane Doe\n 2017-05-23T07:04:21\n Example of food crime through intentional neglect\n 1\n 0\n \n Other\n Omit\n R824\n R824\n\nR824]]>\n 2147483647\n 100\n 28\n 4\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n example of food crime through intentional neglect\n [\"d13876cc-e992-43cc-8e87-24fc604ecc0b\"]\n 1\n See PDF\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman \n;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 See PDF}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>See PDF</p>\n \n \n _Jane Doe\n 2017-05-23T07:09:54\n _Jane Doe\n 2017-05-23T07:09:54\n Definition of food defense (Manning & Soon)\n 1\n 0\n \n Other\n Omit\n R824\n R824\n\nR824]]>\n 2147483647\n 100\n 29\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n definition of food defense (manning & soon)\n [\"1208da8f-0b6a-4243-b51c-b6bf3a1a4a8d\"]\n 1\n “Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:19:29\n _Jane Doe\n 2017-11-09T10:19:29\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Types of food crime\n 1\n 1\n \n Other\n Omit\n R825\n R825\n\nR825]]>\n 2147483647\n 100\n 30\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n types of food crime\n [\"4c289bfd-d38d-46ed-9093-2bbace8fd212\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T07:15:12\n _Jane Doe\n 2017-05-23T07:15:12\n Definition of crime vulnerability\n 1\n 0\n \n Other\n Omit\n R825\n R825\n\nR825]]>\n 2147483647\n 100\n 31\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n definition of crime vulnerability\n [\"ddae3e2f-79d0-4b69-8b22-6291258c0f42\"]\n 1\n “Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:20:06\n _Jane Doe\n 2017-11-09T10:20:06\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food (3).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Drivers behind food crime and food defense\n 1\n 1\n \n Other\n Omit\n R826\n R826\n\nR826]]>\n 2147483647\n 100\n 32\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n drivers behind food crime and food defense\n [\"7d384726-bdd1-4000-84d9-ca5e09e381eb\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T07:24:14\n _Jane Doe\n 2017-05-23T07:24:14\n There needs to be a better understanding of what motivates food criminals\n 1\n 0\n \n Other\n Omit\n R827–R828\n R827–R828\n\nR827–R828]]>\n 2147483647\n 100\n 33\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n there needs to be a better understanding of what motivates food criminals\n [\"77698f1c-1bc4-4517-9440-ca6fcc0fd650\"]\n 1\n “Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:20:39\n _Jane Doe\n 2017-11-09T10:20:39\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Manning, Soon 2016 - Food (4).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Intentional and unintentional adulteration\n 1\n 1\n \n Other\n Omit\n R828\n R828\n\nR828]]>\n 2147483647\n 100\n 34\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n intentional and unintentional adulteration\n [\"abd167e6-169f-4da5-b89c-14ba7330f00f\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T07:29:40\n _Jane Doe\n 2017-05-23T07:29:40\n Differences between GFSI (2014) and FSIS (2014) and FAO (2003)\n 1\n 0\n \n Other\n Omit\n R829\n R829\n\nR829]]>\n 2147483647\n 100\n 35\n 3\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n differences between gfsi (2014) and fsis (2014) and fao (2003)\n [\"f387329c-2154-48b6-b54c-45d799274dda\"]\n 1\n See PDF\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman \n;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 See PDF}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>See PDF</p>\n \n \n _Jane Doe\n 2017-05-23T07:31:23\n _Jane Doe\n 2017-05-23T07:31:23\n Both scientific and social scientific criteria needed for risk assessment\n 1\n 0\n \n Other\n Omit\n R830\n R830\n\nR830]]>\n 2147483647\n 100\n 36\n 6\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n both scientific and social scientific criteria needed for risk assessment\n [\"179bc094-578b-4ad6-965c-a571dc5ce4e7\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T07:37:28\n _Jennifer Schultz\n 2020-01-10T08:16:06\n Plurality of food crime makes it difficult to define which in turn makes it difficult to create policies to fight it\n 1\n 0\n \n Other\n Omit\n R833\n R833\n\nR833]]>\n 2147483647\n 100\n 37\n 1\n 27384b10-b549-45fc-80c7-94688793e9fc\n 0\n plurality of food crime makes it difficult to define which in turn makes it difficult to create poli\n [\"401e36ec-dc1e-461f-b23d-3e2f69ff6ca0\"]\n 1\n “Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang8192\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:21:16\n _Jane Doe\n 2017-11-09T10:21:16\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Alibaba to use blockchain.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Fake egg found on sale in China in 2012\n 1\n Original photo source: China Daily\n 1\n -1\n 0\n 0\n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n 0\n fake egg found on sale in china in 2012\n [\"16df04bd-2d53-4db7-b239-96b11888a736\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T11:19:01\n _Jane Doe\n 2017-05-23T11:19:01\n 0\n 0\n -1\n 0\n 5\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n _\n [\"bbdbc5cb-8820-4885-a040-00fb9771b379\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T11:19:16\n _Jane Doe\n 2017-05-23T11:19:16\n 0\n 0\n -1\n 1\n 5\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n _\n [\"7f88c6a8-50e7-4bec-93b3-a09b732a283a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T11:19:29\n _Jane Doe\n 2017-05-23T11:19:29\n 0\n 0\n -1\n 2\n 5\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n _\n [\"9ceec2ea-2850-4c77-b8f3-dd5b42f0536f\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T11:20:45\n _Jane Doe\n 2017-05-23T11:20:45\n Most often food fraud is not likely to cause health problems, but it does lead to lower quality food\n 1\n 0\n \n 4\n true\n 4\n 4\n\n4]]>\n 4\n 30\n 3\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n most often food fraud is not likely to cause health problems, but it does lead to lower quality food\n [\"1d77854e-8ffc-4b4d-a3c4-6602287da082\"]\n 1\n “The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:21:56\n _Jane Doe\n 2017-05-23T11:21:56\n Steps for prevention\n 1\n 0\n \n 6\n true\n 6\n 6\n\n6]]>\n 6\n 30\n 4\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n steps for prevention\n [\"88712cb7-bf94-4953-a038-7e5e8bf3a37c\"]\n 1\n “A general approach to prevent food fraud can be summarised as follows: \n• Conduct vulnerability assessment, including: \n– Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); \n– Know your suppliers (manufacturer, broker, history); \n – Know your supply chain (length, complexity, supply & demand arrangements, ease of access); \n – Know your existing control measures. \n• Design mitigation strategy and implement mitigation measures. \n• Validate and verify mitigation measures, continually review food fraud management system.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 A general approach to prevent food fraud can be summarised as follows: }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Conduct vulnerability assessment, including: } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your suppliers (manufacturer, broker, history);}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your supply chain (length, complexity, supply & demand arrangements, ease of access);} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8211 Know your existing control measures. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20 \n\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Design mitigation strategy and implement mitigation measures. }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Validate and verify mitigation measures, continually review food fraud management system.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“A general approach to prevent food fraud can be summarised as follows: </p><p>• Conduct vulnerability assessment, including: </p><p>– Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); </p><p>– Know your suppliers (manufacturer, broker, history);</p><p> – Know your supply chain (length, complexity, supply &amp; demand arrangements, ease of access);</p><p> – Know your existing control measures. </p><p>• Design mitigation strategy and implement mitigation measures. </p><p>• Validate and verify mitigation measures, continually review food fraud management system.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:22:32\n _Jane Doe\n 2017-05-23T11:22:32\n Factors that can contribute to fraud\n 1\n 0\n \n 6\n true\n 6\n 6\n\n6]]>\n 6\n 30\n 5\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n factors that can contribute to fraud\n [\"2b813a6c-9cdd-4749-afa1-73a2ffe7aa2f\"]\n 1\n “Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:23:03\n _Jane Doe\n 2017-05-23T11:23:03\n Increases in prices for an ingredient and rarity are good conditions for fraud\n 1\n 0\n \n 8\n true\n 8\n 8\n\n8]]>\n 8\n 30\n 6\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n increases in prices for an ingredient and rarity are good conditions for fraud\n [\"d37b518d-3d2a-44fe-9f35-3464ca8067ff\"]\n 1\n “Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:23:13\n _Jane Doe\n 2017-05-23T11:23:13\n Geopolitical considerations\n 1\n 0\n \n 8\n true\n 8\n 8\n\n8]]>\n 8\n 30\n 7\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n geopolitical considerations\n [\"69816a84-eab2-4db9-ab37-21ff0f9875c1\"]\n 1\n “Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).”</p>\n \n \n _Jane Doe\n 2017-11-09T10:22:01\n _Jane Doe\n 2017-11-09T10:22:01\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"jpg.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Vulnerability factors vs. control measures\n 1\n 1\n \n 8\n true\n 8\n 8\n\n8]]>\n 8\n 30\n 8\n 0\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n vulnerability factors vs. control measures\n [\"104e414d-6d21-4cc5-93c9-2203486944db\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T11:23:27\n _Jane Doe\n 2017-05-23T11:23:27\n What's needed to judge food fraud risk\n 1\n 0\n \n 9\n true\n 9\n 9\n\n9]]>\n 9\n 30\n 9\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n what's needed to judge food fraud risk\n [\"ecfc28ae-4044-4dfd-9084-83b7151b92ac\"]\n 1\n “In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:26:56\n _Jane Doe\n 2017-05-23T11:26:56\n Two types of raw material monitoring\n 1\n 0\n \n 10\n true\n 10\n 10\n\n10]]>\n 10\n 30\n 10\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n two types of raw material monitoring\n [\"15e98949-c2c5-4a59-bb64-1eb9d2f2c566\"]\n 1\n “Raw material monitoring should be performed using appropriate analytical methods for the verification of authenticity. The methods must be selective, specific, and of appropriate sensitivity to verify that the food authenticity process is efficient. There are 2 approaches: \n • Targeted analyses (linked to parameters specified in raw material specifications); \n • Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Raw material monitoring should}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 be performed using appropriate}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 analytical methods for the verification} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 of authenticity. The methods must be}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1 \n\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 selective, specific, and of appropriate}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1 \n\\dbch\\af1\\hich\\f1 sensitivity to verify that the food}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 authenticity process is efficient. There}{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 are 2 approaches:}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120 \n\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Targeted analyses (linked to parameters specified in raw material specifications);} \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8226 Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Raw material monitoring should be performed using appropriate analytical methods for the verification of authenticity. The methods must be selective, specific, and of appropriate sensitivity to verify that the food authenticity process is efficient. There are 2 approaches:</p><p> • Targeted analyses (linked to parameters specified in raw material specifications);</p><p> • Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:27:48\n _Jane Doe\n 2017-05-23T11:27:48\n Businesses should use suppliers they can trust and who will share processes with them\n 1\n 0\n \n 11\n true\n 11\n 11\n\n11]]>\n 11\n 30\n 11\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n businesses should use suppliers they can trust and who will share processes with them\n [\"887b8976-32dd-4d0d-9cc8-cf6900e8f2c9\"]\n 1\n “Confidence is increased with a supplier’s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Confidence is increased with a supplier\\u8217 s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Confidence is increased with a supplier’s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:29:03\n _Jane Doe\n 2017-05-23T11:29:03\n Auditing examples\n 1\n 0\n \n 14\n true\n 14\n 14\n\n14]]>\n 14\n 30\n 12\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n auditing examples\n [\"7fa97a46-02c3-47af-834e-2e0b44ce28e9\"]\n 1\n “More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site – auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site – auditors may look for the presence of equipment used to inject brine.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site \\u8211 auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site \\u8211 auditors may look for the presence of equipment used to inject brine.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site – auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site – auditors may look for the presence of equipment used to inject brine.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:30:09\n _Jane Doe\n 2017-05-23T11:30:09\n Definition of EMA (economically-motivated adulteration)\n 1\n 0\n \n 16\n true\n 16\n 16\n\n16]]>\n 16\n 30\n 13\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n definition of ema (economically-motivated adulteration)\n [\"950f7112-c76c-49b2-86a3-1d110a70450a\"]\n 1\n “EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).”</p>\n \n \n _Jane Doe\n 2017-05-23T11:32:06\n _Jane Doe\n 2017-05-23T11:32:06\n Recommendations for consumers for avoiding food fraud\n 1\n 0\n \n 18\n true\n 18\n 18\n\n18]]>\n 18\n 30\n 14\n 1\n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n 0\n recommendations for consumers for avoiding food fraud\n [\"d0bbd7f9-b7da-47b6-a9e8-891375dcb566\"]\n 1\n “Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:57:59\n _Jane Doe\n 2017-05-23T09:57:59\n 0\n 0\n -1\n 0\n 5\n 89c1b839-ce76-43f4-be84-84d394af9179\n 0\n _\n [\"d0ca8bfe-538f-4434-90f1-790d137e5c3a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:23:12\n _Jane Doe\n 2017-11-09T11:23:12\n 0\n 0\n -1\n 1\n 5\n 89c1b839-ce76-43f4-be84-84d394af9179\n 0\n _\n [\"80f331b9-7f22-4123-afb3-f2230ed49982\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:57:38\n _Jane Doe\n 2017-05-23T09:57:38\n How blockchain works when applied to the food supply chain\n 1\n 0\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 2\n 1\n 89c1b839-ce76-43f4-be84-84d394af9179\n 0\n how blockchain works when applied to the food supply chain\n [\"3f81552b-1c60-4551-ba85-5ea03651cf23\"]\n 1\n “When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.”</p>\n \n \n _Jane Doe\n 2017-05-23T11:09:20\n _Jane Doe\n 2017-05-23T11:09:20\n Adulteration usually not complete subsitution but attempt to cover up something in the food\n 1\n 0\n \n Other\n]]>\n 2147483647\n 30\n 0\n 2\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n 0\n adulteration usually not complete subsitution but attempt to cover up something in the food\n [\"b08f5281-59ae-4579-83f8-87e17055a1b6\"]\n 1\n Usually it's an attempt to mask something in the food and is not an outright 100% substitution.\n 0\n {\\rtf1\\ansi \n\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto \n\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Usually it's an attempt to mask something in the food and is not an outright 100% substitution.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>Usually it&#39;s an attempt to mask something in the food and is not an outright 100% substitution.</p>\n \n \n _Jane Doe\n 2017-05-23T11:13:34\n _Jane Doe\n 2017-05-23T11:13:34\n Adulteration can occur with almost all types of food\n 1\n 0\n \n 0\n Other\n Omit\n 0:25\n 0:25\n\n0:25]]>\n 0\n 100\n 1\n 1\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n 0\n adulteration can occur with almost all types of food\n [\"33438200-3449-4979-a4a2-94d78443f721\"]\n 1\n “Pretty much every food is vulnerable. ”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Pretty much every food is vulnerable. \\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Pretty much every food is vulnerable. ”</p>\n \n \n _Jane Doe\n 2017-05-23T11:06:39\n _Jane Doe\n 2017-05-23T11:06:39\n Testing in UK has revealed widespread adulteration or misrepresentation of ingredients\n 1\n 0\n \n 1\n Other\n Omit\n 1:25\n 1:25\n\n1:25]]>\n 1\n 100\n 2\n 1\n 61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4\n 0\n testing in uk has revealed widespread adulteration or misrepresentation of ingredients\n [\"91029301-0fb8-400f-8904-5a0b7479e03d\"]\n 1\n “Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;\\red0\\green0\\blue0;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f0 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f0 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0 \n;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa0\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f0{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cf1 Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af0\\dbch\\af0\\hich\\f0\\cs10\\cf1\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:22:43\n _Jane Doe\n 2017-11-09T10:22:43\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"GFSI Direction on Food Fr (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n GFSI Approach to Food Fraud Prevention\n 1\n 1\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 0\n 0\n 0d576b32-d148-4660-9d3c-05e19c6b7691\n 0\n gfsi approach to food fraud prevention\n [\"6b9f3fb9-2757-4b76-a91b-54cf4adbf2d6\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-11-09T10:23:28\n _Jane Doe\n 2017-11-09T10:23:28\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"GFSI Direction on Food Fr.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n GFSI Terminology Comparison\n 1\n 1\n \n Omit\n n.p.\n n.p.\n\nn.p.]]>\n 2147483647\n 100\n 1\n 0\n 0d576b32-d148-4660-9d3c-05e19c6b7691\n 0\n gfsi terminology comparison\n [\"ff577b32-02d1-403c-aad5-169a570efc4c\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T08:13:39\n _Jane Doe\n 2017-05-23T08:13:39\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 0\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"75759000-02d3-4229-955d-3fa103ef77d9\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:16:01\n _Jane Doe\n 2017-05-23T08:16:01\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 1\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"833f82a9-7682-4070-a24c-67cc0c60a877\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:17:34\n _Jane Doe\n 2017-05-23T08:17:34\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 2\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"2901446f-4cd7-4524-982d-0e9ebaecd200\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:17:46\n _Jane Doe\n 2017-05-23T08:17:46\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 3\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"838bc2f9-b197-40c4-b442-9e0546cbedf0\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-29T14:15:17\n _Jane Doe\n 2017-05-29T14:15:17\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 4\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"aa5972e5-c352-4caa-8064-19f7060d71fa\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:42\n _Jane Doe\n 2017-11-09T11:27:42\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 5\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"4d738d10-e999-4a07-9ca2-97fbff09a1da\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:47\n _Jane Doe\n 2017-11-09T11:27:47\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 6\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"d9295af9-fc58-4131-b4d6-f9067464ccf4\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:48\n _Jane Doe\n 2017-11-09T11:27:48\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 7\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"d7e9694b-4087-4aef-8de9-e357f81fd32d\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:10\n _Jane Doe\n 2017-11-09T11:28:10\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 8\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"534c0a89-52c8-4b41-9e3a-00f197734cc3\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:18\n _Jane Doe\n 2017-11-09T11:28:18\n 0\n 0\n \n 157\n true\n 157\n 157\n\n157]]>\n 157\n 30\n 9\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"714b6601-4fc6-47e4-b28d-1c9968cac18a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:23:38\n _Jane Doe\n 2017-05-23T08:23:38\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 10\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"d247950e-4fd2-47fd-a55e-155c395a7df4\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:23:54\n _Jane Doe\n 2017-05-23T08:23:54\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 11\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"2b94ecf8-4d24-41ef-a5e5-b3eaa002a207\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:39\n _Jane Doe\n 2017-11-09T11:28:39\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 12\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"29779eaa-3bf1-4661-9e40-6feffe0ecdbc\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:28:48\n _Jane Doe\n 2017-11-09T11:28:48\n 0\n 0\n \n 158\n true\n 158\n 158\n\n158]]>\n 158\n 30\n 13\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"88cf00f5-d509-4b86-9966-a22bbff4e2a9\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:51:04\n _Jane Doe\n 2017-05-23T08:51:04\n 0\n 0\n \n 160\n true\n 160\n 160\n\n160]]>\n 160\n 30\n 14\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"597078db-2267-43b1-a870-a3ff4a9aac7f\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:58:40\n _Jane Doe\n 2017-05-23T08:58:40\n 0\n 0\n \n 161\n true\n 161\n 161\n\n161]]>\n 161\n 30\n 15\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"00ad08db-228d-4b0c-8b28-5cc0103eeb58\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:29:14\n _Jane Doe\n 2017-11-09T11:29:14\n 0\n 0\n \n 161\n true\n 161\n 161\n\n161]]>\n 161\n 30\n 16\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"ae95820b-c373-4967-86e5-7ee906623819\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:06:47\n _Jane Doe\n 2017-05-23T09:06:47\n 0\n 0\n \n 162\n true\n 162\n 162\n\n162]]>\n 162\n 30\n 17\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"649227b5-bbd8-4d3d-ba0c-5d6050a7322a\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-11-09T11:27:23\n _Jane Doe\n 2017-11-09T11:27:23\n 0\n 0\n \n 162\n true\n 162\n 162\n\n162]]>\n 162\n 30\n 18\n 5\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n _\n [\"f1789cf9-f873-49c7-b5b4-0e683419b4d6\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T08:15:48\n _Jane Doe\n 2017-05-23T08:15:48\n Definitions of food fraud, food safety incidents, and food defense incidents\n 1\n 0\n \n Other\n Omit\n R157\n R157\n\nR157]]>\n 2147483647\n 100\n 19\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n definitions of food fraud, food safety incidents, and food defense incidents\n [\"7e636a94-6870-4475-b3cc-f85fd4f32ed5\"]\n 1\n “Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:16:50\n _Jane Doe\n 2017-05-23T08:16:50\n Where food fraud fits as a term\n 1\n 0\n \n Other\n Omit\n R157\n R157\n\nR157]]>\n 2147483647\n 100\n 20\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n where food fraud fits as a term\n [\"c83ae611-504e-4bd3-98a6-b46508938b1a\"]\n 1\n “Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:20:56\n _Jane Doe\n 2017-05-23T08:20:56\n Difference between fraud in ancient and contemporary times\n 1\n 0\n \n Other\n Omit\n R158\n R158\n\nR158]]>\n 2147483647\n 100\n 21\n 2\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n difference between fraud in ancient and contemporary times\n [\"ea6d5b15-c147-4abd-8b0f-59622cc8dbf2\"]\n 1\n Although fraud existed, it was geographically limited. Today the scale can be vast.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0 \n\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Although fraud existed, it was geographically limited. Today the scale can be vast.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Although fraud existed, it was geographically limited. Today the scale can be vast.</p>\n \n \n _Jane Doe\n 2017-05-23T08:23:14\n _Jane Doe\n 2017-05-23T08:23:14\n Definition of food fraud (Spink & Moyer)\n 1\n 0\n \n Other\n Omit\n R158\n R158\n\nR158]]>\n 2147483647\n 100\n 22\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n definition of food fraud (spink & moyer)\n [\"b6f46a8f-a710-4874-8691-06d114a1ea57\"]\n 1\n “Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.”</p>\n \n \n _Jane Doe\n 2017-11-09T10:24:01\n _Jane Doe\n 2017-11-09T10:24:01\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defin.jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Components of a food protection plan\n 1\n 1\n \n Other\n Omit\n R158\n R158\n\nR158]]>\n 2147483647\n 100\n 23\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n components of a food protection plan\n [\"106e81a9-5250-4629-98e5-0755cdcb9614\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T08:48:43\n _Jane Doe\n 2017-05-23T08:48:43\n Direct food fraud risk definition\n 1\n 0\n \n Other\n Omit\n R159\n R159\n\nR159]]>\n 2147483647\n 100\n 24\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n direct food fraud risk definition\n [\"275dc314-72e9-4954-ab97-0317ae045d6e\"]\n 1\n “Direct food fraud risk occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Direct food fraud risk }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“<em>Direct food fraud risk </em>occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:48:59\n _Jennifer Schultz\n 2020-01-10T08:17:21\n Indirect food fraud risk - definition\n 1\n 0\n \n Other\n Omit\n R159\n R159\n\nR159]]>\n 2147483647\n 100\n 25\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n indirect food fraud risk - definition\n [\"9134e593-8630-4080-a438-1816ad0e4af5\"]\n 1\n “Indirect food fraud risk occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang8192\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Indirect food fraud risk }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“<em>Indirect food fraud risk </em>occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:49:11\n _Jane Doe\n 2017-05-23T08:49:11\n Technical food fraud risk - definition\n 1\n 0\n \n Other\n Omit\n R159\n R159\n\nR159]]>\n 2147483647\n 100\n 26\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n technical food fraud risk - definition\n [\"99a3e2b3-dff3-474b-9283-a90e0f15436b\"]\n 1\n “Technical food fraud risk is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Technical food fraud risk }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“<em>Technical food fraud risk </em>is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.”</p>\n \n \n _Jane Doe\n 2017-05-23T08:52:55\n _Jane Doe\n 2017-05-23T08:52:55\n Differences between food fraud and food defense\n 1\n 0\n \n Other\n Omit\n R160\n R160\n\nR160]]>\n 2147483647\n 100\n 27\n 2\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n differences between food fraud and food defense\n [\"8c6a1fb5-75dd-4200-ae3d-2b502d797f18\"]\n 1\n Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\s1\\snext0\\keepn\\fi0\\sb240\\sa480\\outlinelevel0 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\b\\fs28\\f1 heading 1;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{ \n\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055 \n\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin \n\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1800\\margrsxn1800\\margtsxn1440\\margbsxn1440\\headery708\\footery708\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.</p>\n \n \n _Jane Doe\n 2017-11-09T10:24:39\n _Jane Doe\n 2017-11-09T10:24:39\n
{\"$type\":\"SwissAcademic.Citavi.LinkedResource, SwissAcademic.Citavi\",\"LinkedResourceType\":1,\"UriString\":\"Spink, Moyer 2011 - Defin (2).jpg\",\"LinkedResourceStatus\":8,\"Properties\":{\"$type\":\"SwissAcademic.Citavi.LinkedResourceProperties, SwissAcademic.Citavi\"},\"SyncFolderType\":0,\"IsLocalCloudProjectFileLink\":false,\"IsCloudRestore\":false,\"IsCloudCopy\":false,\"AttachmentFolderWasInFallbackMode\":false}
\n Food protection risk matrix\n 1\n 1\n \n Other\n Omit\n R160\n R160\n\nR160]]>\n 2147483647\n 100\n 28\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n food protection risk matrix\n [\"14479497-bccb-40f9-b62f-90f3dd02f52b\"]\n 0\n 0\n
\n \n _Jane Doe\n 2017-05-23T08:56:25\n _Jane Doe\n 2017-05-23T08:56:25\n How to reduce likelihood of food fraud\n 1\n 0\n \n Other\n Omit\n R161\n R161\n\nR161]]>\n 2147483647\n 100\n 29\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n how to reduce likelihood of food fraud\n [\"909a5b8d-1d99-482f-9ff9-b8d6daee7b99\"]\n 1\n “Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:05:11\n _Jane Doe\n 2017-05-23T09:05:11\n Reasons enforcing food fraud laws is difficult\n 1\n 0\n \n Other\n Omit\n R162\n R162\n\nR162]]>\n 2147483647\n 100\n 30\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n reasons enforcing food fraud laws is difficult\n [\"d4430d73-5837-4de9-9a44-a0af91d9db9f\"]\n 1\n “Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{ \n\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.\\u8221 }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:06:18\n _Jane Doe\n 2017-05-23T09:06:18\n What is needed to prevent food fraud\n 1\n 0\n \n Other\n Omit\n R162\n R162\n\nR162]]>\n 2147483647\n 100\n 31\n 1\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n 0\n what is needed to prevent food fraud\n [\"26060f67-337d-4748-aad1-b5af19998a0f\"]\n 1\n “Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe crime triangle provides insights to the motivations for seeking food fraud opportunities.”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{ \n\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe } \n{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 crime triangle }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 provides insights to the motivations for seeking food fraud opportunities.\\u8221 }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe <em>crime triangle </em>provides insights to the motivations for seeking food fraud opportunities.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:12:50\n _Jane Doe\n 2017-05-23T09:12:50\n 0\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 0\n 5\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n _\n [\"c8488669-d188-4e65-a387-620f08957e7f\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:13:28\n _Jane Doe\n 2017-05-23T09:13:28\n Why identifying species in certain food products is difficult\n 1\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 1\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n why identifying species in certain food products is difficult\n [\"bc4dc18d-e654-4b70-a596-5bab3e9e8778\"]\n 1\n “Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20 \n\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.\\u8221 } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.”</p>\n \n \n _Jane Doe\n 2017-05-23T09:15:31\n _Jane Doe\n 2017-05-23T09:15:31\n DNA barcoding use\n 1\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 2\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n dna barcoding use\n [\"20cafe17-26a7-4691-a126-2ffd07e33dfe\"]\n 1\n “DNA barcoding uses a short, standardized region to distinguish different taxa at the species level.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal \n;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{ \n\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn11906\\pghsxn16838\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 DNA barcoding}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1 \n\\hich\\f1 uses a short,}{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 standardized region to distinguish different taxa at the species level.\\u8221 }{ \n\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“DNA barcoding uses a short, standardized region to distinguish different taxa at the species level.”</p>\n \n \n _Jane Doe\n 2017-11-09T11:33:02\n _Jane Doe\n 2017-11-09T11:33:02\n 0\n 0\n \n 106\n true\n 106\n 106\n\n106]]>\n 106\n 30\n 3\n 5\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n _\n [\"af9e36cb-b013-4359-b579-c3dc4fb82606\"]\n 0\n 0\n \n \n _Jane Doe\n 2017-05-23T09:16:54\n _Jane Doe\n 2017-05-23T09:16:54\n Example of food adulteration in a test of yak meat jerky\n 1\n 0\n \n 107\n true\n 107\n 107\n\n\n 108\n true\n 108\n 108\n\n107-108]]>\n 107\n 30\n 4\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n example of food adulteration in a test of yak meat jerky\n [\"f8279d06-8a98-478f-b60f-06303b3dab54\"]\n 1\n “Only nine yak jerky samples were identified as yak (Bos grunniens) samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat (Bos taurus), buffalo beef (Bubalus bubalis), or pig meat (Sus scrofa). The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew (Sorex bedfordiae) and the Chinese mole shrew (Anourosorex squamipes).”\n 1\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120 \n\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0} \n{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0}\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0 \n\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 Only nine yak jerky samples were identified as yak }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1 \n\\hich\\f1 (Bos grunniens) }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat }{\\rtlch\\af0\\afs24 \n\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Bos taurus), }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 buffalo beef }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Bubalus bubalis), } \n{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 or pig meat }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Sus scrofa). }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew } \n{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 (Sorex bedfordiae) }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 and the Chinese mole shrew }{\\rtlch\\af0\\afs24\\ltrch\\i\\fs18\\lang1033\\langnp1033 \n\\loch\\af1\\dbch\\af1\\hich\\f1 (Anourosorex squamipes).\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99 \n{\\lsdlockedexcept}}}\n <p>“Only nine yak jerky samples were identified as yak <em>(Bos grunniens) </em>samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat <em>(Bos taurus), </em>buffalo beef <em>(Bubalus bubalis), </em>or pig meat <em>(Sus scrofa). </em>The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew <em>(Sorex bedfordiae) </em>and the Chinese mole shrew <em>(Anourosorex squamipes).”</em></p>\n \n \n _Jane Doe\n 2017-05-23T09:17:22\n _Jane Doe\n 2017-05-23T09:17:22\n Percentage of yak jerky products that were adulterated\n 1\n 0\n \n 108\n true\n 108\n 108\n\n108]]>\n 108\n 30\n 5\n 1\n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n 0\n percentage of yak jerky products that were adulterated\n [\"18c45abf-7455-4147-9b01-797b11030640\"]\n 1\n “...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.”\n 0\n {\\rtf1\\ansi\\ansicpg1252\\uc0\\stshfdbch0\\stshfloch0\\stshfhich0\\stshfbi0\\deff0\\adeff0{\\fonttbl{\\f0\\froman\\fcharset0 Times New Roman;}{\\f1\\fnil\\fcharset0 Segoe UI;}}{\\colortbl;}{\\stylesheet{\\s0\\snext0\\fi0\\sb0\\sa120\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\rtlch\\afs20\\ltrch\\fs18\\f1 Normal;}{\\*\\cs10\\additive Default Paragraph Font \n;}}{\\*\\generator Aspose.Words for .NET 11.11.0.0;}{\\info\\version0\\edmins0\\nofpages0\\nofwords0\\nofchars0\\nofcharsws0}{\\mmathPr\\mbrkBin0\\mbrkBinSub0\\mdefJc1\\mdispDef1\\minterSp0\\mintLim0\\mintraSp0\\mlMargin0\\mmathFont0\\mnaryLim1\\mpostSp0\\mpreSp0\\mrMargin0\\msmallFrac0\\mwrapIndent1440\\mwrapRight0} \n\\deflang2055\\deflangfe2052\\adeflang1025\\jexpand\\showxmlerrors1\\validatexml1\\viewscale100\\fet0\\ftnbj\\aenddoc\\aftnnrlc\\nogrowautofit\\htmautsp\\noultrlspc\\nouicompat\\nofeaturethrottle1\\formshade\\dghspace180\\dgvspace180\\dghorigin1800\\dgvorigin1440\\dghshow1\\dgvshow1 \n\\dgmargin\\pgbrdrhead\\pgbrdrfoot\\sectd\\pgndec\\sbkpage\\pgwsxn12240\\pghsxn15840\\marglsxn1134\\margrsxn567\\margtsxn567\\margbsxn567\\headery850\\footery850\\ltrsect\\pard\\plain\\itap0\\s0\\fi0\\sb0\\sa120\\widctlpar\\ltrpar\\li0\\lin0\\ri0\\rin0\\ql\\faauto\\sl240\\slmult1\\rtlch\\afs20\\ltrch\\fs18\\f1{\\rtlch\\af0\\afs24 \n\\ltrch\\fs18\\f1 \\u8220 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang1033\\langnp1033\\loch\\af1\\dbch\\af1\\hich\\f1 ...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.\\u8221 }{\\rtlch\\af0\\afs24\\ltrch\\fs18\\lang2055\\langnp2055 \n\\loch\\af1\\dbch\\af1\\hich\\f1\\cs10\\par}{\\*\\latentstyles\\lsdstimax267\\lsdlockeddef0\\lsdsemihiddendef1\\lsdunhideuseddef1\\lsdqformatdef0\\lsdprioritydef99{\\lsdlockedexcept}}}\n <p>“...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.”</p>\n \n
\n \n fd96e97f-aba7-4f66-bc38-c7df583fffab;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:1\n b8ff3685-382c-4f19-b7e3-18121d8a9200;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:0\n 7271b0f1-1ed2-4533-b0c2-aedebf3e52fc;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:5\n 74427b9f-fbd4-40bd-823d-657670f76c90;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:13\n 6fb75b29-ae6b-4e6f-ba73-37a077fc397c;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906:1\n 749aae33-cbb7-4aac-9092-7b33e9736eec;55496d4d-9f92-44aa-89ce-3b30e5c437d7:0\n f1774289-5526-4343-9b1b-1157c6654acb;7c3bf245-d473-41fa-952c-22ccb3bf3f8e:0\n 3579306e-3aa8-442f-ae86-5692bacb6116;73aa7410-7c17-4acc-83af-249657be15e6:1\n f5429955-7a99-4225-ba19-0344b7e896b7;93fe40ba-b05c-4d30-8855-f546b7388d2a:0\n 55cd0676-3d1d-4f38-b63f-6cbc66e768a1;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:0\n de69f6c2-af03-47f9-aab9-713e08fc183b;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:1\n e1773aeb-d73d-4793-957c-a0ed87c04720;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:2\n ce68b450-438e-4c2c-9a21-9a1671985cb4;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:3\n 36ca71e4-b319-448c-83da-b6fbbc7c8e43;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:4\n 293ec858-03d9-4cbe-9826-8689dcdb9d5a;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:5\n a3c8b5d4-6350-4814-899f-141f4fb089fa;4a05cca9-2d0d-4ea5-8440-5a09c4f40249:0\n d7702e6d-03df-440c-99f4-23e4d5bbc2a7;8b2dd3a7-2643-425a-9009-4e63647ea860:1\n 9308f85e-7559-453b-a155-70db3f5521e2;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:3\n 0c63766b-d983-4645-90fe-948b397adc9a;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:11\n 1e7c3c78-9d0b-469d-863a-15b4b3927022;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:23\n 99c418c4-6caf-420c-95a1-bacd2272b3f9;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:10\n e5b8a39a-7be3-4000-b3e6-523ffde0625a;c8122f49-7dc9-49e0-8919-eefad7f416a9:0\n c127a352-34d7-4706-b563-ef8542f62f38;a5607a6f-cc37-4e62-968b-bb5deada2317:0\n 260fee07-d706-4715-8972-16e260e38b6a;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:0\n 1ba1b273-f3e7-49fc-bbc3-0b016f298e49;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:1\n e17842b4-ccdb-42f8-8da3-ece6d3b5a337;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:2\n c0d8e13e-ca6c-4a82-af14-372cb8929c81;c8122f49-7dc9-49e0-8919-eefad7f416a9:1\n a3f90c51-7ce7-4b6e-a434-a804f3c014e9;c8122f49-7dc9-49e0-8919-eefad7f416a9:2\n a7263495-1753-4d6b-a5bd-035c37cf9eac;8b2dd3a7-2643-425a-9009-4e63647ea860:0\n d6aaba2e-1f43-4318-9964-b6c73e08e3a7;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:4\n 5864463d-f6e2-4c11-9afd-cc501af9cacb;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:15\n 8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:8\n e728e158-8b56-48d0-88ab-da1926c92c69;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:16\n 44c817de-9ee2-45c5-8ea3-3f776b023b48;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:18\n a2c5b4b0-cdff-471f-b8d4-dc499012dc6a;a83e3adf-a16b-4864-82ef-0efc1dbaa236:2\n e1b7152f-30d5-4886-8a4a-4a647c580fb7;73aa7410-7c17-4acc-83af-249657be15e6:0\n df067b95-5685-4a74-88ec-6aac3bf7e58f;ddb219dd-dfc6-4f0b-b61b-cf5c1b179ae5:0\n 89e1a961-14e1-43b1-baa9-84b685ad3244;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:2\n ae0faadc-51ef-4d95-9f4c-5826b39a10df;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:12\n e4ed0f18-4972-43a6-bd1b-ea7e963cd7e6;4bbd6753-30f2-4e3b-9e32-3c65b5037589:0\n 3b1f0ca4-aed9-41ad-a41e-8f84170f11d8;a83e3adf-a16b-4864-82ef-0efc1dbaa236:0\n 4a0f720f-8088-4031-b20d-cee01582c736;a83e3adf-a16b-4864-82ef-0efc1dbaa236:1\n e8789c0d-bcc7-426c-bc79-4ae45fe123be;4bbd6753-30f2-4e3b-9e32-3c65b5037589:1\n d41db08f-6c2e-4724-899d-f5934846a3b2;4bbd6753-30f2-4e3b-9e32-3c65b5037589:2\n b64ad7df-383b-4606-b5f9-4725c6056945;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:7\n 8756bc78-f317-444a-b13c-7a3a35207b67;fabfd984-d738-4459-8a45-1699b4959a4c:0\n 5683b7c1-2eac-4d95-b72b-65f003284ec8;de4970f8-9818-44d8-88cc-53d9ad4885a3:0\n cbb0de87-e45f-48db-899b-5ebbab2f93bb;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:14\n 07650771-fff2-4109-94f6-1c7bd608768e;c8122f49-7dc9-49e0-8919-eefad7f416a9:3\n bf18bd03-1c15-4ec7-bbfe-36f3cd8e5338;fa3ef021-f5ae-4529-9ac4-d5b0bbf05906:0\n ea630e5f-20ed-48ec-b8eb-c018bd423c17;fb23b54d-bb22-492a-b6a3-a60a2a1288f3:0\n 2f42fd47-185c-4327-8824-d475202af89a;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:24\n c2f0f063-35b2-42e6-9b8d-157e2cbc72fc;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:19\n 5eaf69d3-26a6-4119-89e8-a05fe79a2e1f;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:6\n 6054a098-5dd3-42e1-8b84-a0b8972532be;ac5840bd-bca9-4faa-be65-b59301e55ff1:0\n ebbfda47-b33a-4c90-b40f-2920fa7add4d;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:9\n 1d3d8033-4336-4188-bd49-15f6d6100e2d;145b6eba-876a-46a4-b946-75ddf0389eda:1\n 16b0043e-06e3-4a0d-8d60-5d6fbd85499c;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:20\n 328aeaa3-7fde-456e-b3a9-1b71975366f8;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:21\n e729b06b-fa53-4b86-a40d-61b5b179d919;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:22\n dc437c4e-207b-4c9a-81c7-586937a3e20b;92c35cb6-0cf5-4949-804a-1d31fbcfbd06:17\n 8f16ea76-0030-4a99-a4c8-a4192eb82a37;145b6eba-876a-46a4-b946-75ddf0389eda:2\n 197c843d-c957-4a8c-801f-19166eaba940;145b6eba-876a-46a4-b946-75ddf0389eda:0\n 6b52254c-6e19-420d-a33f-51720c19fb65;09e0c3fd-e4d7-4edc-9481-ab654bd25b81:0\n 68247aee-2053-41d8-8781-e144fdd126cf;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:3\n b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1;a55db218-fbb4-4ad7-8a1d-3ec7f69ad90d:4\n 8203b7c9-1cee-48ff-bd7c-c357c8ca4002;ce01d132-7d6c-48cf-9bc2-04b52702cb7b:6\n \n \n f1774289-5526-4343-9b1b-1157c6654acb;437bf18e-9e35-4b60-be6f-6f602ee68f52:0\n 3e94bc22-d904-4d6f-8825-ad87fc1f980f;6227b777-0e84-4821-8dae-9eaedecabd54:0;d43bed11-a65d-4885-b093-c68e15b16d79:0\n f5429955-7a99-4225-ba19-0344b7e896b7;5b256307-1522-4bec-9ccb-c16870e43d1f:0;64d057f1-7dee-489d-b2e4-60ab5f91f0a0:0\n 55cd0676-3d1d-4f38-b63f-6cbc66e768a1;34149888-6c19-4c8e-9f78-cebc46455709:0\n de69f6c2-af03-47f9-aab9-713e08fc183b;fe0c8430-1347-4edb-b926-e5dd11b4d471:0;7dcf1db4-2ef5-4e98-a135-68419c7668b4:0\n 593ac1d4-baaa-4a4b-a951-635c2cda0f17;fe0c8430-1347-4edb-b926-e5dd11b4d471:1;7dcf1db4-2ef5-4e98-a135-68419c7668b4:1\n e1773aeb-d73d-4793-957c-a0ed87c04720;9545e837-af5b-41ee-adad-c1c0c2932155:0;86621b63-8055-4c84-83f4-aa7624425ffc:0;7dcf1db4-2ef5-4e98-a135-68419c7668b4:2\n ce68b450-438e-4c2c-9a21-9a1671985cb4;86621b63-8055-4c84-83f4-aa7624425ffc:1;7dcf1db4-2ef5-4e98-a135-68419c7668b4:3\n 36ca71e4-b319-448c-83da-b6fbbc7c8e43;9545e837-af5b-41ee-adad-c1c0c2932155:1\n 293ec858-03d9-4cbe-9826-8689dcdb9d5a;9545e837-af5b-41ee-adad-c1c0c2932155:2\n 735834f8-6fae-4c73-8b55-00c3068752e6;4cdec79a-d001-4971-b6f6-60159fb2959d:1;a39f1a11-76fd-4066-b052-ae8c93975dc6:6\n 9308f85e-7559-453b-a155-70db3f5521e2;0e2c6223-9457-42ac-9d1d-ae4e5b245348:0;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:0\n 0c63766b-d983-4645-90fe-948b397adc9a;0e2c6223-9457-42ac-9d1d-ae4e5b245348:2;799635cb-9052-4161-a85b-d0b05567f5d8:1\n 1e7c3c78-9d0b-469d-863a-15b4b3927022;a85c189d-ab72-491e-af09-9a10e7ba9971:0;5523125e-75f6-4a05-a70b-df2ff4279778:0\n 47d06d33-b809-4e0d-bd63-693381bcfd70;799635cb-9052-4161-a85b-d0b05567f5d8:2\n 99c418c4-6caf-420c-95a1-bacd2272b3f9;0e2c6223-9457-42ac-9d1d-ae4e5b245348:1\n e5b8a39a-7be3-4000-b3e6-523ffde0625a;ea079d52-17ce-4746-8c95-2356a1f9b38c:0\n c127a352-34d7-4706-b563-ef8542f62f38;98efa0a6-2ab1-48a1-b1bb-6a6bb329899b:0\n 1ba1b273-f3e7-49fc-bbc3-0b016f298e49;5b256307-1522-4bec-9ccb-c16870e43d1f:1\n e17842b4-ccdb-42f8-8da3-ece6d3b5a337;1db9120c-b80d-4b2b-998d-cd7e03f2409d:0;3d678358-1c61-49a9-b803-73faa87d31af:0\n c0d8e13e-ca6c-4a82-af14-372cb8929c81;ea079d52-17ce-4746-8c95-2356a1f9b38c:1\n a3f90c51-7ce7-4b6e-a434-a804f3c014e9;ea079d52-17ce-4746-8c95-2356a1f9b38c:2\n d6aaba2e-1f43-4318-9964-b6c73e08e3a7;675601b8-7348-4172-b59b-31430dca68b3:0;ea079d52-17ce-4746-8c95-2356a1f9b38c:3\n 5864463d-f6e2-4c11-9afd-cc501af9cacb;675601b8-7348-4172-b59b-31430dca68b3:1\n f985362b-a982-49d4-a540-b6a9c8d7058c;a39f1a11-76fd-4066-b052-ae8c93975dc6:0\n 8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:2\n 8d60267b-eb59-44e6-b59e-caadaf75e906;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:1\n e728e158-8b56-48d0-88ab-da1926c92c69;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58:0\n aaaecd43-edc1-4db7-a49f-89e5823de7a1;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:4\n 44c817de-9ee2-45c5-8ea3-3f776b023b48;fff11a28-f609-4e53-b0fd-e8f375125c44:0\n a2c5b4b0-cdff-471f-b8d4-dc499012dc6a;a39f1a11-76fd-4066-b052-ae8c93975dc6:7\n d1b41410-9c55-44f9-87d8-7f442a196551;0493bcab-edd6-44ed-84a7-fee44429a7fb:0\n 8e5837b9-2958-42e5-954b-8c3bd1c08ec1;ea079d52-17ce-4746-8c95-2356a1f9b38c:4\n e1b7152f-30d5-4886-8a4a-4a647c580fb7;f3d336b4-2a44-47ac-a90b-28aed494ab23:0;1659bbe0-e7ae-4a7b-b8db-2a5963abb616:0;799635cb-9052-4161-a85b-d0b05567f5d8:0\n 89e1a961-14e1-43b1-baa9-84b685ad3244;2a28300a-b3ce-4824-ad7f-6ea7da63cd3f:3\n 8707e530-90fe-49ba-b221-7924b890c876;92423757-be4c-4fc6-9db2-925b467372e3:0;64d057f1-7dee-489d-b2e4-60ab5f91f0a0:2\n e4ed0f18-4972-43a6-bd1b-ea7e963cd7e6;8a9bc375-44f3-4cc2-8bcd-6a53d945f201:0;42c24c74-5d0d-4254-a419-dd33bc8ace1a:0\n 3b1f0ca4-aed9-41ad-a41e-8f84170f11d8;a39f1a11-76fd-4066-b052-ae8c93975dc6:1\n 4a0f720f-8088-4031-b20d-cee01582c736;a39f1a11-76fd-4066-b052-ae8c93975dc6:2\n 8085fdea-c5a2-42f2-8897-02d1b05fb1be;a39f1a11-76fd-4066-b052-ae8c93975dc6:3\n dc6bedab-3788-4e88-9694-91308f59c51d;a14a5847-0f4a-49a3-a234-00aefeff084f:0;a39f1a11-76fd-4066-b052-ae8c93975dc6:8;42c24c74-5d0d-4254-a419-dd33bc8ace1a:3\n d9308c32-983b-417d-98b9-ed59283dc5c9;e213f459-ed5d-4fe0-adad-fa17125c3450:0\n 3c7564b6-5670-4dbe-be61-0f71c7a732da;bd03d0aa-1df2-4487-b304-75f5ed88bef5:0;42c24c74-5d0d-4254-a419-dd33bc8ace1a:1\n 5683b7c1-2eac-4d95-b72b-65f003284ec8;0c4e80e7-ee54-4d2e-88ec-53541ad08b04:0;559abbb3-53e6-4ee6-bf48-17b5e56a0cd7:0;64d057f1-7dee-489d-b2e4-60ab5f91f0a0:1\n bf18bd03-1c15-4ec7-bbfe-36f3cd8e5338;34149888-6c19-4c8e-9f78-cebc46455709:1\n ea630e5f-20ed-48ec-b8eb-c018bd423c17;799635cb-9052-4161-a85b-d0b05567f5d8:3;42c24c74-5d0d-4254-a419-dd33bc8ace1a:4\n 2f42fd47-185c-4327-8824-d475202af89a;799635cb-9052-4161-a85b-d0b05567f5d8:4\n c2f0f063-35b2-42e6-9b8d-157e2cbc72fc;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58:1;0e2c6223-9457-42ac-9d1d-ae4e5b245348:3;ec3d9112-5c70-431d-a8f9-f4d8bf185ff1:0\n 5eaf69d3-26a6-4119-89e8-a05fe79a2e1f;0e2c6223-9457-42ac-9d1d-ae4e5b245348:4\n ebbfda47-b33a-4c90-b40f-2920fa7add4d;0e2c6223-9457-42ac-9d1d-ae4e5b245348:5\n 1d3d8033-4336-4188-bd49-15f6d6100e2d;42c24c74-5d0d-4254-a419-dd33bc8ace1a:5\n 16b0043e-06e3-4a0d-8d60-5d6fbd85499c;a303b4f3-c88b-4112-8199-87d71b22cdf0:0\n 328aeaa3-7fde-456e-b3a9-1b71975366f8;0f597183-07b5-480d-b0e8-655bdd1c244d:0\n e729b06b-fa53-4b86-a40d-61b5b179d919;c8296816-da6f-4bde-9735-0e8577875a06:0\n dc437c4e-207b-4c9a-81c7-586937a3e20b;23f1b9c0-e3b6-466b-be33-2bc3c0c8dd58:2;0e2c6223-9457-42ac-9d1d-ae4e5b245348:6\n 8f16ea76-0030-4a99-a4c8-a4192eb82a37;e213f459-ed5d-4fe0-adad-fa17125c3450:1\n 197c843d-c957-4a8c-801f-19166eaba940;a39f1a11-76fd-4066-b052-ae8c93975dc6:4\n 6b52254c-6e19-420d-a33f-51720c19fb65;a39f1a11-76fd-4066-b052-ae8c93975dc6:5\n 1e9280df-aec2-421e-9f7a-92e6f9da339e;4cdec79a-d001-4971-b6f6-60159fb2959d:0;42c24c74-5d0d-4254-a419-dd33bc8ace1a:2\n 68247aee-2053-41d8-8781-e144fdd126cf;1db9120c-b80d-4b2b-998d-cd7e03f2409d:1;5b256307-1522-4bec-9ccb-c16870e43d1f:2\n b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1;1db9120c-b80d-4b2b-998d-cd7e03f2409d:2;5b256307-1522-4bec-9ccb-c16870e43d1f:3\n e1b89b1f-5704-41c8-a4f7-095a6d896830;1db9120c-b80d-4b2b-998d-cd7e03f2409d:3;5b256307-1522-4bec-9ccb-c16870e43d1f:4\n 8203b7c9-1cee-48ff-bd7c-c357c8ca4002;1db9120c-b80d-4b2b-998d-cd7e03f2409d:4;5b256307-1522-4bec-9ccb-c16870e43d1f:5\n \n \n \n 351d2c56-4a9b-4998-af82-82a1baba0c33\n _Jane Doe\n 2017-05-24T12:07:31\n _Jane Doe\n 2019-04-25T10:44:30\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 1\n _Jane Doe\n \n \n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n _Jane Doe\n 2017-05-29T17:38:22\n _Jane Doe\n 2018-07-12T11:35:01\n 2018-09-09T22:00:00\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n \n \n 08c4afc4-6416-4b23-8046-dd47c21ccaec\n _Jane Doe\n 2017-05-29T17:36:44\n _Jane Doe\n 2018-07-12T11:49:16\n 0\n Borrow\n 52ae78aa092e7f89944c10487e92e7be7324fa72\n 0\n _Jane Doe\n \n \n 490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38\n _Jane Doe\n 2017-05-29T15:37:43\n _Jane Doe\n 2017-05-29T15:37:43\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n f8870bd1-4f3f-4b48-b29b-a7cf3d461475\n _Jane Doe\n 2017-05-24T12:20:56\n _Jane Doe\n 2017-05-24T12:20:56\n 0\n ExamineAndAssess\n 44087adc4b6dd69f117f87465921d63d99bc5812\n 3\n _Jane Doe\n \n \n 3ab6253b-74b7-4701-9431-acfe6df2d2be\n _Jane Doe\n 2017-05-23T14:34:25\n _Jane Doe\n 2017-05-23T14:34:25\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 1\n _Jane Doe\n \n \n 6c15fcbf-0980-4849-97de-442e6bfbcdc8\n _Jane Doe\n 2017-11-09T11:21:14\n _Jane Doe\n 2017-11-09T11:21:27\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 2\n _Jane Doe\n 2017-11-09T11:21:25\n \n \n 5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9\n _Jane Doe\n 2017-05-23T13:38:58\n _Jane Doe\n 2017-05-23T13:38:58\n 2018-09-09T22:00:00\n 1\n Update bibliographic information and quotation page numbers\n cfef568ffd0507a385da818f310a68d63fb28bfa\n This is a preprint article. Update article information and add page numbers for quotations after the article has been published.\n 0\n _Jane Doe\n \n \n 4b33d12a-af3c-4821-8907-b9263bb8ee7f\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:07\n _Jane Doe\n 2017-11-09T11:19:06\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:05\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:20\n _Jane Doe\n 2017-11-09T11:19:12\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:12\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:31\n _Jane Doe\n 2017-11-09T11:19:18\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:17\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:40\n _Jane Doe\n 2017-11-09T11:19:22\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:22\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:18:48\n _Jane Doe\n 2017-11-09T11:19:27\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:27\n \n \n 27384b10-b549-45fc-80c7-94688793e9fc\n _Jane Doe\n 2017-11-09T11:19:00\n _Jane Doe\n 2017-11-09T11:19:32\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:19:32\n \n \n 7d50376a-ef59-4b6a-804f-79e6880ebd42\n _Jane Doe\n 2017-05-24T12:03:22\n _Jane Doe\n 2017-05-24T12:03:22\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n \n \n f16b35ce-1d93-423c-909a-61d0d5f693f8\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n _Jane Doe\n 2017-05-23T11:33:09\n _Jane Doe\n 2017-05-23T11:33:09\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 3\n _Jane Doe\n \n \n 0ef4b577-f9c6-43b5-abfa-5d05ba8664a1\n _Jane Doe\n 2017-05-23T11:33:30\n _Jane Doe\n 2017-05-23T11:33:30\n 0\n Look up\n d526941bca24bb0b17e7ba0c8ac7460e3afd93ae\n 0\n _Jane Doe\n \n \n d0abc9c9-e230-4a30-ac87-7847e7fa0789\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 24cba909-5cee-4d53-ae8c-95938ad33f89\n _Jane Doe\n 2017-05-29T15:36:49\n _Jane Doe\n 2017-05-29T15:36:49\n 0\n Borrow\n 52ae78aa092e7f89944c10487e92e7be7324fa72\n 0\n _Jane Doe\n \n \n 92976b82-1442-47c0-a23d-dd1a0178ce0c\n _Jane Doe\n 2017-05-29T15:37:47\n _Jane Doe\n 2017-05-29T15:37:47\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n 0\n _Jane Doe\n \n \n 5c99255f-527b-4ab4-a482-10c4441d08f0\n _Jane Doe\n 2017-05-29T15:36:49\n _Jane Doe\n 2017-05-29T15:36:49\n 0\n Borrow\n 52ae78aa092e7f89944c10487e92e7be7324fa72\n 0\n _Jane Doe\n \n \n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n _Jane Doe\n 2017-05-29T15:39:26\n _Jane Doe\n 2017-05-29T15:39:26\n 0\n GoThroughBibliography\n 902affb333b2ae351dfab0809be6d23e94c955c9\n 0\n _Jane Doe\n \n \n 9208b9de-7f60-485f-92fb-5b2ce71e2d8d\n _Jane Doe\n 2017-05-24T13:22:03\n _Jane Doe\n 2017-05-24T13:22:03\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n \n \n ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf\n _Jane Doe\n 2017-05-29T15:39:48\n _Jane Doe\n 2017-05-29T15:39:48\n 0\n ExamineAndAssess\n 44087adc4b6dd69f117f87465921d63d99bc5812\n 0\n _Jane Doe\n \n \n b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc\n _Jane Doe\n 2017-05-23T15:57:14\n _Jane Doe\n 2017-05-23T15:57:14\n 0\n VerifyBibliographicInformation\n 0c76f1ea90bf0825a0ef595d7b36f48c0baaabc9\n Check how legal sources should be cited.\n 0\n _Jane Doe\n \n \n 6934fac0-8c0a-469d-90ce-0412ba7d9a87\n _Jane Doe\n 2017-11-09T11:32:32\n _Jane Doe\n 2017-11-09T11:32:42\n 0\n Read\n d351942b60bdab877987918b7dc566e06baf41f6\n 0\n _Jane Doe\n 2017-11-09T11:32:42\n \n \n 3c651c48-0dd6-4a47-b02d-13a6a80b1c2b\n _Jane Doe\n 2017-05-29T15:39:55\n _Jane Doe\n 2017-05-29T15:39:55\n 0\n ExamineAndAssess\n 44087adc4b6dd69f117f87465921d63d99bc5812\n 0\n _Jane Doe\n \n \n \n \n _Jane Doe\n 2017-05-23T09:43:34\n _Jane Doe\n 2017-05-23T09:43:34\n ReferenceLink\n 0\n 27384b10-b549-45fc-80c7-94688793e9fc\n Reference\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n Reference\n \n \n _Jane Doe\n 2017-08-09T08:19:07\n _Jane Doe\n 2017-08-09T08:19:07\n ReferenceLink\n This article relies heavily on Spink and Moyer's definitions.\n 2\n 27384b10-b549-45fc-80c7-94688793e9fc\n Reference\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n Reference\n \n \n _Jane Doe\n 2017-11-09T11:04:22\n _Jane Doe\n 2017-11-09T11:04:22\n PdfKnowledgeItem\n 0\n e1773aeb-d73d-4793-957c-a0ed87c04720\n KnowledgeItem\n f12b153a-00af-4bf0-a5a6-68060114d337\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:04:34\n _Jane Doe\n 2017-11-09T11:04:34\n PdfKnowledgeItem\n 0\n ce68b450-438e-4c2c-9a21-9a1671985cb4\n KnowledgeItem\n bfe697ba-7ebc-40e1-813c-0483bc1f45be\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:04:45\n _Jane Doe\n 2017-11-09T11:04:45\n PdfKnowledgeItem\n 0\n 36ca71e4-b319-448c-83da-b6fbbc7c8e43\n KnowledgeItem\n 6943e71d-462d-4342-8486-659d62ec3d21\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:05:47\n _Jane Doe\n 2017-11-09T11:05:47\n PdfKnowledgeItem\n 0\n 293ec858-03d9-4cbe-9826-8689dcdb9d5a\n KnowledgeItem\n 07b7f62c-78c8-4473-99c9-5a5a6e689e0d\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:06:41\n _Jane Doe\n 2017-11-09T11:06:41\n PdfKnowledgeItem\n 0\n 1e7c3c78-9d0b-469d-863a-15b4b3927022\n KnowledgeItem\n be305069-1c9d-491b-b942-9bb0e2f4229e\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:07:01\n _Jane Doe\n 2017-11-09T11:07:01\n PdfKnowledgeItem\n 0\n 0c63766b-d983-4645-90fe-948b397adc9a\n KnowledgeItem\n e6df008d-4aad-4544-b5b5-7ca9f2f8293f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:07:16\n _Jane Doe\n 2017-11-09T11:07:16\n PdfKnowledgeItem\n 0\n 47d06d33-b809-4e0d-bd63-693381bcfd70\n KnowledgeItem\n 1be131b0-83b5-4955-90d2-806ee8a3724b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:07:47\n _Jane Doe\n 2017-11-09T11:07:47\n PdfKnowledgeItem\n 0\n d6aaba2e-1f43-4318-9964-b6c73e08e3a7\n KnowledgeItem\n 43b7862f-57a7-485b-8060-c49d1713ebee\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:08:04\n _Jane Doe\n 2017-11-09T11:08:04\n PdfKnowledgeItem\n 0\n 5864463d-f6e2-4c11-9afd-cc501af9cacb\n KnowledgeItem\n 3b81bde5-302a-42bc-881c-fb96526b5d20\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:08:23\n _Jane Doe\n 2017-11-09T11:08:23\n PdfKnowledgeItem\n 0\n f985362b-a982-49d4-a540-b6a9c8d7058c\n KnowledgeItem\n ee385a0d-91c5-472c-a138-46df16d4a0ae\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:12\n _Jane Doe\n 2017-11-09T11:09:12\n PdfKnowledgeItem\n 0\n 8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77\n KnowledgeItem\n 04b10222-9d97-48d6-aa2e-560f06c0578b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:24\n _Jane Doe\n 2017-11-09T11:09:24\n PdfKnowledgeItem\n 0\n 8d60267b-eb59-44e6-b59e-caadaf75e906\n KnowledgeItem\n 510bdb30-6a8f-4bbb-8e45-2ef6cc0b7b07\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:42\n _Jane Doe\n 2017-11-09T11:09:42\n PdfKnowledgeItem\n 0\n e728e158-8b56-48d0-88ab-da1926c92c69\n KnowledgeItem\n 668638be-ebd0-459f-9507-59a2a31919c5\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:09:59\n _Jane Doe\n 2017-11-09T11:09:59\n PdfKnowledgeItem\n 0\n aaaecd43-edc1-4db7-a49f-89e5823de7a1\n KnowledgeItem\n b22d04cd-6a5c-4c88-a3d3-95db0a5daa4e\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:10:20\n _Jane Doe\n 2017-11-09T11:10:20\n PdfKnowledgeItem\n 0\n 44c817de-9ee2-45c5-8ea3-3f776b023b48\n KnowledgeItem\n 4249f8eb-0571-4d2f-810a-49850b9133bc\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:10:42\n _Jane Doe\n 2017-11-09T11:10:42\n PdfKnowledgeItem\n 0\n a2c5b4b0-cdff-471f-b8d4-dc499012dc6a\n KnowledgeItem\n 46b61af1-9e7e-434f-995b-9d0998208b01\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:11:26\n _Jane Doe\n 2017-11-09T11:11:26\n PdfKnowledgeItem\n 0\n d1b41410-9c55-44f9-87d8-7f442a196551\n KnowledgeItem\n f14d042d-a95c-441b-912c-0f580369a1c8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:11:44\n _Jane Doe\n 2017-11-09T11:11:44\n PdfKnowledgeItem\n 0\n 8e5837b9-2958-42e5-954b-8c3bd1c08ec1\n KnowledgeItem\n 673c0faa-5a36-4645-9c8e-5d9e7906b308\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:12:23\n _Jane Doe\n 2017-11-09T11:12:23\n PdfKnowledgeItem\n 0\n e1b7152f-30d5-4886-8a4a-4a647c580fb7\n KnowledgeItem\n 93d5f85a-78ca-4a03-a893-b71c98667e9a\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:12:38\n _Jane Doe\n 2017-11-09T11:12:38\n PdfKnowledgeItem\n 0\n df067b95-5685-4a74-88ec-6aac3bf7e58f\n KnowledgeItem\n cbd0fadc-37ac-4a91-80b0-e4c426a65842\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:13:08\n _Jane Doe\n 2017-11-09T11:13:08\n PdfKnowledgeItem\n 0\n 89e1a961-14e1-43b1-baa9-84b685ad3244\n KnowledgeItem\n 351eca9c-1e63-49f1-a02f-03a78fdefab6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:13:19\n _Jane Doe\n 2017-11-09T11:13:19\n PdfKnowledgeItem\n 0\n efdf0c51-bb4f-4b99-866f-579f70f3a9b2\n KnowledgeItem\n 8fc77ac6-5d40-4c95-996f-a1fa8a435b8f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:13:34\n _Jane Doe\n 2017-11-09T11:13:34\n PdfKnowledgeItem\n 0\n 7833781a-0d1a-4ad8-869d-da7f167aaf33\n KnowledgeItem\n 9493f23c-e4eb-414d-852b-2e36ffeb11ac\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:14:05\n _Jane Doe\n 2017-11-09T11:14:05\n PdfKnowledgeItem\n 0\n 89d3ec59-4084-41b9-8f5f-bcce18958b19\n KnowledgeItem\n 609297a2-45d5-4a86-b277-38215fe981f6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:14:48\n _Jane Doe\n 2017-11-09T11:14:48\n PdfKnowledgeItem\n 0\n ed928d6e-2210-4afa-943d-64a1217c91ae\n KnowledgeItem\n 1843ef1e-38cf-4140-abfd-73a628998392\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:15:18\n _Jane Doe\n 2017-11-09T11:15:18\n PdfKnowledgeItem\n 0\n ff3ede9f-2eab-4c19-adce-86b7b7e04452\n KnowledgeItem\n 1e279651-7aeb-4270-b98f-ab0b220a57cf\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:15:36\n _Jane Doe\n 2017-11-09T11:15:36\n PdfKnowledgeItem\n 0\n 6ab5bc1c-e84d-4e4c-8054-31172f4e3201\n KnowledgeItem\n fcc32682-6e2f-445e-94ff-4965d1d25259\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:15:57\n _Jane Doe\n 2017-11-09T11:15:57\n PdfKnowledgeItem\n 0\n 98e2bac1-34f6-4d92-b074-de419ac025f5\n KnowledgeItem\n 26415c31-f996-494b-aa22-f50f147b0f42\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:16:11\n _Jane Doe\n 2017-11-09T11:16:11\n PdfKnowledgeItem\n 0\n 44e0edcc-e565-4b61-8b9d-26b3565966f1\n KnowledgeItem\n 426a04e8-9b3e-471e-afaf-c3f81fa1fe8d\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:07\n _Jane Doe\n 2017-11-09T11:18:07\n PdfTaskItem\n 0\n 77d06911-7c99-4b3b-be8c-693c8e693701\n TaskItem\n 48a44898-852f-4931-b81b-2eeedc5bb8b8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:20\n _Jane Doe\n 2017-11-09T11:18:20\n PdfTaskItem\n 0\n 948dd874-d307-4ab5-8e79-e28465542346\n TaskItem\n 7aba9d3c-c28e-4e1e-bc0e-dc66aeb9c4e6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:31\n _Jane Doe\n 2017-11-09T11:18:31\n PdfTaskItem\n 0\n b45a1d38-5f0d-4e3c-8fe7-f39effe0e182\n TaskItem\n cafed103-08c1-4b0a-b42f-82fa169291f4\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:40\n _Jane Doe\n 2017-11-09T11:18:40\n PdfTaskItem\n 0\n 5f3b1770-00c4-46c9-8cce-c26d07af22a2\n TaskItem\n e4407056-eefe-43ba-9df8-d41d702e8b12\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:18:48\n _Jane Doe\n 2017-11-09T11:18:48\n PdfTaskItem\n 0\n 7c3c503a-713f-4cd0-a84f-e41b016052fd\n TaskItem\n 2d8898fa-6492-4ed7-95be-8d2d875c945f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:19:00\n _Jane Doe\n 2017-11-09T11:19:00\n PdfTaskItem\n 0\n 86d85f74-37cf-4c31-a00b-75be3d300cba\n TaskItem\n 7ab8553a-1a9a-4ca8-becd-2cb051cbae27\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:21:14\n _Jane Doe\n 2017-11-09T11:21:14\n PdfTaskItem\n 0\n 475f456d-f15a-45dd-8d91-8e1f911c6ad8\n TaskItem\n 02d505ca-7546-4ea9-9de8-53c027c13f74\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:22:22\n _Jane Doe\n 2017-11-09T11:22:22\n PdfKnowledgeItem\n 0\n 8707e530-90fe-49ba-b221-7924b890c876\n KnowledgeItem\n a76ba532-af51-424f-b092-7370941bc33a\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:23:05\n _Jane Doe\n 2017-11-09T11:23:05\n PdfKnowledgeItem\n 0\n 5683b7c1-2eac-4d95-b72b-65f003284ec8\n KnowledgeItem\n 0a853a99-c7d1-4440-9aa0-bb0ad318aca3\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:23:12\n _Jane Doe\n 2017-11-09T11:23:12\n PdfKnowledgeItem\n 0\n 8d8a6e93-c9ea-42f5-99a4-825e08d7ddb1\n KnowledgeItem\n 8ecd8f36-d1ba-4096-b594-06ce75fbddc4\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:06\n _Jane Doe\n 2017-11-09T11:24:06\n PdfKnowledgeItem\n 0\n c2f0f063-35b2-42e6-9b8d-157e2cbc72fc\n KnowledgeItem\n 3c560280-bb82-4db2-8eeb-029ff7100cb6\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:19\n _Jane Doe\n 2017-11-09T11:24:19\n PdfKnowledgeItem\n 0\n 5eaf69d3-26a6-4119-89e8-a05fe79a2e1f\n KnowledgeItem\n 5b4063c2-8c3a-4e00-af52-a66312b3c9f7\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:36\n _Jane Doe\n 2017-11-09T11:24:36\n PdfKnowledgeItem\n 0\n 6054a098-5dd3-42e1-8b84-a0b8972532be\n KnowledgeItem\n 1bdfbf3b-7804-4566-a325-4b288b5d5f52\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:24:44\n _Jane Doe\n 2017-11-09T11:24:44\n PdfKnowledgeItem\n 0\n ebbfda47-b33a-4c90-b40f-2920fa7add4d\n KnowledgeItem\n e37bf370-cea2-423f-b82d-555d2cf9cfc4\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:00\n _Jane Doe\n 2017-11-09T11:25:00\n PdfKnowledgeItem\n 0\n 1d3d8033-4336-4188-bd49-15f6d6100e2d\n KnowledgeItem\n f3835772-312b-44f9-9f69-ce0684784f38\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:19\n _Jane Doe\n 2017-11-09T11:25:19\n PdfKnowledgeItem\n 0\n 16b0043e-06e3-4a0d-8d60-5d6fbd85499c\n KnowledgeItem\n 999294a8-db4a-40eb-bf6b-1fdb0eb76f25\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:34\n _Jane Doe\n 2017-11-09T11:25:34\n PdfKnowledgeItem\n 0\n 328aeaa3-7fde-456e-b3a9-1b71975366f8\n KnowledgeItem\n 22e5c9a6-dc6f-4df1-8f7d-504d52bc7d93\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:25:42\n _Jane Doe\n 2017-11-09T11:25:42\n PdfKnowledgeItem\n 0\n e729b06b-fa53-4b86-a40d-61b5b179d919\n KnowledgeItem\n ecda8516-01dc-40e5-b10f-305d7929a6e5\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:00\n _Jane Doe\n 2017-11-09T11:26:00\n PdfKnowledgeItem\n 0\n dc437c4e-207b-4c9a-81c7-586937a3e20b\n KnowledgeItem\n 22322086-34cc-4311-890c-566ef8b53b4f\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:18\n _Jane Doe\n 2017-11-09T11:26:18\n PdfKnowledgeItem\n 0\n 8f16ea76-0030-4a99-a4c8-a4192eb82a37\n KnowledgeItem\n 96291334-163e-4c91-9b47-28afe8020b95\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:37\n _Jane Doe\n 2017-11-09T11:26:37\n PdfKnowledgeItem\n 0\n 197c843d-c957-4a8c-801f-19166eaba940\n KnowledgeItem\n 58590f36-8d2c-4575-9433-bb7bde3daf81\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:26:59\n _Jane Doe\n 2017-11-09T11:26:59\n PdfKnowledgeItem\n 0\n 6b52254c-6e19-420d-a33f-51720c19fb65\n KnowledgeItem\n c43c0a88-1de4-48da-93ce-9ec1cbc9d56b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:27:13\n _Jane Doe\n 2017-11-09T11:27:13\n PdfKnowledgeItem\n 0\n 1e9280df-aec2-421e-9f7a-92e6f9da339e\n KnowledgeItem\n e82505d8-56de-4267-9352-4974ee7298df\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:27:23\n _Jane Doe\n 2017-11-09T11:27:23\n PdfKnowledgeItem\n 0\n 29bac51b-0f3a-4ca0-8c95-670565fa36f7\n KnowledgeItem\n 547f2b44-f2aa-46c9-ad4f-d2e295f45c45\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:10\n _Jane Doe\n 2017-11-09T11:28:10\n PdfKnowledgeItem\n 0\n 96c2a2d1-f503-4c1b-b971-dbe5100fb40a\n KnowledgeItem\n 0b227831-e94a-4e87-8811-02388608498b\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:18\n _Jane Doe\n 2017-11-09T11:28:18\n PdfKnowledgeItem\n 0\n 1de6ee97-7578-4ea7-9ce5-5bfed9d25e67\n KnowledgeItem\n 237297f6-2e0a-404c-b9fc-5dc8e12085d1\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:39\n _Jane Doe\n 2017-11-09T11:28:39\n PdfKnowledgeItem\n 0\n d8280b44-ad37-4d7d-9e34-27602a8eae15\n KnowledgeItem\n 9b6591cb-42a5-4d66-9e4d-2dc9accff555\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:28:48\n _Jane Doe\n 2017-11-09T11:28:48\n PdfKnowledgeItem\n 0\n 9270be6d-8ff8-4d73-9c00-8d1d5689777e\n KnowledgeItem\n 4a94c085-e4ca-409f-b911-a11fe75fa89c\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:29:14\n _Jane Doe\n 2017-11-09T11:29:14\n PdfKnowledgeItem\n 0\n 8cd93dd1-0d00-4054-9a90-51501596ab63\n KnowledgeItem\n e5dd8427-ec4d-457f-b3bd-1355a0aefbf8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:30:15\n _Jane Doe\n 2017-11-09T11:30:15\n PdfAbstract\n 0\n 736d8366-00c0-4f5d-a982-4b24d6e27b3a\n Reference\n 86e472d5-6ba1-4860-82a8-9de86d8eb1e9\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:31:03\n _Jane Doe\n 2017-11-09T11:31:03\n PdfKnowledgeItem\n 0\n 68247aee-2053-41d8-8781-e144fdd126cf\n KnowledgeItem\n 4fd4b119-3c6f-4b22-b9df-ce181cdc8651\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:31:31\n _Jane Doe\n 2017-11-09T11:31:31\n PdfKnowledgeItem\n 0\n b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1\n KnowledgeItem\n 42dfe8d4-b3c2-430b-9914-2ce3c1182716\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:32:05\n _Jane Doe\n 2017-11-09T11:32:05\n PdfKnowledgeItem\n 0\n e1b89b1f-5704-41c8-a4f7-095a6d896830\n KnowledgeItem\n 58708f29-6a2b-461a-b1df-e57bdb27c612\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:32:12\n _Jane Doe\n 2017-11-09T11:32:12\n PdfKnowledgeItem\n 0\n 8203b7c9-1cee-48ff-bd7c-c357c8ca4002\n KnowledgeItem\n f35e4e21-cb99-4bc2-989a-c35054359de8\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:32:32\n _Jane Doe\n 2017-11-09T11:32:32\n PdfTaskItem\n 0\n 6bd21402-65b9-4362-9d88-8b23633385c3\n TaskItem\n c7b34c7e-09fb-4989-8a00-d90694dacca9\n Annotation\n \n \n _Jane Doe\n 2017-11-09T11:33:02\n _Jane Doe\n 2017-11-09T11:33:02\n PdfKnowledgeItem\n 0\n 2962251b-22f8-405e-8e1f-f29bbf92dd00\n KnowledgeItem\n b2aa66f4-fd01-488d-8cb0-6955b7965e4c\n Annotation\n \n \n _Jane Doe\n 2018-07-12T11:34:55\n _Jane Doe\n 2018-07-12T11:35:01\n ReferenceLink\n 0\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n Reference\n d0a6dd17-9c45-4865-a6e7-8fe225ff3b32\n Reference\n \n \n _Jane Doe\n 2019-04-25T11:17:04\n _Jane Doe\n 2019-04-25T11:17:07\n PdfKnowledgeItem\n 0\n 6fb75b29-ae6b-4e6f-ba73-37a077fc397c\n KnowledgeItem\n 5070d05e-28a9-408f-99d3-fb565fbd02e8\n Annotation\n \n \n _Jane Doe\n 2019-04-25T11:17:26\n _Jane Doe\n 2019-04-25T11:17:27\n PdfKnowledgeItem\n 0\n 749aae33-cbb7-4aac-9092-7b33e9736eec\n KnowledgeItem\n 64db2632-f382-49eb-933c-60545b61e4d2\n Annotation\n \n \n _Jane Doe\n 2019-04-25T11:23:56\n _Jane Doe\n 2019-04-25T11:24:10\n PdfKnowledgeItem\n 0\n f1774289-5526-4343-9b1b-1157c6654acb\n KnowledgeItem\n be025e69-9bd2-4e5d-a243-d33451e77e09\n Annotation\n \n \n
", + "items": [ + { + "itemType": "journalArticle", + "title": "Food and drug counterfeiting in the developing nations: The implications and way-out", + "creators": [ + { + "lastName": "Agbaraji", + "firstName": "Emmanuel Chuks", + "creatorType": "author" + }, + { + "lastName": "Ochulor", + "firstName": "Deborah O.", + "creatorType": "author" + }, + { + "lastName": "Ezeh", + "firstName": "Gloria N.", + "creatorType": "author" + } + ], + "date": "2012-01-01T00:00:00", + "ISSN": "2223-9944", + "issue": "2", + "itemID": "351d2c56-4a9b-4998-af82-82a1baba0c33", + "journalAbbreviation": "ARInt.", + "pages": "24-31", + "publicationTitle": "Academic Research International", + "volume": "3", + "attachments": [ + { + "path": "Agbaraji, Ochulor et al.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "id": "6fb75b29-ae6b-4e6f-ba73-37a077fc397c", + "note": "

Food counterfeiting similar to drug counterfeiting

\n

\"Counterfeited drugs are drugs that are not authentic and have been manufactured using incorrect quantities, or incorrect ingredients, to either reduce the potency, or nullify the potency of drugs altogether, and the same is applicable to food counterfeit.\"

\n24" + }, + { + "id": "749aae33-cbb7-4aac-9092-7b33e9736eec", + "note": "

Advantages of RFID

\n

\"With RFID, drugs can be tracked at the item level throughout the supply chain. Individual packages are tagged at manufacturing and then read serially, in-bulk throughout the distribution chain. The read points include tag application, case packaging, total tracking throughout distribution and item level tracking and authentication at the pharmacy. With RFID, the entire drug supply chain becomes more efficient and secure.\"

\n27" + }, + { + "id": "f1774289-5526-4343-9b1b-1157c6654acb", + "note": "

Digital mass serialization in the supply chain

\n28" + } + ], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "The SAGE encyclopedia of food issues", + "creators": [ + { + "lastName": "Albala", + "firstName": "Ken", + "creatorType": "editor" + } + ], + "date": "2015-01-01T00:00:00", + "ISBN": "9781452243016", + "extra": "Citation Key: Albala.2015", + "itemID": "515c0c9b-1bbe-4706-aa5e-f62aeaf73271", + "place": "Los Angeles", + "publisher": "SAGE Reference", + "attachments": [], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "The role of hazard- and risk-based approaches in ensuring food safety", + "creators": [ + { + "lastName": "Barlow", + "firstName": "Susan M.", + "creatorType": "author" + }, + { + "lastName": "Boobis", + "firstName": "Alan R.", + "creatorType": "author" + }, + { + "lastName": "Bridges", + "firstName": "Jim", + "creatorType": "author" + }, + { + "lastName": "Cockburn", + "firstName": "Andrew", + "creatorType": "author" + }, + { + "lastName": "Dekant", + "firstName": "Wolfgang", + "creatorType": "author" + }, + { + "lastName": "Hepburn", + "firstName": "Paul", + "creatorType": "author" + }, + { + "lastName": "Houben", + "firstName": "Geert F.", + "creatorType": "author" + }, + { + "lastName": "König", + "firstName": "Jürgen", + "creatorType": "author" + }, + { + "lastName": "Nauta", + "firstName": "Maarten J.", + "creatorType": "author" + }, + { + "lastName": "Schuermans", + "firstName": "Jeroen", + "creatorType": "author" + }, + { + "lastName": "Bánáti", + "firstName": "Diána", + "creatorType": "author" + } + ], + "date": "2015-01-01T00:00:00", + "DOI": "10.1016/j.tifs.2015.10.007", + "ISSN": "09242244", + "abstractNote": "Background: Food legislation in the European Union and elsewhere includes both hazard- and risk-based approaches for ensuring safety. In hazard-based approaches, simply the presence of a potentially harmful agent at a detectable level in food is used as a basis for legislation and/or risk management action. Riskbased approaches allow consideration of exposure in assessing whether there may be unacceptable risks to health. Scope and approach: The advantages and disadvantages of hazard- and risk-based approaches for ensuring the safety of food chemicals, allergens, ingredients and microorganisms were explored at an ILSI Europe workshop. Key findings and conclusions: It was concluded that both types of approach have their place, depending on the context. However, problems can arise when both types of approach are used in regulation by separate agencies that address different aspects of the same agent/substance present in food. This separation of decision-making can result in hazard-based restrictions on marketing and use, whereas risk-based assessments for those exposed show there is reasonable certainty no harm will result. This in turn can lead to contradictory, confusing and ultimately unnecessary actions. Use of hazard-based approaches for foods also means that comparisons with benefits for nutrition and food security cannot be undertaken. This has the potential to lead to bias in the overall conclusions of regulators and risk managers, who may not have been presented with the benefits of particular foods. The value of riskbased approaches is becoming increasingly recognised.", + "extra": "Citation Key: Barlow.2015", + "issue": "2", + "itemID": "d0a6dd17-9c45-4865-a6e7-8fe225ff3b32", + "journalAbbreviation": "Trends Food Sci. Tech.", + "pages": "176-188", + "publicationTitle": "Trends in Food Science & Technology", + "volume": "46", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "id": "3579306e-3aa8-442f-ae86-5692bacb6116", + "note": "

It's unrealistic to aim for completely risk-free food

\n

\"…zero tolerance of risks is not feasible for the majority of foods and the majority of safety contexts.\"

\n176" + } + ], + "seeAlso": [] + }, + { + "itemType": "document", + "title": "Truth in seafood labeling", + "creators": [ + { + "lastName": "Bishop", + "firstName": "Mac William", + "creatorType": "author" + }, + { + "lastName": "Werschkul", + "firstName": "Ben", + "creatorType": "author" + }, + { + "lastName": "Hodge", + "firstName": "Channon", + "creatorType": "author" + }, + { + "lastName": "Rosado", + "firstName": "Pedro Rafael", + "creatorType": "author" + }, + { + "lastName": "Stokes", + "firstName": "Elaisha", + "creatorType": "author" + }, + { + "lastName": "Desai", + "firstName": "Lisa", + "creatorType": "author" + } + ], + "date": "2013-02-21T00:00:00", + "abstractNote": "A senior scientist at Oceana discusses the group’s new study that found that about one-third of fish samples in 12 metropolitan areas were mislabeled.", + "extra": "Citation Key: Bishop.20130221", + "itemID": "09bd55a6-be76-417d-9682-f1a5a07d28d7", + "publisher": "The New York Times", + "url": "https://www.nytimes.com/video/us/100000002077731/truth-in-seafood-labeling.html?action=click&contentCollection=us&module=lede®ion=caption&pgtype=article", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food fraud and adulterated ingredients: Background, issues, and federal action", + "creators": [ + { + "lastName": "Braden", + "firstName": "Darrell T.", + "creatorType": "author" + } + ], + "date": "2014-01-01T00:00:00", + "ISBN": "9781631177309", + "extra": "Citation Key: Braden.2014", + "itemID": "08c4afc4-6416-4b23-8046-dd47c21ccaec", + "numPages": "113", + "place": "New York", + "publisher": "Nova Science Publishers", + "series": "Food Science and Technology", + "attachments": [], + "tags": [ + { + "tag": "Fishery products" + }, + { + "tag": "Food adulteration and inspection" + }, + { + "tag": "Food contamination" + }, + { + "tag": "Government policy" + }, + { + "tag": "Law and legislation" + }, + { + "tag": "Marketing" + }, + { + "tag": "Prevention" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "videoRecording", + "title": "Sweeney Todd: The demon barber of Fleet Street", + "creators": [ + { + "lastName": "Burton", + "firstName": "Tim", + "creatorType": "author" + }, + { + "lastName": "Depp", + "firstName": "Johnny", + "creatorType": "contributor" + }, + { + "lastName": "Carter", + "firstName": "Helena Bonham", + "creatorType": "contributor" + }, + { + "lastName": "Rickman", + "firstName": "Alan", + "creatorType": "contributor" + }, + { + "lastName": "Spall", + "firstName": "Timothy", + "creatorType": "contributor" + }, + { + "lastName": "Cohen", + "firstName": "Sacha Baron", + "creatorType": "contributor" + }, + { + "lastName": "Bower", + "firstName": "Jamie Campbell", + "creatorType": "contributor" + }, + { + "lastName": "Kelly", + "firstName": "Laura Michelle", + "creatorType": "contributor" + }, + { + "lastName": "Wisener", + "firstName": "Jayne", + "creatorType": "contributor" + } + ], + "date": "2013-01-01T00:00:00", + "ISBN": "9786314961534", + "abstractNote": "Reinventing himself as Sweeney Todd, a man unjustly sent to prison returns to exact revenge on those who ruined his life, especially the evil Judge Turpin who sent the man to prison. Not only does he seek revenge for the cruel punishment he suffered in prison, but also for what happened to his wife and daughter. When he returns to his home town, he reopens his barber shop, where Mr. Todd becomes the Demon of Fleet Street. Mrs. Lovett is Sweeney's amorous accomplice who creates diabolical meat pies out of the remains of Mr. Todd's victims.", + "extra": "Citation Key: Burton.2013", + "itemID": "60accf57-c086-423f-9068-7c1afdc2de1d", + "place": "Burbank, CA", + "studio": "Warner Home Video", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Todd, Sweeney (legendary character)" + } + ], + "notes": [ + { + "note": "Logan, John, (screenwriter.)\nMacDonald, Laurie, (producer.)\nParkes, Walter F., (producer.)\nZanuck, Richard D., (producer.)\nBurton, Tim, (director.)\nDepp, Johnny, (actor.)\nBonham Carter, Helena, (actor.)\nRickman, Alan, (actor.)\nSpall, Timothy, (actor.)\nBaron Cohen, Sacha, (actor.)\nWisener, Jayne, (actor.)\nBower, Jamie Campbell, (actor.)\nKelly, Laura Michelle, (actor.)\nSanders, Ed, (actor.)\nHead, Anthony Stewart, (actor.)\nBowles, Peter, (actor.)\nSondheim, Stephen, (composer.)\nWheeler, Hugh, (composer.)\nBond, C. G (adapter.)", + "tags": [ + "#Notes" + ] + }, + { + "id": "3e94bc22-d904-4d6f-8825-ad87fc1f980f", + "note": "

Sweeney Todd = fictional work with food fraud in the plot

\n

I wonder if there's any way to work this into the paper? Perhaps in the introduction?

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "patent", + "title": "Method for identifying a pork content in a food", + "creators": [ + { + "lastName": "Che Man", + "firstName": "Yaakob Bin", + "creatorType": "author" + }, + { + "lastName": "Mustafa", + "firstName": "Shuhaimi", + "creatorType": "author" + }, + { + "lastName": "Khalid", + "firstName": "Farihah Liyana", + "creatorType": "author" + }, + { + "lastName": "Azmi", + "firstName": "Aida Azrina", + "creatorType": "author" + }, + { + "lastName": "Sazili", + "firstName": "Awis Qurni", + "creatorType": "author" + }, + { + "lastName": "Rahim", + "firstName": "Raha Abdul", + "creatorType": "author" + } + ], + "issueDate": "2010-01-01T00:00:00", + "extra": "Citation Key: CheMan.2010", + "itemID": "2485a5d8-95f5-437f-8911-05111eb7e25e", + "url": "https://www.google.com/patents/US20100216136", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Fake meat scandals add to Chinese food fears", + "creators": [ + { + "lastName": "Dai", + "firstName": "Cong", + "creatorType": "author" + }, + { + "lastName": "Jiang", + "firstName": "Min", + "creatorType": "author" + } + ], + "date": "2013-01-01T00:00:00", + "DOI": "10.1136/bmj.f3385", + "ISSN": "0959-535X", + "extra": "PMID: 23716434\nCitation Key: Dai.2013", + "itemID": "490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38", + "journalAbbreviation": "BMJ", + "pages": "3385", + "publicationTitle": "British Medical Journal", + "volume": "346", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "China" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + }, + { + "tag": "Humans" + }, + { + "tag": "Meat" + } + ], + "notes": [ + { + "id": "f5429955-7a99-4225-ba19-0344b7e896b7", + "note": "

Situation in China

\n

“Meat smuggling and food adulteration are rampant in China. In these cases, the suspects are accused of using gelatin, red pigment, and nitrates to alter the dead pigs, ducks, and rats. Chinese food production is now on a larger scale and more technological, and sophisticated technology is being used to beat regulators and cheat customers. Tainted meats are an ongoing problem.”

\n3385" + } + ], + "seeAlso": [] + }, + { + "itemType": "interview", + "title": "Fighting food fraud in 2017", + "creators": [ + { + "lastName": "Manuell", + "firstName": "Roy", + "creatorType": "author" + }, + { + "lastName": "Daly", + "firstName": "Eoghan", + "creatorType": "contributor" + } + ], + "date": "2017-04-11T00:00:00", + "abstractNote": "In anticipation of Food Fraud 2017, New Food speaks exclusively to Eoghan Daly of Crowe Clark Whitehill about tackling food fraud in the 21st Century.", + "extra": "Citation Key: Daly.20170411", + "itemID": "27dd2250-00b8-4587-8456-c68d0ca5af8a", + "url": "https://www.newfoodmagazine.com/news/36807/food-fraud-2017-eoghan-daly/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "It’s a jungle out there - the strange animals of economic organization in agri-food value chains", + "creators": [ + { + "lastName": "Dries", + "firstName": "Liesbeth K. E.", + "creatorType": "editor" + }, + { + "lastName": "Karantininis", + "firstName": "Konstantinos", + "creatorType": "editor" + }, + { + "lastName": "Martino", + "firstName": "Gaetano", + "creatorType": "editor" + }, + { + "lastName": "Codron", + "firstName": "Jean Marie", + "creatorType": "editor" + }, + { + "lastName": "Pascucci", + "firstName": "Stefano", + "creatorType": "editor" + } + ], + "date": "[In press]", + "ISBN": "9789086863013", + "extra": "Citation Key: Dries.Inpress", + "itemID": "e245ae31-ac6d-42fa-aca4-3435cb4bf378", + "place": "Wageningen", + "publisher": "Wageningen Academic Publishers", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Food Fraud Network activity report 2015", + "creators": [ + { + "lastName": "European Commission Food Fraud Network", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2013-05-26T00:00:00", + "extra": "Citation Key: EuropeanCommissionFoodFraudNetwork.20130526", + "itemID": "f8870bd1-4f3f-4b48-b29b-a7cf3d461475", + "url": "https://ec.europa.eu/food/sites/food/files/safety/docs/official-controls_food-fraud_network-activity-report_2015.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "note": "Not very useful for my project, since the statistics only consider cross-border cases and not incidents entirely within one country.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "55cd0676-3d1d-4f38-b63f-6cbc66e768a1", + "note": "

The 2013 horsemeat scandal --> Europe-wide process for information exchange related to food fraud.

\n

“In the wake of the horsemeat scandal of 2013, a pan-European mechanism to ensure the rapid exchange of information between national authorities and the Commission in cases of suspected fraudulent practices was set up.”

\n1" + }, + { + "id": "de69f6c2-af03-47f9-aab9-713e08fc183b", + "note": "

2015 statistics - European Food Fraud Network

\n

“In 2015, 108 cases were exchanged by the Food Fraud Network.”

\n2" + }, + { + "id": "1fc2daa1-fc4f-4de9-847d-dea10a10a79e", + "note": "

Types of violations

\n

“...alleged violations were mostly related to labelling noncompliance (notably with regard to ingredients mislabelling), suspicion of illegal exports, and prohibited treatments and/or processes applied to a certain foodstuff (e.g. addition of synthetic glycerol to wine).”

\n2" + }, + { + "id": "593ac1d4-baaa-4a4b-a951-635c2cda0f17", + "note": "

Illegal exports and exchanges on fish products most common incidents (2015 Food Fraud Network)

\n

“The majority of exchanges that took place in the Network in 2015 concerned suspicion of illegal exports, followed by exchanges on fish and fish products. Importantly, however, statistical conclusions related to potential \"food fraud\" cases in Europe cannot be drawn from these data given that Member States may also exchange information outside of the FFN and that cases which do not have a cross-border dimension, i.e. which occur at purely national level, are not exchanged via the Network.”

\n2" + } + ], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "EUR 230 million worth of fake food and beverages seized in global OPSON operation targeting food fraud", + "creators": [ + { + "lastName": "Europol", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2017-04-25T00:00:00", + "abstractNote": "Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.", + "extra": "Citation Key: Europol.20170425", + "itemID": "6d2b6a75-5e45-4e60-bf35-b700d3de8b3d", + "place": "The Hague", + "url": "https://www.europol.europa.eu/newsroom/news/eur-230-million-worth-of-fake-food-and-beverages-seized-in-global-opson-operation-targeting-food-fraud", + "attachments": [ + { + "path": "Europol 4 25 2017 - EUR 230 million worth.pdf", + "title": "Full Text" + }, + { + "title": "Online" + } + ], + "tags": [], + "notes": [ + { + "id": "e1773aeb-d73d-4793-957c-a0ed87c04720", + "note": "

Results of recent 61-country operation to check for food fraud (12/1/2016 - 03/31/2017)

\n

“Operation OPSON VI, the joint Europol-INTERPOL operation targeting counterfeit and substandard food and drink, as well as the organised crime networks behind this illicit trade, has resulted in the seizure of 9 800 tonnes, over 26.4 million litres, and 13 million units/items worth an estimated EUR 230 million of potentially harmful food and beverages ranging from every day products such as alcohol, mineral water, seasoning cubes, seafood and olive oil, to luxury goods such as caviar.”

\n" + }, + { + "id": "ce68b450-438e-4c2c-9a21-9a1671985cb4", + "note": "

Summary of number and location of checks

\n

“More than 50 000 checks were carried out at shops, markets, airports, seaports and industrial estates.”

\n" + }, + { + "id": "36ca71e4-b319-448c-83da-b6fbbc7c8e43", + "note": "

Quote from Françoise Dorcier, Coordinator of INTERPOL’s Illicit Goods and Global Health Programme

\n

“This operation has once again shown that criminals will fake any type of food and drink with no thought to the human cost as long as they make a profit. Whilst thousands of counterfeit goods have been taken out of circulation, we continue to encourage the public to remain vigilant about the products they buy.”

\n" + }, + { + "id": "293ec858-03d9-4cbe-9826-8689dcdb9d5a", + "note": "

Findings in Europe

\n

Violations were related to food safety concerns and smuggling but also counterfeiting and food fraud. One example is the labeling of hazelnuts that were checked in Germany and determined to be other types of nuts. In Italy mineral water was determined to be fraudulent and unsafe. In Italy red wine was also found to be fraudulent and adulterated with additional alcohol. In Denmark olive oil was found to be fraudulent.

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Sorting the beef from the bull: The science of food fraud forensics", + "creators": [ + { + "lastName": "Evershed", + "firstName": "Richard", + "creatorType": "author" + }, + { + "lastName": "Temple", + "firstName": "Nicola", + "creatorType": "author" + }, + { + "lastName": "Judd", + "firstName": "Thomas", + "creatorType": "contributor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "1522614370", + "extra": "Citation Key: Evershed.2016", + "itemID": "de7347ad-5e9f-45cd-9b8e-5e91b02465b4", + "publisher": "Audible Studios for Bloomsbury", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + }, + { + "tag": "Screening" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "thesis", + "title": "Economically motivated adulteration: Implications for food protection and alternate approaches to detection", + "creators": [ + { + "lastName": "Everstine", + "firstName": "Karen", + "creatorType": "author" + }, + { + "lastName": "Hedberg", + "firstName": "Craig", + "creatorType": "contributor" + }, + { + "lastName": "University of Minnesota", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2013-05-01T00:00:00", + "abstractNote": "The food supply system is vulnerable to various types of contamination and adulteration. This research focuses on economically motivated adulteration (often called \"food fraud\"). Economically motivated adulteration (EMA) refers to the knowingly selling a food product that is not up to standards in order to gain economic advantage. There is a long history of EMA in a wide variety of food products. The food safety paradigm is not sufficient for food defense, or for prevention and deterrence of EMA. The goal of this research was to develop methods to improve capabilities for preventing and detecting EMA incidents. First, the food ingredient monographs in the United States Pharmacopeial (USP) Convention Food Chemicals Codex (FCC) were evaluated for susceptibility to EMA. These evaluations can be used to help target the most susceptible ingredients for monograph modernization within USP, and for inspection and laboratory testing resources by regulatory agencies. Second, economic and production data for dairy products in China leading up to the melamine adulteration event was analyzed to evaluate the utility of this data for alerting to the potential for EMA in a food commodity. This analysis shed insight on variables that may be useful for tracking the production of global commodities for early indications of EMA. Finally, a surveillance technique for trade data was evaluated using melamine adulteration of wheat gluten as a case study. This biosurveillance-like methodology can be applied to food import data to identify supply chain shifts that could indicate changes in the market for food products and a heightened risk of EMA. Regulatory agencies have an enormous burden of responsibility for regulating the food supply for both domestically-produced and imported food products. Given the constrained resources of these agencies, they need improved methods for targeting those resources towards the riskiest food products. These preliminary efforts to shed light on EMA vulnerabilities and potential mitigation efforts can contribute to efforts in that area. An integrated, systems-based approach to food protection that encompasses both food safety and food defense is imperative for ensuring the integrity of our food supply.", + "extra": "Citation Key: Everstine.May2013", + "itemID": "43ecc385-004b-4af0-b1cb-2d14c240e032", + "place": "Minneapolis, Minnesota", + "url": "http://hdl.handle.net/11299/153189", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Adulteration" + }, + { + "tag": "Food defense" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "International trade and food security: Exploring collective food security in Asia", + "creators": [ + { + "lastName": "Ewing-Chow", + "firstName": "Michael", + "creatorType": "editor" + }, + { + "lastName": "Slade", + "firstName": "Melanie Vilarasau", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "9781785361890", + "callNumber": "HMNTS YK.2017.a.1845", + "extra": "Citation Key: EwingChow.2016", + "itemID": "7d6705ad-48de-4613-b9f9-94a06f701cb4", + "libraryCatalog": "British Library", + "place": "Cheltenham", + "publisher": "Edward Elgar Publishing", + "series": "NUS Centre for International Law series", + "attachments": [], + "tags": [ + { + "tag": "Food security" + }, + { + "tag": "International trade" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Vulnerability assessments of food systems: Final summary report, June 2009 – February 2012", + "creators": [ + { + "lastName": "Food and Drug Administration", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2012-08-27T00:00:00", + "extra": "Citation Key: FoodandDrugAdministration.20120827", + "itemID": "3ab6253b-74b7-4701-9431-acfe6df2d2be", + "place": "Silver Spring, Maryland", + "url": "https://www.fda.gov/downloads/Food/FoodDefense/UCM317547.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "note": "Vulnerability Assessments of Food Systems\r\n Table of Contents \r\n I. Executive Summary \r\n II. Background \r\n III. Method Overview \r\n IV. Assessment Results \r\n Commonalities of Critical Process Nodes \r\n Commonalities of Mitigation Strategies a\r\n Commonalities of Identified Research Gap\r\n Commonalities of Identified Threat Indic\r\n V. CARVER + Shock Vulnerability Assessm\r\n VI. Overall Assessment Observations \r\n Assessment Preparation and Conduct \r\n Selection of Threat Agent for CARVER + S\r\n Participant Perspective \r\n International Assessments and Food Defen\r\n Other Observations \r\n VII. Conclusion", + "tags": [ + "#TableOfContents" + ] + }, + { + "note": "Seminal guidelines related to food fraud risk assessment. Originator of CARVER + Shock Vulnterability Assessment Tool, which is discussed in other sources. More of a focus on food defense in terms of an attack, so not entirely relevant to a discussion of food fraud, in which harmful consequences to people were usually unintended by the perpetrators.", + "tags": [ + "#Evaluation" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "statute", + "nameOfAct": "Mitigation strategies to protect food against intentional adulteration. Final rule", + "creators": [ + { + "lastName": "Food and Drug Administration", + "creatorType": "contributor", + "fieldMode": true + } + ], + "dateEnacted": "2016-05-27T00:00:00", + "abstractNote": "The Food and Drug Administration (FDA or we) is issuing this final rule to require domestic and foreign food facilities that are required to register under the Federal Food, Drug, and Cosmetic Act (the FD&C Act) to address hazards that may be introduced with the intention to cause wide scale public health harm. These food facilities are required to conduct a vulnerability assessment to identify significant vulnerabilities and actionable process steps and implement mitigation strategies to significantly minimize or prevent significant vulnerabilities identified at actionable process steps in a food operation. FDA is issuing these requirements as part of our implementation of the FDA Food Safety Modernization Act (FSMA).", + "extra": "PMID: 27236872\nCitation Key: FoodandDrugAdministration.20160527", + "itemID": "436a30e7-3930-4333-8204-e1bae37af76e", + "pages": "34165-223", + "url": "https://www.gpo.gov/fdsys/pkg/FR-2016-05-27/pdf/2016-12373.pdf", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Food industry legislation and jurisprudence" + }, + { + "tag": "Food safety" + }, + { + "tag": "Gray literature" + }, + { + "tag": "Humans" + }, + { + "tag": "Law and legislation" + }, + { + "tag": "Legislation" + }, + { + "tag": "Terrorism prevention and control" + }, + { + "tag": "United States" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "newspaperArticle", + "title": "What is blockchain and how will it impact the food industry?", + "creators": [ + { + "lastName": "Garver", + "firstName": "Krista", + "creatorType": "author" + } + ], + "date": "2017-03-07T00:00:00", + "abstractNote": "The food industry has been abuzz lately about the potential of blockchain to solve the problem of end-to-end traceability in the supply chain.", + "extra": "Citation Key: Garver.20170307", + "itemID": "1810f594-4e9e-47b4-905f-445171ad46c6", + "publicationTitle": "Food Industry Executive", + "url": "http://foodindustryexecutive.com/2017/03/blockchain-will-impact-food-industry/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "GFSI position on mitigating the public health risk of food fraud", + "creators": [ + { + "lastName": "Global Food Safety Initiative", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2014-07-01T00:00:00", + "extra": "Citation Key: GlobalFoodSafetyInitiative.July2014", + "itemID": "6c15fcbf-0980-4849-97de-442e6bfbcdc8", + "url": "http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf", + "attachments": [ + { + "title": "Online" + }, + { + "path": "Némorin 07 2014 - GFSI Position on Mitigating the Public.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "id": "0c63766b-d983-4645-90fe-948b397adc9a", + "note": "

Food fraud definition (GFSI)

\n

“It is deception of consumers using food products, ingredients and packaging for economic gain and includes substitution, unapproved enhancements, misbranding, counterfeiting, stolen goods or others. Unlike food defence, which protects against tampering with intent to harm, the consumers’ health risk of food fraud often occurs through negligence or lack of knowledge on the fraudsters’ part and can be more dangerous than traditional food safety risks because the contaminants are unconventional.”

\n2" + }, + { + "id": "1e7c3c78-9d0b-469d-863a-15b4b3927022", + "note": "

Different topic areas and how they relate intentional and unintentional food fraud

\n2" + }, + { + "id": "47d06d33-b809-4e0d-bd63-693381bcfd70", + "note": "

GFSI's recommendations to food industry to mitigate risk of food fraud

\n

“Secondly, appropriate control measures shall be put in place to reduce the risks from these vulnerabilities. These control measures can include a monitoring strategy, a testing strategy, origin verification, specification management, supplier audits and anti-counterfeit technologies. A clearly documented control plan outlines when, where and how to mitigate fraudulent activities.”

\n3" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Modern analytical methods for the detection of food fraud and adulteration by food category", + "creators": [ + { + "lastName": "Hong", + "firstName": "Eunyoung", + "creatorType": "author" + }, + { + "lastName": "Lee", + "firstName": "Sang Yoo", + "creatorType": "author" + }, + { + "lastName": "Jeong", + "firstName": "Jae Yun", + "creatorType": "author" + }, + { + "lastName": "Park", + "firstName": "Jung Min", + "creatorType": "author" + }, + { + "lastName": "Kim", + "firstName": "Byung Hee", + "creatorType": "author" + }, + { + "lastName": "Kwon", + "firstName": "Kisung", + "creatorType": "author" + }, + { + "lastName": "Chun", + "firstName": "Hyang Sook", + "creatorType": "author" + } + ], + "date": "[In press]", + "DOI": "10.1002/jsfa.8364", + "ISSN": "0022-5142", + "abstractNote": "This review provides current information on the analytical methods used to identify food adulteration in the six most adulterated food categories: animal origin and seafood, oils and fats, beverages, spices and sweet foods (e.g. honey), grain-based food, and others (organic food and dietary supplements). The analytical techniques, both conventional and emerging, used to identify adulteration in these six food categories involve sensory, physicochemical, DNA-based, chromatographic, and spectroscopic methods, and have been combined with chemometrics, making these techniques more convenient and effective for the analysis of a broad variety of food products. Despite recent advances, a need remains for suitably sensitive and widely applicable methodologies that will encompass all the various aspects of food adulteration.", + "extra": "Citation Key: Hong.Inpress", + "itemID": "5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9", + "journalAbbreviation": "J. Sci. Food Agric.", + "publicationTitle": "Journal of the Science of Food and Agriculture", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "Systematic review of over 2,614 publications dealing with food frad published between 1995-2014. This article gives a very good overview of testing methods and the specific ways in which foods are adulterated.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "99c418c4-6caf-420c-95a1-bacd2272b3f9", + "note": "

Definition of food fraud (Hong et al)

\n

“The key characteristics of food fraud are noncompliance with food laws and/or misleading the consumer, intentional fraud, and the purpose of financial gain.”

\n" + }, + { + "id": "e5b8a39a-7be3-4000-b3e6-523ffde0625a", + "note": "

Typical kinds of adulterated foods

\n

“In general, foods and food ingredients commonly associated with food fraud include oil, fish, honey, milk and dairy products, meat products, grain-based foods, fruit juices, wine and alcoholic beverages, organic foods, spices, coffee, tea, and some highly processed foods.”

\n" + }, + { + "id": "c127a352-34d7-4706-b563-ef8542f62f38", + "note": "

Mass spectrometry is the type of testing used for most types of food

\n

“A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses.”

\n" + }, + { + "id": "260fee07-d706-4715-8972-16e260e38b6a", + "note": "

Most common detection method by food category

\n

“Detection methods were ranked according to their number of uses in the literature. MS accounted for the largest proportion at 20.6%; PCR for 18.5%, and LC for 11.6%. MS also accounted for the greatest proportion in Asian countries and South Korea (20.7% and 38.1%, respectively). A notable observation is that MS is used extensively in most food categories, and is also the most frequently used method in the analysis of spices, extracts, cereals, grains, and pulses. However, LC and GC are also used to a significant degree for spices, oils, and organic foods. NMR is used frequently to discriminate the authenticity of oils, cereals, grains, alcoholic beverages and fruit juices. PCR is the predominant detection technology used for the food categories of meat and meat products, fish and seafood, and milk and milk products. In addition to MS, HPLC and LC are often used for fruits, fruit juices, and sweeteners. IR spectroscopy, Raman, immunosorbent assays (e.g., ELISA), and biosensors are used less when compared with the other detection methods.”

\n" + }, + { + "id": "1ba1b273-f3e7-49fc-bbc3-0b016f298e49", + "note": "

Four categories used when authenticating meat

\n

“Authentication problems with respect to meat and meat products are grouped into four major categories: meat species, meat processing treatment (cooked meat, and fresh versus thawed meat), meat geographic origin, and non-meat ingredient addition (additives and water).”

\n" + }, + { + "id": "e17842b4-ccdb-42f8-8da3-ece6d3b5a337", + "note": "

DNA-based techniques most popular for meat authentication testing

\n

“The most common methodologies used to determine the authenticity of meat and meat products are unquestionably DNA-based techniques: real-time PCR, multiplex PCR, and species-specific PCR.”

\n" + }, + { + "id": "c0d8e13e-ca6c-4a82-af14-372cb8929c81", + "note": "

Meat usually adulterated with pork and testing can be an issue to detect if the meat is minced or processed

\n

“A frequent adulteration of meat products is the addition of pork to beef products, which is done for economic gain. Particularly for minced and homogenized meat products, the development of a method to identify species is an important authenticity issue.”

\n" + }, + { + "id": "a3f90c51-7ce7-4b6e-a434-a804f3c014e9", + "note": "

How fish and seafood are typically adulterated

\n

“Forms of fish and seafood fraud include intentionally increasing the product weight and using illegal additives in production. Methods to increase weight include adding excess water to frozen product (overglazing), soaking products such as scallops in sodium tripolyphosphate so that they retain water, and overbreading.”

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Walmart, IBM and Tsinghua University explore the use of blockchain to help bring safer food to dinner tables across China", + "creators": [ + { + "lastName": "Slocum", + "firstName": "Hannah", + "creatorType": "contributor" + }, + { + "lastName": "International Business Machines Corporation", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2016-10-19T00:00:00", + "abstractNote": "As Walmart opened its new Walmart Food Safety Collaboration Center in Beijing today, IBM, Walmart and Tsinghua University announced a collaboration to improve the way food is tracked, transported and sold to consumers across China. By harnessing the power of blockchain technology designed to generate transparency and efficiency in supply chain record-keeping, this work aims to help enhance the safety of food on the tables of Chinese consumers.", + "extra": "Citation Key: InternationalBusinessMachinesCorporation.20161019", + "itemID": "ddf7203d-0229-46d5-badc-e6c35789df3f", + "url": "https://www-03.ibm.com/press/us/en/pressrelease/50816.wss", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Asia" + }, + { + "tag": "Blockchain" + }, + { + "tag": "China" + }, + { + "tag": "Linux Foundation Hyperledger Project" + }, + { + "tag": "Safer food" + }, + { + "tag": "Tsinghua University" + }, + { + "tag": "Walmart Food Safety Collaboration Center" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Food safety management systems – Requirements for any organization in the food chain", + "creators": [ + { + "lastName": "International Organization for Standardization", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2005-09-01T00:00:00", + "extra": "Citation Key: InternationalOrganizationforStandardization.200509", + "institution": "International Organization for Standardization", + "itemID": "14bf1930-bb04-4aaa-90b2-494f7548d8a8", + "place": "Geneva, Switzerland", + "url": "https://www.iso.org/standard/35466.html", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food safety in China: Science, technology, management and regulation", + "creators": [ + { + "lastName": "Jen", + "firstName": "Joseph J.", + "creatorType": "editor" + }, + { + "lastName": "Chen", + "firstName": "Junshi", + "creatorType": "editor" + } + ], + "date": "2017-01-01T00:00:00", + "ISBN": "1119237963", + "extra": "Citation Key: Jen.2017", + "itemID": "2f99e8ce-0e1f-4571-9e89-94bfebc477d3", + "numPages": "696", + "place": "Chichester, West Sussex; Hoboken, New Jersey", + "publisher": "John Wiley & Sons, Inc", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Food adulteration and inspection" + }, + { + "tag": "Food contamination" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "RFID-enabled traceability in the food supply chain", + "creators": [ + { + "lastName": "Kelepouris", + "firstName": "Thomas", + "creatorType": "author" + }, + { + "lastName": "Pramatari", + "firstName": "Katerina", + "creatorType": "author" + }, + { + "lastName": "Doukidis", + "firstName": "Georgios", + "creatorType": "author" + } + ], + "date": "2007-01-01T00:00:00", + "DOI": "10.1108/02635570710723804", + "ISSN": "0263-5577", + "extra": "Citation Key: Kelepouris.2007", + "issue": "2", + "itemID": "4b33d12a-af3c-4821-8907-b9263bb8ee7f", + "journalAbbreviation": "Ind. Manage. Data Syst.", + "pages": "183-200", + "publicationTitle": "Industrial Management & Data Systems", + "volume": "107", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "newspaperArticle", + "title": "Horsemeat scandal: The essential guide", + "creators": [ + { + "lastName": "Lawrence", + "firstName": "Felicity", + "creatorType": "author" + } + ], + "date": "2013-02-15T00:00:00", + "abstractNote": "With the Europewide scandal over the contamination of meat products, from beefburgers to lasagne, showing no sign of abating, study the issue in depth and learn all you need to know about how it came to this with our essential guide", + "extra": "Citation Key: Lawrence.20130215", + "itemID": "647ed0dd-03b8-481f-8882-d6fefa91f4bb", + "publicationTitle": "The Guardian", + "url": "https://www.theguardian.com/uk/2013/feb/15/horsemeat-scandal-the-essential-guide", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Europe" + }, + { + "tag": "Food and drink industry" + }, + { + "tag": "Food safety" + }, + { + "tag": "Horsemeat scandal" + }, + { + "tag": "Ireland" + }, + { + "tag": "Meat" + }, + { + "tag": "Supermarkets" + }, + { + "tag": "The meat industry" + }, + { + "tag": "United Kingdom" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food and supply chain integrity", + "creators": [ + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "extra": "Citation Key: Manning.2016b", + "itemID": "30642deb-def4-40a6-86a2-b9ad1c335df6", + "volume": "119", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Food safety, food fraud, and food defense: A fast evolving literature", + "creators": [ + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "author" + }, + { + "lastName": "Soon", + "firstName": "Jan Mei", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "DOI": "10.1111/1750-3841.13256", + "ISSN": "0022-1147", + "abstractNote": "Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. Successful models of food crime are dependent on how well the crime has been executed and at what point, or even if, detection actually occurs. The aim of this paper is to undertake a literature review and critique the often contradictory definitions that can be found in the literature in order to compare and contrast existing food crime risk assessment tools and their application. Food safety, food defense, and food fraud risk assessments consider different criteria in order to determine the degree of situational risk for each criteria and the measures that need to be implemented to mitigate that risk. Further research is required to support the development of global countermeasures, that are of value in reducing overall risk even when the potential hazards may be largely unknown, and specific countermeasures that can act against unique risks.", + "extra": "PMID: 26934423\nCitation Key: Manning.2016c", + "issue": "4", + "itemID": "27384b10-b549-45fc-80c7-94688793e9fc", + "journalAbbreviation": "J. Food Sci.", + "pages": "823-834", + "publicationTitle": "Journal of food science", + "volume": "81", + "attachments": [ + { + "path": "Manning, Soon 2016 - Food Safety.pdf", + "title": "Full Text" + }, + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Crime" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + }, + { + "tag": "Humans" + }, + { + "tag": "Risk Assessment" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "A good overview of the current definitions in the fields of food safety, food fraud, and food defense. Nice starting point for identifying seminal literature, especially as far as definitions are concerned.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "7c83d4dc-5ba0-47bf-94e0-d4c6e17623d8", + "note": "823" + }, + { + "id": "e313259e-0e47-45ee-b1ea-e989600b2337", + "note": "823" + }, + { + "id": "54ef1ad1-1da6-4aa7-9ce0-086ea6dfddc1", + "note": "823" + }, + { + "id": "87e8f5d2-a67a-47ae-b248-4306c14a896e", + "note": "823" + }, + { + "id": "89d3ec59-4084-41b9-8f5f-bcce18958b19", + "note": "823" + }, + { + "id": "c052069b-3b7c-4670-ba3a-92dffa80444f", + "note": "824" + }, + { + "id": "2aa0e8c5-f8e0-4014-afab-0f177b641c08", + "note": "824" + }, + { + "id": "ed928d6e-2210-4afa-943d-64a1217c91ae", + "note": "824" + }, + { + "id": "b7de7023-c42b-4ae7-a599-1666e2114450", + "note": "825" + }, + { + "id": "55f377a9-9873-41c0-838b-6e4dc06951a5", + "note": "825" + }, + { + "id": "ff3ede9f-2eab-4c19-adce-86b7b7e04452", + "note": "825" + }, + { + "id": "8d5da324-3c30-471a-adce-980019eac8a6", + "note": "826" + }, + { + "id": "6ab5bc1c-e84d-4e4c-8054-31172f4e3201", + "note": "826" + }, + { + "id": "b86d59cb-a694-4d59-9f02-b299eb0312c8", + "note": "829" + }, + { + "id": "98e2bac1-34f6-4d92-b074-de419ac025f5", + "note": "829" + }, + { + "id": "2ad8bf1a-09a9-4933-b7f8-32690259a92c", + "note": "830" + }, + { + "id": "7ce78538-e43d-4858-a32c-540336fb6f9c", + "note": "830" + }, + { + "id": "44e0edcc-e565-4b61-8b9d-26b3565966f1", + "note": "830" + }, + { + "id": "224a4d7c-a724-404b-b103-fe0a7a0fd809", + "note": "833" + }, + { + "id": "f51525ff-0d72-4eb0-b269-bac6369e0daf", + "note": "833" + }, + { + "id": "aac727ea-d999-4fdb-87f3-ad508e7629ec", + "note": "833" + }, + { + "id": "efdf0c51-bb4f-4b99-866f-579f70f3a9b2", + "note": "833" + }, + { + "id": "7833781a-0d1a-4ad8-869d-da7f167aaf33", + "note": "833" + }, + { + "id": "fb94fa2f-ceb6-4454-8212-9ec3aaa1a6d7", + "note": "833" + }, + { + "id": "d6aaba2e-1f43-4318-9964-b6c73e08e3a7", + "note": "

Terminological difficulties - contamination vs. adulteration

\n

Sometimes in U.S. literature \"contamination\" = unintentional, while \"adulteration\" = intentional

\n823" + }, + { + "id": "5864463d-f6e2-4c11-9afd-cc501af9cacb", + "note": "

Concept of food safety is changing

\n

Unintentional and intentional contamination used to be considered together, now they are often looked at separately.

\n823" + }, + { + "id": "f985362b-a982-49d4-a540-b6a9c8d7058c", + "note": "

High demand and low supply can create the conditions for food fraud

\n

“The potential for food crime is often influenced by a difference between availability and demand, creating an opportunity for criminals or fraudsters to financially benefit from the shortfall.”

\n823" + }, + { + "id": "8ca9e2d6-5f1b-4f92-9813-0e014cd8ba77", + "note": "

Definition of food crime (Manning & Soon)

\n

“...food crime occurs when food is intentionally modified in order to bring harm to individuals or for purposes of economic gain and both situations may lead to issues of food safety or food quality.”

\n824" + }, + { + "id": "8d60267b-eb59-44e6-b59e-caadaf75e906", + "note": "

Example of food crime through intentional neglect

\n

See PDF

\n824" + }, + { + "id": "e728e158-8b56-48d0-88ab-da1926c92c69", + "note": "

Definition of food defense (Manning & Soon)

\n

“Therefore, food defense has been said to reflect the protection activities, and/or the security assurance process or procedures that deliver product safety with regard to intentional acts of adulteration.”

\n824" + }, + { + "id": "aaaecd43-edc1-4db7-a49f-89e5823de7a1", + "note": "

Types of food crime

\n825" + }, + { + "id": "44c817de-9ee2-45c5-8ea3-3f776b023b48", + "note": "

Definition of crime vulnerability

\n

“Crime vulnerability can be defined as the extent to which an individual, organization, supply chain or national food system is at risk from, or susceptible to, attack, emotional injury or physical harm, or damage from an intentional act.”

\n825" + }, + { + "id": "a2c5b4b0-cdff-471f-b8d4-dc499012dc6a", + "note": "

Drivers behind food crime and food defense

\n826" + }, + { + "id": "d1b41410-9c55-44f9-87d8-7f442a196551", + "note": "

There needs to be a better understanding of what motivates food criminals

\n

“Food defense needs to consider the perpetrator, the relevance of impact, and their motivation to cause harm. Food fraud is driven by singular motivation, that is, the desire for gain, and in order to implement appropriate countermeasures, the motivational element of food fraud needs to be fully understood.”

\n827–828" + }, + { + "id": "8e5837b9-2958-42e5-954b-8c3bd1c08ec1", + "note": "

Intentional and unintentional adulteration

\n828" + }, + { + "id": "e1b7152f-30d5-4886-8a4a-4a647c580fb7", + "note": "

Differences between GFSI (2014) and FSIS (2014) and FAO (2003)

\n

See PDF

\n829" + }, + { + "id": "df067b95-5685-4a74-88ec-6aac3bf7e58f", + "note": "

Both scientific and social scientific criteria needed for risk assessment

\n830" + }, + { + "id": "89e1a961-14e1-43b1-baa9-84b685ad3244", + "note": "

Plurality of food crime makes it difficult to define which in turn makes it difficult to create policies to fight it

\n

“Intentional food crime is plural in nature in terms of the types of crime and the differing levels of financial gain. This can also be said in terms of the multiplicity of definitions of food safety, food defense, food fraud, and food quality found in both academic and gray literature. This plurality creates confusion and multiple interpretations when FCRA is adopted and implemented.”

\n833" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "In the interest of food safety: A qualitative study investigating communication and trust between food regulators and food industry in the UK, Australia and New Zealand", + "creators": [ + { + "lastName": "Meyer", + "firstName": "Samantha B.", + "creatorType": "author" + }, + { + "lastName": "Wilson", + "firstName": "Annabelle Mary", + "creatorType": "author" + }, + { + "lastName": "Calnan", + "firstName": "Michael", + "creatorType": "author" + }, + { + "lastName": "Henderson", + "firstName": "Julie", + "creatorType": "author" + }, + { + "lastName": "Coveney", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "McCullum", + "firstName": "Dean", + "creatorType": "author" + }, + { + "lastName": "Pearce", + "firstName": "Alex R.", + "creatorType": "author" + }, + { + "lastName": "Ward", + "firstName": "Paul", + "creatorType": "author" + }, + { + "lastName": "Webb", + "firstName": "Trevor", + "creatorType": "author" + } + ], + "date": "2017-01-01T00:00:00", + "DOI": "10.1186/s12889-017-4118-x", + "ISSN": "1471-2458", + "abstractNote": "BACKGROUND: Food regulatory bodies play an important role in public health, and in reducing the costs of food borne illness that are absorbed by both industry and government. Regulation in the food industry involves a relationship between regulators and members of the industry, and it is imperative that these relationships are built on trust. Research has shown in a variety of contexts that businesses find the most success when there are high levels of trust between them and their key stakeholders. An evidence-based understanding of the barriers to communication and trust is imperative if we are to put forward recommendations for facilitating the (re)building of trusting and communicative relationships. METHODS: We present data from 72 interviews with regulators and industry representatives regarding their trust in and communication with one another. Interviews were conducted in the UK, New Zealand, and Australia in 2013. RESULTS: Data identify a variety of factors that shape the dynamic and complex relationships between regulators and industry, as well as barriers to communication and trust between the two parties. Novel in our approach is our emphasis on identifying solutions to these barriers from the voices of industry and regulators. CONCLUSIONS: We provide recommendations (e.g., development of industry advisory boards) to facilitate the (re)building of trusting and communicative relationships between the two parties.", + "extra": "PMID: 28193265\nCitation Key: Meyer.2017", + "itemID": "bc5000cc-1af0-4d23-837f-422c907de172", + "journalAbbreviation": "BMC Public Health", + "pages": "1-13", + "publicationTitle": "BMC Public Health", + "volume": "17", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "newspaperArticle", + "title": "Alibaba to use blockchain to fight China’s fake food", + "creators": [ + { + "lastName": "Millward", + "firstName": "Steven", + "creatorType": "author" + } + ], + "date": "2017-03-24T00:00:00", + "abstractNote": "Fake soy sauce, fake rice, fake eggs – those are all actual and potentially deadly items found in China. The tech behind Bitcoin could help everyone avoid the problem.", + "extra": "Citation Key: Millward.20170324", + "itemID": "7d50376a-ef59-4b6a-804f-79e6880ebd42", + "publicationTitle": "Tech in Asia", + "url": "https://www.techinasia.com/alibaba-fake-food-detection-blockchain", + "attachments": [ + { + "path": "Millward 3 24 2017 - Alibaba to use blockchain.pdf", + "title": "Full Text" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Asia" + }, + { + "tag": "Jakarta" + }, + { + "tag": "Singapore" + }, + { + "tag": "Tokyo" + } + ], + "notes": [ + { + "id": "8707e530-90fe-49ba-b221-7924b890c876", + "note": "

Fake egg found on sale in China in 2012

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Recent advances on determination of milk adulterants", + "creators": [ + { + "lastName": "Nascimento", + "firstName": "Carina de Fátima", + "creatorType": "author" + }, + { + "lastName": "Santos", + "firstName": "Poliana Macedo dos", + "creatorType": "author" + }, + { + "lastName": "Pereira-Filho", + "firstName": "Edenir Rodrigues", + "creatorType": "author" + }, + { + "lastName": "Rocha", + "firstName": "Fábio Rodrigo Piovezani", + "creatorType": "author" + } + ], + "date": "2017-01-01T00:00:00", + "ISSN": "0308-8146", + "abstractNote": "Milk adulteration is a current fraudulent practice to mask the quality parameters (e.g. protein and fat content) and increase the product shelf life. Milk adulteration includes addition of toxic substances, such as formaldehyde, hydrogen peroxide, hypochlorite, dichromate, salicylic acid, melamine, and urea. In order to assure the food safety and avoid health risks to consumers, novel analytical procedures have been proposed for detection of these adulterants. The innovations encompass sample pretreatment and improved detection and data processing, including chemometric tools. This review focuses on critical evaluation of analytical approaches for assay of milk adulteration, with emphasis on applications published after 2010. Alternatives for fast, environmentally friendly and in-situ detection of milk adulterants are highlighted.", + "extra": "PMID: 27979084\nCitation Key: Nascimento.2017", + "itemID": "f16b35ce-1d93-423c-909a-61d0d5f693f8", + "journalAbbreviation": "Food Chem.", + "pages": "1232-1244", + "publicationTitle": "Food chemistry", + "volume": "221", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "report", + "title": "Food Fraud: Economically-motivated adulteration", + "creators": [ + { + "lastName": "Nestec Ltd.", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2016-01-01T00:00:00", + "extra": "Citation Key: NestecLtd..2016", + "itemID": "0ef4b577-f9c6-43b5-abfa-5d05ba8664a1", + "place": "Vevey, Switzerland", + "url": "http://www.nestle.com/asset-library/documents/library/documents/suppliers/food-fraud-prevention.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Gray literature" + } + ], + "notes": [ + { + "note": "An example of an industry-created guide for preventing food fraud.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "ae0faadc-51ef-4d95-9f4c-5826b39a10df", + "note": "

Most often food fraud is not likely to cause health problems, but it does lead to lower quality food

\n

“The common factor in many cases of food fraud, is that the adulterant is neither a food safety hazard, nor readily identified (as this would defeat the aim of the fraudster). Common adulterants include water and sugar, or ingredients that may be legitimately used and declared, but whose improper use constitutes fraud. Food fraud deceives the consumers by providing them with lower quality foodstuff, against their knowledge and will.”

\n4" + }, + { + "id": "e4ed0f18-4972-43a6-bd1b-ea7e963cd7e6", + "note": "

Steps for prevention

\n

“A general approach to prevent food fraud can be summarised as follows: \r\n• Conduct vulnerability assessment, including: \r\n– Know your materials and risks (history, economic factors, geographical origins, physical state, emerging issues); \r\n– Know your suppliers (manufacturer, broker, history);\r\n – Know your supply chain (length, complexity, supply & demand arrangements, ease of access);\r\n – Know your existing control measures. \r\n• Design mitigation strategy and implement mitigation measures. \r\n• Validate and verify mitigation measures, continually review food fraud management system.”

\n6" + }, + { + "id": "3b1f0ca4-aed9-41ad-a41e-8f84170f11d8", + "note": "

Factors that can contribute to fraud

\n

“Factors such as the demand for a specific ingredient (volume), the extent of its use (ingredient used in several products and businesses), or the market price fluctuation may contribute to an increased level of vulnerability to fraud.”

\n6" + }, + { + "id": "4a0f720f-8088-4031-b20d-cee01582c736", + "note": "

Increases in prices for an ingredient and rarity are good conditions for fraud

\n

“Any anomaly in the economics of particular raw material sources is an indicator of the raw material potential vulnerability. Drastic increases in market price and scarce supplies of a raw material (e.g. poor harvest following bad weather, or caused by a new parasite) are good indicators of increased raw material vulnerability based on economic anomalies.”

\n8" + }, + { + "id": "8085fdea-c5a2-42f2-8897-02d1b05fb1be", + "note": "

Geopolitical considerations

\n

“Geopolitical considerations are also important to characterise vulnerability to food fraud. A country-specific low price compared with the rest of the market may indicate a lack of food control and/or regulatory/enforcement framework in the country of origin (or any other country through which the ingredient may transit).”

\n8" + }, + { + "id": "dc6bedab-3788-4e88-9694-91308f59c51d", + "note": "

Vulnerability factors vs. control measures

\n8" + }, + { + "id": "d9308c32-983b-417d-98b9-ed59283dc5c9", + "note": "

What's needed to judge food fraud risk

\n

“In summary, assessing the risk of fraud for a food ingredient requires the understanding of the inherent raw material vulnerabilities, the business vulnerabilities, and the existing controls in place.”

\n9" + }, + { + "id": "3c7564b6-5670-4dbe-be61-0f71c7a732da", + "note": "

Two types of raw material monitoring

\n

“Raw material monitoring should be performed using appropriate analytical methods for the verification of authenticity. The methods must be selective, specific, and of appropriate sensitivity to verify that the food authenticity process is efficient. There are 2 approaches:\r\n • Targeted analyses (linked to parameters specified in raw material specifications);\r\n • Untargeted techniques (fingerprinting) that assess the raw material integrity against adulteration.”

\n10" + }, + { + "id": "e8789c0d-bcc7-426c-bc79-4ae45fe123be", + "note": "

Businesses should use suppliers they can trust and who will share processes with them

\n

“Confidence is increased with a supplier’s readiness to share information on their supply chain and processes. This is why the development of trusted suppliers (rather than continuous rotation) is important in mitigating the risk of food fraud. The closer the relationship, the lower the risk.”

\n11" + }, + { + "id": "d41db08f-6c2e-4724-899d-f5934846a3b2", + "note": "

Auditing examples

\n

“More targeted examination may be carried out by auditors during audits at a specific raw material production/handling site. For example on a meat production site – auditors may detect the presence of unapproved flavours, dyes or preservatives in the production and/or storage areas. On a poultry production site – auditors may look for the presence of equipment used to inject brine.”

\n14" + }, + { + "id": "b64ad7df-383b-4606-b5f9-4725c6056945", + "note": "

Definition of EMA (economically-motivated adulteration)

\n

“EMA is the intentional sale of substandard food products or ingredients for the purpose of economic gain. Common types of EMA include substitution or dilution of an authentic ingredient with a cheaper product (such as replacing extra virgin olive oil with a cheaper oil), flavour or colour enhancement using illicit or unapproved substances (such as unapproved dyes), and substitution of one species with another (such as fish species fraud).”

\n16" + }, + { + "id": "8756bc78-f317-444a-b13c-7a3a35207b67", + "note": "

Recommendations for consumers for avoiding food fraud

\n

“Whole, unprocessed foods (such as unground coffee and spices, or whole fruits instead of juice) are more difficult to adulterate, therefore buying these foods may offer some reassurance with regards to fraud. As for processed foods, it is a good idea to buy from reputable sources and brands that have a vested interest in protecting their reputation.”

\n18" + } + ], + "seeAlso": [] + }, + { + "itemType": "map", + "title": "Global seafood fraud", + "creators": [ + { + "lastName": "Oceana", + "creatorType": "author", + "fieldMode": true + } + ], + "date": "2016-01-01T00:00:00", + "abstractNote": "Seafood is a global commodity traded all over the world, following a long, complex and non-transparent supply chain. It also serves as an important source of protein for millions of people every day. However, seafood fraud and species substitutions occur regularly, cheating consumers out of what they ordered and putting public health and the oceans at risk. In addition, seafood fraud allows illegally caught fish to be laundered into the legal seafood trade.", + "extra": "Citation Key: Oceana.2016", + "itemID": "e365933e-9b5b-4bb1-ae02-326f41d2833a", + "url": "https://www.google.com/maps/d/embed?mid=1WX1NecAhINcVsPyLVYuh1hkY7DU", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [ + { + "note": "This interactive map shows worldwide cases of seafood fraud and includes citations for each incident.", + "tags": [ + "#Evaluation" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Compositional signatures of conventional, free range, and organic pork meat using fingerprint techniques", + "creators": [ + { + "lastName": "Oliveira", + "firstName": "Gislene Batista de", + "creatorType": "author" + }, + { + "lastName": "Alewijn", + "firstName": "Martin", + "creatorType": "author" + }, + { + "lastName": "Boerrigter-Eenling", + "firstName": "Rita", + "creatorType": "author" + }, + { + "lastName": "van Ruth", + "firstName": "Saskia M.", + "creatorType": "author" + } + ], + "date": "2015-01-01T00:00:00", + "ISSN": "2304-8158", + "abstractNote": "Consumers' interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester-FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry-ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry-PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.", + "extra": "PMID: 28231211\nCitation Key: Oliveira.2015", + "issue": "3", + "itemID": "d0abc9c9-e230-4a30-ac87-7847e7fa0789", + "pages": "359-375", + "publicationTitle": "Foods", + "volume": "4", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Real food fake food: Why you don't know what you're eating & what you can do about it", + "creators": [ + { + "lastName": "Olmsted", + "firstName": "Larry", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "9781616204211", + "abstractNote": "[Description from publisher - J.S.]\r\nYou've seen the headlines: Parmesan cheese made from sawdust. Lobster rolls containing no lobster at all. Extra virgin olive oil that isn't. Fake foods are in our supermarkets, our restaurants, and our kitchen cabinets. Award-winning food journalist and travel writer Larry Olmsted exposes the pervasive and dangerous fraud perpetrated on unsuspecting Americans. Real Food/Fake Food brings readers into the unregulated food industry, revealing the alarming truth: What we think we're eating is not what we're really eating. Olmsted examines how this shocking deception extends from high-end foods like olive oil, wine, and Kobe beef to everyday staples such as coffee, honey, juice, and cheese. It's a massive bait and switch where counterfeiting is rampant and where the consumer ultimately pays the price. But Olmstead does more than show us what foods to avoid. A bona fide gourmand, he travels to the sources of the real stuff, to help us recognize what to look for, eat, and enjoy. Genuine Parmigiano-Reggiano from Italy, fresh-caught grouper from Florida, authentic port from Portugal. Real foods that are grown, raised, produced, and prepared with care by masters of their craft. Part cautionary tale, part culinary crusade, Real Food/Fake Food is addictively readable, mouth-wateringly enjoyable, and utterly relevant. Larry Olmsted convinces us why real food matters", + "extra": "Citation Key: Olmsted.2016", + "itemID": "24cba909-5cee-4d53-ae8c-95938ad33f89", + "numPages": "318", + "place": "Chapel Hill, North Carolina", + "publisher": "Algonquin Books of Chapel Hill", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Artificial foods" + }, + { + "tag": "Consumer education" + }, + { + "tag": "Food additives" + }, + { + "tag": "Food substitutes" + }, + { + "tag": "Fraud" + }, + { + "tag": "Nutrition" + }, + { + "tag": "Popular sources" + }, + { + "tag": "Quality" + } + ], + "notes": [ + { + "note": "Real food, perfected : a day in the life of Parma\r\nWhat is fake food?\r\nFishy fish\r\nSpoiled oils : olive and \"truffle\"\r\nWhat's in a name? : real foods come from real places\r\nQ:Where's the Kobe beef? A:not on your plate\r\nChampagne and scotch : the sincerest form of flattery\r\nCheesy cheeses\r\nFine wines and not-so-fine wines\r\nThe other red (and white) meat?\r\nFakes, fakes, and more fakes : what else is there?", + "tags": [ + "#TableOfContents" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Traceability in agriculture and food supply chain: A review of basic concepts, technological implications, and future prospects", + "creators": [ + { + "lastName": "Opara", + "firstName": "Linus Umezuruike", + "creatorType": "author" + } + ], + "date": "2003-01-01T00:00:00", + "ISSN": "1459-0255", + "extra": "Citation Key: Opara.2003", + "itemID": "92976b82-1442-47c0-a23d-dd1a0178ce0c", + "journalAbbreviation": "J. Food Agric. Environ.", + "pages": "101-106", + "publicationTitle": "Journal of Food Agriculture and Environment", + "volume": "1", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Reflections on supply chain research and practice: The proceedings of 20th International Symposium on Logistics (ISL 2015)", + "creators": [ + { + "lastName": "Pawar", + "firstName": "Kulwant S.", + "creatorType": "editor" + }, + { + "lastName": "Rogers", + "firstName": "Helen", + "creatorType": "editor" + }, + { + "lastName": "Ferrari", + "firstName": "Emilio", + "creatorType": "editor" + }, + { + "lastName": "International Symposium on Logistics", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2015-01-01T00:00:00", + "ISBN": "9780853583080", + "extra": "Citation Key: Pawar.2015", + "itemID": "0293a42d-151c-4ca2-9091-4e1dd5400666", + "place": "Nottingham", + "publisher": "Centre for Concurrent Enterprise", + "url": "http://www.isl21.org/wp-content/uploads/pdf/ISL_2015_Proceedings.pdf", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "webpage", + "title": "Leveraging blockchain to improve food supply chain traceability", + "creators": [ + { + "lastName": "Ramamurthy", + "firstName": "Shanker", + "creatorType": "author" + }, + { + "lastName": "International Business Machines Corporation", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2016-11-16T00:00:00", + "abstractNote": "Leveraging blockchain for food supply chain tracking and authentication, is critical to finding and helping to address sources of contamination worldwide.", + "extra": "Citation Key: Ramamurthy.20161116", + "itemID": "89c1b839-ce76-43f4-be84-84d394af9179", + "url": "https://www.ibm.com/blogs/blockchain/2016/11/leveraging-blockchain-improve-food-supply-chain-traceability/", + "attachments": [ + { + "title": "Online" + }, + { + "path": "Ramamurthy 11 16 2016 - Leveraging blockchain to improve food.pdf", + "title": "Full Text" + } + ], + "tags": [], + "notes": [ + { + "note": "This blog article discusses IBM, Walmart, and Tsinghua University's pilot program to apply blockchain technology to tracing the food supply chain.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "5683b7c1-2eac-4d95-b72b-65f003284ec8", + "note": "

How blockchain works when applied to the food supply chain

\n

“When applied to the food supply chain, digital product information such as farm origination details, batch numbers, factory and processing data, expiration dates, storage temperatures and shipping detail are digitally connected to food items and the information is entered into the blockchain along every step of the process.”

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food fraud", + "creators": [ + { + "lastName": "Ryan", + "firstName": "John M.", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "0128033932", + "abstractNote": "Food Fraud provides an overview of the current state on the topic to help readers understand which products are being impacted, how pervasive food fraud is, and what laws are in effect across the developed world. As international food trade increases, food processors, distributors, and consumers are purchasing more and more food from foreign countries that, in many cases, have inadequate oversight or control over what is coming into our supermarkets, restaurants, and refrigerators. This book is an essential quick reference that will familiarize readers with the latest issues surrounding the food industry.", + "extra": "Citation Key: Ryan.2016", + "itemID": "5c99255f-527b-4ab4-a482-10c4441d08f0", + "numPages": "92", + "place": "Amsterdam; Boston", + "publisher": "Academic Press", + "attachments": [], + "tags": [ + { + "tag": "Food adulteration and inspection" + }, + { + "tag": "Food industry and trade" + }, + { + "tag": "Law and legislation" + }, + { + "tag": "Scholarly sources" + }, + { + "tag": "United States" + } + ], + "notes": [ + { + "note": "Table of Contents\r\n Introduction\r\n Chapter 1. Background\r\n Abstract\r\n 1.1 Risk\r\n 1.2 Prevention Versus Corrective Action\r\n Chapter 2. Some Food Fraud Laws\r\n Abstract\r\n 2.1 Defining Food Fraud in the European Union\r\n 2.2 Defining Food Fraud in the United States\r\n 2.3 Executive Responsibilities and Prosecution: The Park Doctrine\r\n 2.4 FDA Ties with Customs and Border Protection and Homeland Security\r\n 2.5 Introduction of an Adulterated Food into Interstate Commerce\r\n 2.6 The Potential for Terrorism\r\n Chapter 3. Food Fraud Through the Supply Chain\r\n Abstract\r\n 3.1 Labeling\r\n 3.2 Blends: Walking on the Edge\r\n 3.3 Label Sell By, Best Used By, Expiration, and Use By Dates\r\n 3.4 Supply Chain Food Fraud Examples\r\n Chapter 4. Unprotected Customers\r\n Abstract\r\n 4.1 Detection Testing and the Authentication Dilemma\r\n 4.2 Whistle Blowers\r\n 4.3 What are Consumers Being Told?\r\n Chapter 5. Traceability and Temperature Monitoring: Building Chain of Custody Systems\r\n Abstract\r\n 5.1 Item Level Traceability\r\n 5.2 Barcode: Case Level Traceability\r\n 5.3 Pallet Level Traceability and Temperature Monitoring\r\n 5.4 Pallet and Container Level Traceability and Temperature Monitoring\r\n 5.5 Container Level Traceability and Temperature Control\r\n 5.6 Recall and the Chain of Custody\r\n Chapter 6. Recommendations\r\n Abstract\r\n 6.1 Establish Chain of Custody as a Standardized Food Supply Chain Traceability Requirement\r\n 6.2 Take Responsibility\r\n 6.3 Get Training and Get Involved\r\n 6.4 Establish Preventive Purchasing Practices\r\n 6.5 Know Your Supply Chain\r\n 6.6 Establish a System of Distributed Authority\r\n 6.7 Invest in Prevention by Establishing a System of Continuous Improvement\r\n 6.8 Hire Honest People\r\n 6.9 Proactively Cooperate with the Competition\r\n 6.10 Help Prosecute and Publicize\r\n Chapter 7. Available Resources\r\n Abstract\r\n 7.1 Some International Experts\r\n 7.2 Better Seafood Board (BSB)\r\n 7.3 FDA DNA Seafood Labeling Training\r\n 7.4 FDA Fish Substitutes\r\n 7.5 The University of Michigan Food Fraud Initiative\r\n 7.6 The US Pharmacopeial Food Fraud Database\r\n 7.7 Food Fraudster\r\n 7.8 UK Food Standards Agency “Reporting food fraud”\r\n 7.9 European Commission Official Controls and Enforcement\r\n 7.10 National Center for Food Protection and Defense: Food Fraud Resources\r\n 7.11 National Science Foundation (NSF)\r\n 7.12 Rapid Alert System for Food and Feed (RASFF)\r\n Chapter 8. Summary: Confusion Reigns", + "tags": [ + "#TableOfContents" + ] + } + ], + "seeAlso": [] + }, + { + "itemType": "document", + "title": "A proper mouthful: How do we prevent food fraud?", + "creators": [ + { + "lastName": "Sample", + "firstName": "Ian", + "creatorType": "author" + }, + { + "lastName": "Chambers", + "firstName": "Iain", + "creatorType": "author" + } + ], + "date": "2016-02-26T00:00:00", + "abstractNote": "From fake eggs to horsemeat burgers, food fraud is common, but hard to detect. How can we be sure that what we’re eating is the real thing?", + "extra": "Citation Key: Sample.20160226", + "itemID": "61e210b3-eea9-40b1-b0c9-7b40d4fcf5a4", + "url": "https://www.theguardian.com/science/audio/2016/feb/26/a-proper-mouthful-how-do-we-prevent-food-fraud-podcast", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Food and drink industry" + }, + { + "tag": "Food safety" + }, + { + "tag": "Food science" + }, + { + "tag": "Horsemeat scandal" + }, + { + "tag": "Popular sources" + }, + { + "tag": "The meat industry" + } + ], + "notes": [ + { + "id": "cbb0de87-e45f-48db-899b-5ebbab2f93bb", + "note": "

Adulteration usually not complete subsitution but attempt to cover up something in the food

\n

Usually it's an attempt to mask something in the food and is not an outright 100% substitution.

\n" + }, + { + "id": "07650771-fff2-4109-94f6-1c7bd608768e", + "note": "

Adulteration can occur with almost all types of food

\n

“Pretty much every food is vulnerable. ”

\n025" + }, + { + "id": "bf18bd03-1c15-4ec7-bbfe-36f3cd8e5338", + "note": "

Testing in UK has revealed widespread adulteration or misrepresentation of ingredients

\n

“Since the horsemeat scandal, UK testing has revealed that 40% of lamb takeaways contain other meat, and more than 60% of ham and cheese pizzas tested contained neither ham nor cheese.”

\n125" + } + ], + "seeAlso": [] + }, + { + "itemType": "computerProgram", + "title": "MarkerView Software", + "creators": [ + { + "lastName": "Sciex", + "creatorType": "author", + "fieldMode": true + } + ], + "date": "2017-03-29T00:00:00", + "abstractNote": "[Description from publisher - J.S.]\r\nA powerful program designed for metabolomics and protein/peptide biomarker profiling applications. Allows you to rapidly and easily review data acquired on all SCIEX mass spectrometers to determine up- and down-regulation of endogenous compounds in complex samples.", + "extra": "Citation Key: Sciex.20170329", + "itemID": "d69a676f-1c2b-425b-bc36-ea52e1409bb2", + "url": "https://sciex.com/products/software/markerview-software", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "webpage", + "title": "GFSI direction on food fraud and vulnerability assessment (VACCP)", + "creators": [ + { + "lastName": "Spink", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "Michigan State University", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2014-05-08T00:00:00", + "abstractNote": "In February 2014 the Global Food Safety Initiative (GFSI) presented their direction for including Food Fraud in their Food Safety Management System.  They have adopted a holistic Food Fraud scope and have shifted their focus from risks to vulnerabilities.", + "extra": "Citation Key: Spink.20140508", + "itemID": "0d576b32-d148-4660-9d3c-05e19c6b7691", + "url": "http://foodfraud.msu.edu/2014/05/08/gfsi-direction-on-food-fraud-and-vulnerability-assessment-vaccp/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + } + ], + "notes": [ + { + "id": "ea630e5f-20ed-48ec-b8eb-c018bd423c17", + "note": "

GFSI Approach to Food Fraud Prevention

\n" + }, + { + "id": "2f42fd47-185c-4327-8824-d475202af89a", + "note": "

GFSI Terminology Comparison

\n" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Defining the public health threat of food fraud", + "creators": [ + { + "lastName": "Spink", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "Moyer", + "firstName": "Douglas C.", + "creatorType": "author" + } + ], + "date": "2011-01-01T00:00:00", + "DOI": "10.1111/j.1750-3841.2011.02417.x", + "ISSN": "0022-1147", + "abstractNote": "Food fraud, including the more defined subcategory ofeconomically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless ofthe cause ofthe food risk, adulteration offood is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration offood with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that—economically motivated—but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number ofpotential contaminants. The authors developed the core concepts reported here following comprehensive research ofarticles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud—it focuses specifically on the public health threat—and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications ofthe crime triangle and the chemistry ofthe crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research.", + "extra": "PMID: 22416717\nCitation Key: Spink.2011", + "issue": "9", + "itemID": "736d8366-00c0-4f5d-a982-4b24d6e27b3a", + "journalAbbreviation": "J. Food Sci.", + "pages": "157-163", + "publicationTitle": "Journal of food science", + "volume": "76", + "attachments": [ + { + "title": "Online" + }, + { + "path": "Spink, Moyer 2011 - Defining the public health threat.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Consumer product safety" + }, + { + "tag": "Food safety methods" + }, + { + "tag": "Fraud" + }, + { + "tag": "Risk Assessment" + }, + { + "tag": "Risk Factors" + }, + { + "tag": "Scholarly sources" + }, + { + "tag": "Terrorism" + } + ], + "notes": [ + { + "note": "Attempt to define food fraud and its current state of prevention with suggestions for the future. Spink is one of the key researchers in this field, and this paper has been cited by many others.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "f2eb5713-27ac-41f3-83ac-b61392b8bacf", + "note": "157" + }, + { + "id": "0f31aea1-8324-4e12-8162-3637e53ad930", + "note": "157" + }, + { + "id": "07cfdbf0-6572-4f7f-985f-18bf0d4e495d", + "note": "157" + }, + { + "id": "8f65339e-8192-444e-82ae-55e47f02aaef", + "note": "157" + }, + { + "id": "2ef2f38b-d773-4713-8cb4-b8f842b9e0d4", + "note": "157" + }, + { + "id": "56686902-3d02-4bc3-b757-fbdf21e5dbc4", + "note": "157" + }, + { + "id": "f034a2fb-ad09-4a92-8ec0-b77bc05ac074", + "note": "157" + }, + { + "id": "c955ab2c-971c-40ca-872c-a33c1f3172a7", + "note": "157" + }, + { + "id": "96c2a2d1-f503-4c1b-b971-dbe5100fb40a", + "note": "157" + }, + { + "id": "1de6ee97-7578-4ea7-9ce5-5bfed9d25e67", + "note": "157" + }, + { + "id": "5873d947-8838-42c8-b3d1-63ec62468961", + "note": "158" + }, + { + "id": "128ecc9b-196b-41d9-af3c-f429b136b85e", + "note": "158" + }, + { + "id": "d8280b44-ad37-4d7d-9e34-27602a8eae15", + "note": "158" + }, + { + "id": "9270be6d-8ff8-4d73-9c00-8d1d5689777e", + "note": "158" + }, + { + "id": "e6281cc4-4a84-4f10-9267-4ea40b7dd5ba", + "note": "160" + }, + { + "id": "a9dbf0fd-8dbc-4bc6-84f6-90629c3eec3f", + "note": "161" + }, + { + "id": "8cd93dd1-0d00-4054-9a90-51501596ab63", + "note": "161" + }, + { + "id": "5ce373fa-5738-41f5-bfa8-0f5e68473f4f", + "note": "162" + }, + { + "id": "29bac51b-0f3a-4ca0-8c95-670565fa36f7", + "note": "162" + }, + { + "id": "c2f0f063-35b2-42e6-9b8d-157e2cbc72fc", + "note": "

Definitions of food fraud, food safety incidents, and food defense incidents

\n

“Food Fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm.”

\n157" + }, + { + "id": "5eaf69d3-26a6-4119-89e8-a05fe79a2e1f", + "note": "

Where food fraud fits as a term

\n

“Food fraud is a broader term than either the Food and Drug Administration (FDA) definition of economically motivated adulteration (EMA) or the more specific general concept of food counterfeiting.”

\n157" + }, + { + "id": "6054a098-5dd3-42e1-8b84-a0b8972532be", + "note": "

Difference between fraud in ancient and contemporary times

\n

Although fraud existed, it was geographically limited. Today the scale can be vast.

\n158" + }, + { + "id": "ebbfda47-b33a-4c90-b40f-2920fa7add4d", + "note": "

Definition of food fraud (Spink & Moyer)

\n

“Food fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.”

\n158" + }, + { + "id": "1d3d8033-4336-4188-bd49-15f6d6100e2d", + "note": "

Components of a food protection plan

\n158" + }, + { + "id": "16b0043e-06e3-4a0d-8d60-5d6fbd85499c", + "note": "

Direct food fraud risk definition

\n

“Direct food fraud risk occurs when the consumer is put at immediate or imminent risk, such as the inclusion of an acutely toxic or lethal contaminant; that is, one exposure can cause adverse effects in the whole or a smaller at-risk population.”

\n159" + }, + { + "id": "328aeaa3-7fde-456e-b3a9-1b71975366f8", + "note": "

Indirect food fraud risk - definition

\n

“Indirect food fraud risk occurs when the consumer is put at risk through long-term exposure, such as the buildup of a chronically toxic contaminant in the body, through the ingestion of low doses. Indirect risk also includes the omission of beneficial ingredients, such as preservatives or vitamins.”

\n159" + }, + { + "id": "e729b06b-fa53-4b86-a40d-61b5b179d919", + "note": "

Technical food fraud risk - definition

\n

“Technical food fraud risk is nonmaterial in nature. For example, food documentation fraud occurs when product content or country-of-origin information is deliberately misrepresented.”

\n159" + }, + { + "id": "dc437c4e-207b-4c9a-81c7-586937a3e20b", + "note": "

Differences between food fraud and food defense

\n

Food fraud not intended to cause harm to the public and may be ongoing until detected. Food defense incidents are usually one-time events and are designed to cause harm.

\n160" + }, + { + "id": "8f16ea76-0030-4a99-a4c8-a4192eb82a37", + "note": "

Food protection risk matrix

\n160" + }, + { + "id": "197c843d-c957-4a8c-801f-19166eaba940", + "note": "

How to reduce likelihood of food fraud

\n

“Fraud opportunities could be reduced by increasing the risk of detection, or increasing the costs of the necessary technology to commit the fraud and/or of developing quality levels that would attract consumers.”

\n161" + }, + { + "id": "6b52254c-6e19-420d-a33f-51720c19fb65", + "note": "

Reasons enforcing food fraud laws is difficult

\n

“Effective enforcement is a challenge because the food fraud risk is emerging, evolving and extremely complex.”

\n162" + }, + { + "id": "1e9280df-aec2-421e-9f7a-92e6f9da339e", + "note": "

What is needed to prevent food fraud

\n

“Deterring food fraud requires interdisciplinary research combining criminology with other fields, such as food safety, public health, packaging, food science, food law, supply chain management, consumer behavior, social anthropology, and political science. Focusing on the criminal component ofthe crime triangle provides insights to the motivations for seeking food fraud opportunities.”

\n162" + } + ], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Introducing food fraud including translation and interpretation to Russian, Korean, and Chinese languages", + "creators": [ + { + "lastName": "Spink", + "firstName": "John", + "creatorType": "author" + }, + { + "lastName": "Moyer", + "firstName": "Douglas C.", + "creatorType": "author" + }, + { + "lastName": "Park", + "firstName": "Hyeonho", + "creatorType": "author" + }, + { + "lastName": "Wu", + "firstName": "Yongning", + "creatorType": "author" + }, + { + "lastName": "Fersht", + "firstName": "Victor", + "creatorType": "author" + }, + { + "lastName": "Shao", + "firstName": "Bing", + "creatorType": "author" + }, + { + "lastName": "Hong", + "firstName": "Miao", + "creatorType": "author" + }, + { + "lastName": "Paek", + "firstName": "Seung Yeop", + "creatorType": "author" + }, + { + "lastName": "Edelev", + "firstName": "Dmitry", + "creatorType": "author" + } + ], + "date": "2015-01-01T00:00:00", + "DOI": "10.1016/j.foodchem.2014.09.106", + "ISSN": "0308-8146", + "abstractNote": "This paper introduces the topic of Food Fraud with translations to Russian, Korean, and Chinese. The concepts provide a system-wide focus leading to prevention. The goal is not to detect Food Fraud but to adjust entire food supply chains to reduce fraud opportunities. Food Fraud is a recently defined area of Food Protection between Food Safety (such as Salmonella or pesticide residue), and Food Defense (malicious intent to harm such as terrorism). Food Fraud is intentional with no intent to harm but only for economic gain. As with improving Food Safety and Food Defense, preventing Food Fraud is good for society and the economy. Society benefits through fewer public health threats from unauthorized acts. Society also benefits from increased consumer satisfaction and harmony. Food Security is increased through the production of more, higher-value products for consumers, commerce, and exporting. Food Fraud can reduce economic output because sickened citizens cannot work and it also reduces consumer confidence leading to less commerce.", + "extra": "PMID: 26190607\nCitation Key: Spink.2015", + "itemID": "9208b9de-7f60-485f-92fb-5b2ce71e2d8d", + "journalAbbreviation": "Food Chem.", + "pages": "102-7", + "publicationTitle": "Food chemistry", + "volume": "189", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "China" + }, + { + "tag": "Food contamination prevention and control" + }, + { + "tag": "Food quality" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud prevention and control" + }, + { + "tag": "Language" + }, + { + "tag": "Public Health" + }, + { + "tag": "Republic of Korea" + }, + { + "tag": "Russia" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Driving agribusiness with technology innovations", + "creators": [ + { + "lastName": "Tarnanidis", + "firstName": "Theodore", + "creatorType": "editor" + }, + { + "lastName": "Vlachopoulou", + "firstName": "Maro", + "creatorType": "editor" + }, + { + "lastName": "Papathanasiou", + "firstName": "Jason", + "creatorType": "editor" + } + ], + "date": "2017-01-01T00:00:00", + "ISBN": "9781522521075", + "abstractNote": "[Description from publisher - J.S.]\r\nModern web-based applications are pertinent for businesses, as they often encourage their core competencies and capabilities. As such, the agribusiness sector must begin to take advantage of the open networks and advances in communication and information technologies in order to grow their businesses exponentially.\r\nDriving Agribusiness With Technology Innovations highlights innovative business models and theories that encourage the use of emerging technological advances to produce thriving enterprises. Featuring extensive coverage on relevant topics including digital environments, mobile agriculture, supply chain platforms, and internet marketing models, this publication is an important reference source for business managers, practitioners, professionals, and engineers who are interested in discovering emerging technology trends for agribusiness.", + "extra": "Citation Key: Tarnanidis.2017", + "itemID": "b3b260b4-1492-4b1c-81c8-436cdedebaad", + "place": "Hershey, Pennsylvania", + "publisher": "IGI Global", + "series": "Advances in Business Strategy and Competitive Advantage", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Coffee adulteration: More than two decades of research", + "creators": [ + { + "lastName": "Toci", + "firstName": "Aline Theodoro", + "creatorType": "author" + }, + { + "lastName": "Farah", + "firstName": "Adriana", + "creatorType": "author" + }, + { + "lastName": "Pezza", + "firstName": "Helena Redigolo", + "creatorType": "author" + }, + { + "lastName": "Pezza", + "firstName": "Leonardo", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "DOI": "10.1080/10408347.2014.966185", + "ISSN": "1040-8347", + "abstractNote": "Coffee is a ubiquitous food product of considerable economic importance to the countries that produce and export it. The adulteration of roasted coffee is a strategy used to reduce costs. Conventional methods employed to identify adulteration in roasted and ground coffee involve optical and electron microscopy, which require pretreatment of samples and are time-consuming and subjective. Other analytical techniques have been studied that might be more reliable, reproducible, and widely applicable. The present review provides an overview of three analytical approaches (physical, chemical, and biological) to the identification of coffee adulteration. A total of 30 published articles are considered. It is concluded that despite the existence of a number of excellent studies in this area, there still remains a lack of a suitably sensitive and widely applicable methodology able to take into account the various different aspects of adulteration, considering coffee varieties, defective beans, and external agents.", + "extra": "PMID: 25633422\nCitation Key: Toci.2016", + "issue": "2", + "itemID": "ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf", + "journalAbbreviation": "Crit. Rev. Anal. Chem.", + "pages": "83-92", + "publicationTitle": "Critical Reviews in Analytical Chemistry", + "volume": "46", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Coffee" + }, + { + "tag": "Electron scanning microscopy" + }, + { + "tag": "Food contamination analysis" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "statute", + "nameOfAct": "FDA Food Safety Modernization Act: 21 USC 2201", + "creators": [ + { + "lastName": "United States Congress", + "creatorType": "contributor", + "fieldMode": true + } + ], + "dateEnacted": "2017-01-04T00:00:00", + "extra": "Citation Key: UnitedStatesCongress.20170104", + "itemID": "b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc", + "url": "https://www.gpo.gov/fdsys/pkg/PLAW-111publ353/pdf/PLAW-111publ353.pdf", + "attachments": [ + { + "title": "Online" + }, + { + "path": "United States Congress 1 4 2017 - FDA Food Safety Modernization Act.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Legal sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "case", + "caseName": "United States v. Lexington Mill & Elevator Co.", + "creators": [ + { + "lastName": "United States Supreme Court", + "creatorType": "contributor", + "fieldMode": true + } + ], + "dateDecided": "1914-02-24T00:00:00", + "extra": "Citation Key: UnitedStatesSupremeCourt.19140224", + "itemID": "03798623-1bd2-422e-bb17-0f77830aff20", + "url": "https://supreme.justia.com/cases/federal/us/232/399/", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Legal sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "Food safety", + "creators": [ + { + "lastName": "Uyttendaele", + "firstName": "Mieke", + "creatorType": "editor" + }, + { + "lastName": "Franz", + "firstName": "Eelco", + "creatorType": "editor" + }, + { + "lastName": "Schlüter", + "firstName": "Oliver", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "extra": "Citation Key: Uyttendaele.2016", + "itemID": "9735e0ee-c250-4570-b2b9-6388450b3dae", + "volume": "13", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "DNA barcoding reveals commercial fraud related to yak jerky sold in China", + "creators": [ + { + "lastName": "Wang", + "firstName": "Yunyu", + "creatorType": "author" + }, + { + "lastName": "He", + "firstName": "Kai", + "creatorType": "author" + }, + { + "lastName": "Fan", + "firstName": "Long", + "creatorType": "author" + }, + { + "lastName": "Wang", + "firstName": "Yushui", + "creatorType": "author" + }, + { + "lastName": "Wu", + "firstName": "Shifang", + "creatorType": "author" + }, + { + "lastName": "Murphy", + "firstName": "Robert W.", + "creatorType": "author" + }, + { + "lastName": "Wang", + "firstName": "Wenzhi", + "creatorType": "author" + }, + { + "lastName": "Zhang", + "firstName": "Yaping", + "creatorType": "author" + } + ], + "date": "2016-01-01T00:00:00", + "DOI": "10.1007/s11427-015-4979-0", + "ISSN": "1674-7305", + "extra": "PMID: 26758743\nCitation Key: Wang.2016", + "issue": "1", + "itemID": "6934fac0-8c0a-469d-90ce-0412ba7d9a87", + "journalAbbreviation": "Sci. China Life Sci.", + "pages": "106-8", + "publicationTitle": "Science China. Life sciences", + "volume": "59", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + }, + { + "path": "Wang, He et al.pdf", + "title": "Full Text" + } + ], + "tags": [ + { + "tag": "Cattle genetics" + }, + { + "tag": "China" + }, + { + "tag": "DNA Barcoding" + }, + { + "tag": "Food contamination" + }, + { + "tag": "Food safety" + }, + { + "tag": "Fraud" + }, + { + "tag": "Hazard analysis and critical control points" + }, + { + "tag": "Meat" + }, + { + "tag": "Preserved food" + }, + { + "tag": "RNA" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "Example of how DNA barcode tests can be used to detect when another species of animal is used.", + "tags": [ + "#Evaluation" + ] + }, + { + "id": "0bf7e05e-8b06-49df-8f75-507304afe7a5", + "note": "106" + }, + { + "id": "68247aee-2053-41d8-8781-e144fdd126cf", + "note": "

Why identifying species in certain food products is difficult

\n

“Globally, there is still inadequate regulation for species identification in food products, such as sliced and minced jerky. The main problem is that, after food processing, livestock products are morphologically indistinguishable because of the lack of discriminative features such as skull, fur, and tails.”

\n106" + }, + { + "id": "b2fdfaf9-04f7-4ba2-b647-b5667fcb50c1", + "note": "

DNA barcoding use

\n

“DNA barcoding uses a short, standardized region to distinguish different taxa at the species level.”

\n106" + }, + { + "id": "2962251b-22f8-405e-8e1f-f29bbf92dd00", + "note": "106" + }, + { + "id": "e1b89b1f-5704-41c8-a4f7-095a6d896830", + "note": "

Example of food adulteration in a test of yak meat jerky

\n

“Only nine yak jerky samples were identified as yak (Bos grunniens) samples, whereas the other 21 were found to be adulterated (70%). Among the substituted samples, 18 (60%) were identified as beef meat (Bos taurus), buffalo beef (Bubalus bubalis), or pig meat (Sus scrofa). The other three samples (10%) were identified as those of small mammals, including the lesser striped shrew (Sorex bedfordiae) and the Chinese mole shrew (Anourosorex squamipes).”

\n107-108" + }, + { + "id": "8203b7c9-1cee-48ff-bd7c-c357c8ca4002", + "note": "

Percentage of yak jerky products that were adulterated

\n

“...90%, 75%, and 56% of yak jerky products were fraudulent in consumer markets of Kunming, Chengdu, and Xining, respectively.”

\n108" + } + ], + "seeAlso": [] + }, + { + "itemType": "webpage", + "title": "2008 Chinese milk scandal", + "creators": [ + { + "lastName": "Wikipedia", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2017-05-22T00:00:00", + "extra": "Citation Key: Wikipedia.20170522", + "itemID": "8b7d04f3-dfc8-4e36-8d34-0db8113eab01", + "url": "https://en.wikipedia.org/w/index.php?oldid=781647563", + "attachments": [ + { + "title": "Online" + }, + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Background info - not for citation!" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "audioRecording", + "title": "Still seems like food to me", + "creators": [ + { + "lastName": "Winter", + "firstName": "Carl", + "creatorType": "author" + } + ], + "date": "2008-01-01T00:00:00", + "extra": "Citation Key: Winter.2008", + "itemID": "57e829e1-dc28-4a02-956f-04d36967db37", + "label": "Food Safety Music - UC Davis", + "place": "Davis, California", + "url": "http://foodsafe.ucdavis.edu/html/audio/still_seems_like_food_to_me.html", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Popular sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "journalArticle", + "title": "Food safety and social risk in contemporary China", + "creators": [ + { + "lastName": "Yan", + "firstName": "Yunxiang", + "creatorType": "author" + } + ], + "date": "2012-01-01T00:00:00", + "ISSN": "1752-0401", + "extra": "Citation Key: Yan.2012", + "issue": "3", + "itemID": "3c651c48-0dd6-4a47-b02d-13a6a80b1c2b", + "journalAbbreviation": "J. Asian Stud.", + "pages": "705-729", + "publicationTitle": "The Journal of Asian Studies", + "volume": "71", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "book", + "title": "2016 13th International Conference on Service Systems and Service Management (ICSSSM): June 24-26, 2016, KUST, Kunming, China", + "creators": [ + { + "lastName": "Yang", + "firstName": "Baojian", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "978-1-5090-2842-9", + "extra": "Citation Key: Yang.2016", + "itemID": "26c0c55a-7828-45c1-a29c-f85a34eb8676", + "place": "Piscataway, NJ", + "publisher": "IEEE", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Computer networks" + }, + { + "tag": "Scholarly sources" + }, + { + "tag": "Service industries" + }, + { + "tag": "Systems engineering" + } + ], + "notes": [], + "seeAlso": [] + }, + { + "itemType": "bookSection", + "title": "Dissonance in the food traceability regulatory environment and food fraud", + "creators": [ + { + "lastName": "Bitzios", + "firstName": "Michail", + "creatorType": "author" + }, + { + "lastName": "Jack", + "firstName": "Lisa", + "creatorType": "author" + }, + { + "lastName": "Krzyzaniak", + "firstName": "Sally-Ann Caroline", + "creatorType": "author" + }, + { + "lastName": "Xu", + "firstName": "Mark", + "creatorType": "author" + }, + { + "lastName": "Dries", + "firstName": "Liesbeth K. E.", + "creatorType": "editor" + }, + { + "lastName": "Karantininis", + "firstName": "Konstantinos", + "creatorType": "editor" + }, + { + "lastName": "Martino", + "firstName": "Gaetano", + "creatorType": "editor" + }, + { + "lastName": "Codron", + "firstName": "Jean Marie", + "creatorType": "editor" + }, + { + "lastName": "Pascucci", + "firstName": "Stefano", + "creatorType": "editor" + } + ], + "ISBN": "9789086863013", + "bookTitle": "It’s a jungle out there - the strange animals of economic organization in agri-food value chains", + "extra": "Citation Key: Bitzios.Inpress", + "itemID": "b213355e-df97-4b43-9e69-8a185817ce57", + "place": "Wageningen", + "publisher": "Wageningen Academic Publishers", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "e245ae31-ac6d-42fa-aca4-3435cb4bf378" + ] + }, + { + "itemType": "bookSection", + "title": "Supply chain food crime & fraud: A systematic literature review of food criminality", + "creators": [ + { + "lastName": "Fassam", + "firstName": "Liam", + "creatorType": "author" + }, + { + "lastName": "Dani", + "firstName": "Samir", + "creatorType": "author" + }, + { + "lastName": "Hills", + "firstName": "Mils", + "creatorType": "author" + }, + { + "lastName": "Pawar", + "firstName": "Kulwant S.", + "creatorType": "editor" + }, + { + "lastName": "Rogers", + "firstName": "Helen", + "creatorType": "editor" + }, + { + "lastName": "Ferrari", + "firstName": "Emilio", + "creatorType": "editor" + }, + { + "lastName": "International Symposium on Logistics", + "creatorType": "contributor", + "fieldMode": true + } + ], + "date": "2015-01-01T00:00:00", + "ISBN": "9780853583080", + "bookTitle": "Reflections on supply chain research and practice: The proceedings of 20th International Symposium on Logistics (ISL 2015)", + "extra": "Citation Key: Fassam.2015", + "itemID": "5fb48a7c-65db-4581-ab2c-7197305a0811", + "pages": "659-666", + "place": "Nottingham", + "publisher": "Centre for Concurrent Enterprise", + "attachments": [], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "id": "a3c8b5d4-6350-4814-899f-141f4fb089fa", + "note": "

Research not having any effect on food fraud incidents

\n

“Our analysis of the literature indicates that within the areas of business risk and resilience, publications focus on aggregate event-driven cause and effect relationships. Events in the food supply chain over the past two years has evidenced a disconnect between outcomes of research and actual impact. Little is being done to limit the exposure to risk and provide support to the food businesses of Europe, of which a majority are food manufacturing companies....”

\n660" + }, + { + "id": "d7702e6d-03df-440c-99f4-23e4d5bbc2a7", + "note": "

Disconnect between academic and public interest in food fraud

\n662" + }, + { + "id": "735834f8-6fae-4c73-8b55-00c3068752e6", + "note": "

Factors leading to food fraud in the supply chain

\n664" + }, + { + "id": "9308f85e-7559-453b-a155-70db3f5521e2", + "note": "

Another problem of terminology: US uses \"food fraud\" and UK and Europe use \"food crime\" in the research

\n

“Finally, there is a further challenge in this area with confusion over terminology - as highlighted by the Elliot report (Elliott, 2013) - where US led systems prefer the use of ‘fraud’ and European based research adopts ‘crime’, which creates another divergence of topics within the research. The divergence of terminology use is creating confusion in the system and the authors support the need for academia and practitioners to utilise the term ‘food crime’ in order to build and strengthen a coherent body of knowledge.”

\n665" + } + ], + "seeAlso": [ + "0293a42d-151c-4ca2-9091-4e1dd5400666" + ] + }, + { + "itemType": "bookSection", + "title": "Eco-certification and transparency in global food supply chains", + "creators": [ + { + "lastName": "Karipidis", + "firstName": "Philippos", + "creatorType": "author" + }, + { + "lastName": "Tselempis", + "firstName": "Dimitrios", + "creatorType": "author" + }, + { + "lastName": "Tsironis", + "firstName": "Loukas K.", + "creatorType": "author" + }, + { + "lastName": "Tarnanidis", + "firstName": "Theodore", + "creatorType": "editor" + }, + { + "lastName": "Vlachopoulou", + "firstName": "Maro", + "creatorType": "editor" + }, + { + "lastName": "Papathanasiou", + "firstName": "Jason", + "creatorType": "editor" + } + ], + "date": "2017-01-01T00:00:00", + "ISBN": "9781522521075", + "bookTitle": "Driving agribusiness with technology innovations", + "extra": "Citation Key: Karipidis.2017\nDOI: 10.4018/978-1-5225-2107-5.ch005", + "itemID": "cb44c440-80f8-4486-bf68-af79d9d716e2", + "pages": "70-90", + "place": "Hershey, Pennsylvania", + "publisher": "IGI Global", + "series": "Advances in Business Strategy and Competitive Advantage", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "b3b260b4-1492-4b1c-81c8-436cdedebaad" + ] + }, + { + "itemType": "bookSection", + "title": "Food Integrity", + "creators": [ + { + "lastName": "Manning", + "firstName": "L.", + "creatorType": "author" + }, + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "bookTitle": "Food and supply chain integrity", + "extra": "Citation Key: Manning.2016", + "itemID": "3012ebe2-c183-4d12-9851-5ab7b6d2421c", + "pages": "2-6", + "volume": "119", + "attachments": [], + "tags": [], + "notes": [ + { + "id": "a7263495-1753-4d6b-a5bd-035c37cf9eac", + "note": "

Difficulty: not yet enough academic literature since the field of food integrity is still developing

\n

“The challenge in such an emerging academic field is that much of the evidence sits in non-academic literature...”

\n2" + } + ], + "seeAlso": [ + "30642deb-def4-40a6-86a2-b9ad1c335df6" + ] + }, + { + "itemType": "bookSection", + "title": "An agri-food supply chain traceability system for China based on RFID & blockchain technology", + "creators": [ + { + "lastName": "Tian", + "firstName": "Feng", + "creatorType": "author" + }, + { + "lastName": "Yang", + "firstName": "Baojian", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "ISBN": "978-1-5090-2842-9", + "bookTitle": "2016 13th International Conference on Service Systems and Service Management (ICSSSM): June 24-26, 2016, KUST, Kunming, China", + "extra": "Citation Key: Tian.2016\nDOI: 10.1109/ICSSSM.2016.7538424", + "itemID": "3c9fc64a-c430-4733-a4a1-1e9103e4f8fa", + "pages": "1-6", + "place": "Piscataway, NJ", + "publisher": "IEEE", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "26c0c55a-7828-45c1-a29c-f85a34eb8676" + ] + }, + { + "itemType": "bookSection", + "title": "Food safety, a global challenge", + "creators": [ + { + "lastName": "Uyttendaele", + "firstName": "Mieke", + "creatorType": "author" + }, + { + "lastName": "Franz", + "firstName": "Eelco", + "creatorType": "author" + }, + { + "lastName": "Schlüter", + "firstName": "Oliver", + "creatorType": "author" + }, + { + "lastName": "Uyttendaele", + "firstName": "Mieke", + "creatorType": "editor" + }, + { + "lastName": "Franz", + "firstName": "Eelco", + "creatorType": "editor" + }, + { + "lastName": "Schlüter", + "firstName": "Oliver", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "bookTitle": "Food safety", + "extra": "Citation Key: Uyttendaele.2016b\nDOI: 10.3390/ijerph13010067", + "itemID": "d0c8a959-aa18-4a58-a996-96af08a09256", + "pages": "1–6", + "volume": "13", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Scholarly sources" + } + ], + "notes": [ + { + "note": "Article number: 67", + "tags": [ + "#Notes" + ] + } + ], + "seeAlso": [ + "9735e0ee-c250-4570-b2b9-6388450b3dae" + ] + }, + { + "itemType": "bookSection", + "title": "Food scares: A comprehensive categorisation", + "creators": [ + { + "lastName": "Whitworth", + "firstName": "Elizabeth", + "creatorType": "author" + }, + { + "lastName": "Druckman", + "firstName": "Angela", + "creatorType": "author" + }, + { + "lastName": "Woodward", + "firstName": "Amy", + "creatorType": "author" + }, + { + "lastName": "Manning", + "firstName": "Louise", + "creatorType": "editor" + } + ], + "date": "2016-01-01T00:00:00", + "abstractNote": "Purpose – The purpose of this paper is to describe the development of a comprehensive categorisation of food scares.\r\nDesign/methodology/approach – Following an initial desktop study, the categorisation was developed collaboratively with industry experts through a workshop and series of semi-structured interviews.\r\nFindings – The new categorisation developed is in Venn diagram format allowing overlapping categories. It is organised around the two major types of contamination (biological, and chemical/physical contaminants) and the two major causes of contamination (wilful deception, and transparency and awareness issues).\r\nPractical implications – The long and complex supply chains characteristic of current food production systems have resulted in a rising number of food scares. There is thus an increased emphasis on developing strategies to reduce both the number of incidents of food scares, and their associated economic, social and environmental impacts. The new categorisation developed in this study enables experts to address categories of food scares. Inclusion of the cause of contamination is particularly important as the method through which contamination occurs is key in devising food scare prevention strategies.\r\nOriginality/value – The new categorisation, unlike previous categorisations, enables food scares to fall into multiple categories, as appropriate. Also, again in contrast to previous categorisations, it takes into account not only the physical problem of a food scare but also the mechanism through which it arises.", + "bookTitle": "Food and supply chain integrity", + "extra": "Citation Key: Whitworth.2016\nDOI: 10.1108/BFJ-06-2016-0263", + "itemID": "31cd5301-52f8-4c11-98f8-765ec869a45d", + "pages": "131-142", + "volume": "119", + "attachments": [ + { + "title": "Online" + } + ], + "tags": [ + { + "tag": "Classification" + }, + { + "tag": "Consumer risk" + }, + { + "tag": "Contamination" + }, + { + "tag": "Food safety" + }, + { + "tag": "Risk reduction" + }, + { + "tag": "Scholarly sources" + } + ], + "notes": [], + "seeAlso": [ + "30642deb-def4-40a6-86a2-b9ad1c335df6" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "351d2c56-4a9b-4998-af82-82a1baba0c33" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read until 2018-09-09T22:00:00

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "d0a6dd17-9c45-4865-a6e7-8fe225ff3b32" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Borrow

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "08c4afc4-6416-4b23-8046-dd47c21ccaec" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "490c4d73-75d6-4f8f-a7b0-b2cc5acc0b38" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

ExamineAndAssess

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "f8870bd1-4f3f-4b48-b29b-a7cf3d461475" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "3ab6253b-74b7-4701-9431-acfe6df2d2be" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "6c15fcbf-0980-4849-97de-442e6bfbcdc8" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Update bibliographic information and quotation page numbers until 2018-09-09T22:00:00

\nThis is a preprint article. Update article information and add page numbers for quotations after the article has been published.", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "5a6b525a-01c2-4bcf-9e72-c5340f9a1eb9" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "4b33d12a-af3c-4821-8907-b9263bb8ee7f" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "27384b10-b549-45fc-80c7-94688793e9fc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "7d50376a-ef59-4b6a-804f-79e6880ebd42" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "f16b35ce-1d93-423c-909a-61d0d5f693f8" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "0ef4b577-f9c6-43b5-abfa-5d05ba8664a1" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Look up

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "0ef4b577-f9c6-43b5-abfa-5d05ba8664a1" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "d0abc9c9-e230-4a30-ac87-7847e7fa0789" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Borrow

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "24cba909-5cee-4d53-ae8c-95938ad33f89" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "92976b82-1442-47c0-a23d-dd1a0178ce0c" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Borrow

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "5c99255f-527b-4ab4-a482-10c4441d08f0" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

GoThroughBibliography

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "736d8366-00c0-4f5d-a982-4b24d6e27b3a" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "9208b9de-7f60-485f-92fb-5b2ce71e2d8d" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

ExamineAndAssess

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "ccf8cfc9-68c4-4767-9d0b-b799bcdf05cf" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

VerifyBibliographicInformation

\nCheck how legal sources should be cited.", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "b9d17fbc-f9b9-4e2f-83c3-e681a8e7b7cc" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

Read

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "6934fac0-8c0a-469d-90ce-0412ba7d9a87" + ] + }, + { + "itemType": "note", + "creators": [], + "note": "

ExamineAndAssess

", + "attachments": [], + "tags": [ + { + "tag": "#todo" + } + ], + "notes": [], + "seeAlso": [ + "3c651c48-0dd6-4a47-b02d-13a6a80b1c2b" + ] + } + ] + } +] +/** END TEST CASES **/ diff --git a/package-lock.json b/package-lock.json index 5c02b6cb06..6f33790980 100644 --- a/package-lock.json +++ b/package-lock.json @@ -8,6 +8,9 @@ "name": "translators-check", "version": "1.0.2", "license": "CC0-1.0", + "dependencies": { + "ESLint": "npm:eslint@^8.57.1" + }, "devDependencies": { "@zotero/eslint-config": "^1.0.5", "chromedriver": "^122.0.4", @@ -51,23 +54,25 @@ } }, "node_modules/@eslint-community/regexpp": { - "version": "4.5.0", - "resolved": "https://registry.npmjs.org/@eslint-community/regexpp/-/regexpp-4.5.0.tgz", - "integrity": "sha512-vITaYzIcNmjn5tF5uxcZ/ft7/RXGrMUIS9HalWckEOF6ESiwXKoMzAQf2UW0aVd6rnOeExTJVd5hmWXucBKGXQ==", + "version": "4.11.1", + "resolved": "https://registry.npmjs.org/@eslint-community/regexpp/-/regexpp-4.11.1.tgz", + "integrity": "sha512-m4DVN9ZqskZoLU5GlWZadwDnYo3vAEydiUayB9widCl9ffWx2IvPnp6n3on5rJmziJSw9Bv+Z3ChDVdMwXCY8Q==", "dev": true, + "license": "MIT", "engines": { "node": "^12.0.0 || ^14.0.0 || >=16.0.0" } }, "node_modules/@eslint/eslintrc": { - "version": "2.0.2", - "resolved": "https://registry.npmjs.org/@eslint/eslintrc/-/eslintrc-2.0.2.tgz", - "integrity": "sha512-3W4f5tDUra+pA+FzgugqL2pRimUTDJWKr7BINqOpkZrC0uYI0NIc0/JFgBROCU07HR6GieA5m3/rsPIhDmCXTQ==", + "version": "2.1.4", + "resolved": "https://registry.npmjs.org/@eslint/eslintrc/-/eslintrc-2.1.4.tgz", + "integrity": "sha512-269Z39MS6wVJtsoUl10L60WdkhJVdPG24Q4eZTH3nnF6lpvSShEK3wQjDX9JRWAUPvPh7COouPpU9IrqaZFvtQ==", "dev": true, + "license": "MIT", "dependencies": { "ajv": "^6.12.4", "debug": "^4.3.2", - "espree": "^9.5.1", + "espree": "^9.6.0", "globals": "^13.19.0", "ignore": "^5.2.0", "import-fresh": "^3.2.1", @@ -83,22 +88,25 @@ } }, "node_modules/@eslint/js": { - "version": "8.38.0", - "resolved": "https://registry.npmjs.org/@eslint/js/-/js-8.38.0.tgz", - "integrity": "sha512-IoD2MfUnOV58ghIHCiil01PcohxjbYR/qCxsoC+xNgUwh1EY8jOOrYmu3d3a71+tJJ23uscEV4X2HJWMsPJu4g==", + "version": "8.57.1", + "resolved": "https://registry.npmjs.org/@eslint/js/-/js-8.57.1.tgz", + "integrity": "sha512-d9zaMRSTIKDLhctzH12MtXvJKSSUhaHcjV+2Z+GK+EEY7XKpP5yR4x+N3TAcHTcu963nIr+TMcCb4DBCYX1z6Q==", "dev": true, + "license": "MIT", "engines": { "node": "^12.22.0 || ^14.17.0 || >=16.0.0" } }, "node_modules/@humanwhocodes/config-array": { - "version": "0.11.8", - "resolved": "https://registry.npmjs.org/@humanwhocodes/config-array/-/config-array-0.11.8.tgz", - "integrity": "sha512-UybHIJzJnR5Qc/MsD9Kr+RpO2h+/P1GhOwdiLPXK5TWk5sgTdu88bTD9UP+CKbPPh5Rni1u0GjAdYQLemG8g+g==", + "version": "0.13.0", + "resolved": "https://registry.npmjs.org/@humanwhocodes/config-array/-/config-array-0.13.0.tgz", + "integrity": "sha512-DZLEEqFWQFiyK6h5YIeynKx7JlvCYWL0cImfSRXZ9l4Sg2efkFGTuFf6vzXjK1cq6IYkU+Eg/JizXw+TD2vRNw==", + "deprecated": "Use @eslint/config-array instead", "dev": true, + "license": "Apache-2.0", "dependencies": { - "@humanwhocodes/object-schema": "^1.2.1", - "debug": "^4.1.1", + "@humanwhocodes/object-schema": "^2.0.3", + "debug": "^4.3.1", "minimatch": "^3.0.5" }, "engines": { @@ -119,10 +127,12 @@ } }, "node_modules/@humanwhocodes/object-schema": { - "version": "1.2.1", - "resolved": "https://registry.npmjs.org/@humanwhocodes/object-schema/-/object-schema-1.2.1.tgz", - "integrity": "sha512-ZnQMnLV4e7hDlUvw8H+U8ASL02SS2Gn6+9Ac3wGGLIe7+je2AeAOxPY+izIPJDfFDb7eDjev0Us8MO1iFRN8hA==", - "dev": true + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/@humanwhocodes/object-schema/-/object-schema-2.0.3.tgz", + "integrity": "sha512-93zYdMES/c1D69yZiKDBj0V24vqNzB/koF26KPaagAfd3P/4gUlh3Dys5ogAK+Exi9QyzlD8x/08Zt7wIKcDcA==", + "deprecated": "Use @eslint/object-schema instead", + "dev": true, + "license": "BSD-3-Clause" }, "node_modules/@nodelib/fs.scandir": { "version": "2.1.5", @@ -188,6 +198,13 @@ "@types/node": "*" } }, + "node_modules/@ungap/structured-clone": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/@ungap/structured-clone/-/structured-clone-1.2.0.tgz", + "integrity": "sha512-zuVdFrMJiuCDQUMCzQaD6KL28MjnqqN8XnAqiEq9PNm/hCPTSGfrXCOfwj1ow4LFb/tNymJPwsNbVePc1xFqrQ==", + "dev": true, + "license": "ISC" + }, "node_modules/@zotero/eslint-config": { "version": "1.0.7", "resolved": "https://registry.npmjs.org/@zotero/eslint-config/-/eslint-config-1.0.7.tgz", @@ -198,10 +215,11 @@ } }, "node_modules/acorn": { - "version": "8.8.2", - "resolved": "https://registry.npmjs.org/acorn/-/acorn-8.8.2.tgz", - "integrity": "sha512-xjIYgE8HBrkpd/sJqOGNspf8uHG+NOHGOw6a/Urj8taM2EXfdNAH2oFcPeIFfsv3+kz/mJrS5VuMqbNLjCa2vw==", + "version": "8.12.1", + "resolved": "https://registry.npmjs.org/acorn/-/acorn-8.12.1.tgz", + "integrity": "sha512-tcpGyI9zbizT9JbV6oYE477V6mTlXvvi0T0G3SNIYE2apm/G5huBa1+K89VGeovbg+jycCrfhl3ADxErOuO6Jg==", "dev": true, + "license": "MIT", "bin": { "acorn": "bin/acorn" }, @@ -214,6 +232,7 @@ "resolved": "https://registry.npmjs.org/acorn-jsx/-/acorn-jsx-5.3.2.tgz", "integrity": "sha512-rq9s+JNhf0IChjtDXxllJ7g41oZk5SlXtp0LHwyA5cejwn7vKmKp4pPri6YEePv2PU65sAsegbXtIinmDFDXgQ==", "dev": true, + "license": "MIT", "peerDependencies": { "acorn": "^6.0.0 || ^7.0.0 || ^8.0.0" } @@ -235,6 +254,7 @@ "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.12.6.tgz", "integrity": "sha512-j3fVLgvTo527anyYyJOGTYJbG+vnnQYvE0m5mmkc1TK+nxAppkCLMIL0aZ4dblVCNoGShhm+kzE4ZUykBoMg4g==", "dev": true, + "license": "MIT", "dependencies": { "fast-deep-equal": "^3.1.1", "fast-json-stable-stringify": "^2.0.0", @@ -274,7 +294,8 @@ "version": "2.0.1", "resolved": "https://registry.npmjs.org/argparse/-/argparse-2.0.1.tgz", "integrity": "sha512-8+9WqebbFzpX9OR+Wa6O29asIogeRMzcGtAINdpMHHyAg10f05aSFVBbcEqGf/PXw1EjAZ+q2/bEBg3DvurK3Q==", - "dev": true + "dev": true, + "license": "Python-2.0" }, "node_modules/ast-types": { "version": "0.13.4", @@ -295,12 +316,13 @@ "dev": true }, "node_modules/axios": { - "version": "1.6.7", - "resolved": "https://registry.npmjs.org/axios/-/axios-1.6.7.tgz", - "integrity": "sha512-/hDJGff6/c7u0hDkvkGxR/oy6CbCs8ziCsC7SqmhjfozqiJGc8Z11wrv9z9lYfY4K8l+H9TpjcMDX0xOZmx+RA==", + "version": "1.7.7", + "resolved": "https://registry.npmjs.org/axios/-/axios-1.7.7.tgz", + "integrity": "sha512-S4kL7XrjgBmvdGut0sN3yJxqYzrDOnivkBiN0OFs6hLiUam3UPvswUo0kqGyhqUZGEOytHyumEdXsAkgCOUf3Q==", "dev": true, + "license": "MIT", "dependencies": { - "follow-redirects": "^1.15.4", + "follow-redirects": "^1.15.6", "form-data": "^4.0.0", "proxy-from-env": "^1.1.0" } @@ -344,6 +366,7 @@ "resolved": "https://registry.npmjs.org/callsites/-/callsites-3.1.0.tgz", "integrity": "sha512-P8BjAsXvZS+VIDUI11hHCQEv74YT67YUi5JJFNWIqL235sBmjX4+qx9Muvls5ivyNENctx46xQLQ3aTuE7ssaQ==", "dev": true, + "license": "MIT", "engines": { "node": ">=6" } @@ -575,27 +598,30 @@ } }, "node_modules/eslint": { - "version": "8.38.0", - "resolved": "https://registry.npmjs.org/eslint/-/eslint-8.38.0.tgz", - "integrity": "sha512-pIdsD2jwlUGf/U38Jv97t8lq6HpaU/G9NKbYmpWpZGw3LdTNhZLbJePqxOXGB5+JEKfOPU/XLxYxFh03nr1KTg==", + "version": "8.57.1", + "resolved": "https://registry.npmjs.org/eslint/-/eslint-8.57.1.tgz", + "integrity": "sha512-ypowyDxpVSYpkXr9WPv2PAZCtNip1Mv5KTW0SCurXv/9iOpcrH9PaqUElksqEB6pChqHGDRCFTyrZlGhnLNGiA==", + "deprecated": "This version is no longer supported. Please see https://eslint.org/version-support for other options.", "dev": true, + "license": "MIT", "dependencies": { "@eslint-community/eslint-utils": "^4.2.0", - "@eslint-community/regexpp": "^4.4.0", - "@eslint/eslintrc": "^2.0.2", - "@eslint/js": "8.38.0", - "@humanwhocodes/config-array": "^0.11.8", + "@eslint-community/regexpp": "^4.6.1", + "@eslint/eslintrc": "^2.1.4", + "@eslint/js": "8.57.1", + "@humanwhocodes/config-array": "^0.13.0", "@humanwhocodes/module-importer": "^1.0.1", "@nodelib/fs.walk": "^1.2.8", - "ajv": "^6.10.0", + "@ungap/structured-clone": "^1.2.0", + "ajv": "^6.12.4", "chalk": "^4.0.0", "cross-spawn": "^7.0.2", "debug": "^4.3.2", "doctrine": "^3.0.0", "escape-string-regexp": "^4.0.0", - "eslint-scope": "^7.1.1", - "eslint-visitor-keys": "^3.4.0", - "espree": "^9.5.1", + "eslint-scope": "^7.2.2", + "eslint-visitor-keys": "^3.4.3", + "espree": "^9.6.1", "esquery": "^1.4.2", "esutils": "^2.0.2", "fast-deep-equal": "^3.1.3", @@ -603,22 +629,19 @@ "find-up": "^5.0.0", "glob-parent": "^6.0.2", "globals": "^13.19.0", - "grapheme-splitter": "^1.0.4", + "graphemer": "^1.4.0", "ignore": "^5.2.0", - "import-fresh": "^3.0.0", "imurmurhash": "^0.1.4", "is-glob": "^4.0.0", "is-path-inside": "^3.0.3", - "js-sdsl": "^4.1.4", "js-yaml": "^4.1.0", "json-stable-stringify-without-jsonify": "^1.0.1", "levn": "^0.4.1", "lodash.merge": "^4.6.2", "minimatch": "^3.1.2", "natural-compare": "^1.4.0", - "optionator": "^0.9.1", + "optionator": "^0.9.3", "strip-ansi": "^6.0.1", - "strip-json-comments": "^3.1.0", "text-table": "^0.2.0" }, "bin": { @@ -636,10 +659,11 @@ "link": true }, "node_modules/eslint-scope": { - "version": "7.2.0", - "resolved": "https://registry.npmjs.org/eslint-scope/-/eslint-scope-7.2.0.tgz", - "integrity": "sha512-DYj5deGlHBfMt15J7rdtyKNq/Nqlv5KfU4iodrQ019XESsRnwXH9KAE0y3cwtUHDo2ob7CypAnCqefh6vioWRw==", + "version": "7.2.2", + "resolved": "https://registry.npmjs.org/eslint-scope/-/eslint-scope-7.2.2.tgz", + "integrity": "sha512-dOt21O7lTMhDM+X9mB4GX+DZrZtCUJPL/wlcTqxyrx5IvO0IYtILdtrQGQp+8n5S0gwSVmOf9NQrjMOgfQZlIg==", "dev": true, + "license": "BSD-2-Clause", "dependencies": { "esrecurse": "^4.3.0", "estraverse": "^5.2.0" @@ -652,10 +676,11 @@ } }, "node_modules/eslint-visitor-keys": { - "version": "3.4.0", - "resolved": "https://registry.npmjs.org/eslint-visitor-keys/-/eslint-visitor-keys-3.4.0.tgz", - "integrity": "sha512-HPpKPUBQcAsZOsHAFwTtIKcYlCje62XB7SEAcxjtmW6TD1WVpkS6i6/hOVtTZIl4zGj/mBqpFVGvaDneik+VoQ==", + "version": "3.4.3", + "resolved": "https://registry.npmjs.org/eslint-visitor-keys/-/eslint-visitor-keys-3.4.3.tgz", + "integrity": "sha512-wpc+LXeiyiisxPlEkUzU6svyS1frIO3Mgxj1fdy7Pm8Ygzguax2N3Fa/D/ag1WqbOprdI+uY6wMUl8/a2G+iag==", "dev": true, + "license": "Apache-2.0", "engines": { "node": "^12.22.0 || ^14.17.0 || >=16.0.0" }, @@ -664,14 +689,15 @@ } }, "node_modules/espree": { - "version": "9.5.1", - "resolved": "https://registry.npmjs.org/espree/-/espree-9.5.1.tgz", - "integrity": "sha512-5yxtHSZXRSW5pvv3hAlXM5+/Oswi1AUFqBmbibKb5s6bp3rGIDkyXU6xCoyuuLhijr4SFwPrXRoZjz0AZDN9tg==", + "version": "9.6.1", + "resolved": "https://registry.npmjs.org/espree/-/espree-9.6.1.tgz", + "integrity": "sha512-oruZaFkjorTpF32kDSI5/75ViwGeZginGGy2NoOSg3Q9bnwlnmDm4HLnkl0RE3n+njDXR037aY1+x58Z/zFdwQ==", "dev": true, + "license": "BSD-2-Clause", "dependencies": { - "acorn": "^8.8.0", + "acorn": "^8.9.0", "acorn-jsx": "^5.3.2", - "eslint-visitor-keys": "^3.4.0" + "eslint-visitor-keys": "^3.4.1" }, "engines": { "node": "^12.22.0 || ^14.17.0 || >=16.0.0" @@ -710,6 +736,7 @@ "resolved": "https://registry.npmjs.org/esrecurse/-/esrecurse-4.3.0.tgz", "integrity": "sha512-KmfKL3b6G+RXvP8N1vr3Tq1kL/oCFgn2NYXEtqP8/L3pKapUA4G8cFVaoF3SU323CD4XypR/ffioHmkti6/Tag==", "dev": true, + "license": "BSD-2-Clause", "dependencies": { "estraverse": "^5.2.0" }, @@ -759,19 +786,22 @@ "version": "3.1.3", "resolved": "https://registry.npmjs.org/fast-deep-equal/-/fast-deep-equal-3.1.3.tgz", "integrity": "sha512-f3qQ9oQy9j2AhBe/H9VC91wLmKBCCU/gDOnKNAYG5hswO7BLKj09Hc5HYNz9cGI++xlpDCIgDaitVs03ATR84Q==", - "dev": true + "dev": true, + "license": "MIT" }, "node_modules/fast-json-stable-stringify": { "version": "2.1.0", "resolved": "https://registry.npmjs.org/fast-json-stable-stringify/-/fast-json-stable-stringify-2.1.0.tgz", "integrity": "sha512-lhd/wF+Lk98HZoTCtlVraHtfh5XYijIjalXck7saUtuanSDyLMxnHhSXEDJqHxD7msR8D0uCmqlkwjCV8xvwHw==", - "dev": true + "dev": true, + "license": "MIT" }, "node_modules/fast-levenshtein": { "version": "2.0.6", "resolved": "https://registry.npmjs.org/fast-levenshtein/-/fast-levenshtein-2.0.6.tgz", "integrity": "sha512-DCXu6Ifhqcks7TZKY3Hxp3y6qphY5SJZmrWMDrKcERSOXWQdMhU9Ig/PYrzyw/ul9jOIyh0N4M0tbC5hodg8dw==", - "dev": true + "dev": true, + "license": "MIT" }, "node_modules/fastq": { "version": "1.15.0", @@ -845,9 +875,9 @@ "dev": true }, "node_modules/follow-redirects": { - "version": "1.15.5", - "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.5.tgz", - "integrity": "sha512-vSFWUON1B+yAw1VN4xMfxgn5fTUiaOzAJCKBwIIgT/+7CuGy9+r+5gITvP62j3RmaD5Ph65UaERdOSRGUzZtgw==", + "version": "1.15.9", + "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.9.tgz", + "integrity": "sha512-gew4GsXizNgdoRyqmyfMHyAmXsZDk6mHkSxZFCzW9gwlbtOW44CDtYavM+y+72qD/Vq2l550kMF52DT8fOLJqQ==", "dev": true, "funding": [ { @@ -855,6 +885,7 @@ "url": "https://github.com/sponsors/RubenVerborgh" } ], + "license": "MIT", "engines": { "node": ">=4.0" }, @@ -961,10 +992,11 @@ } }, "node_modules/globals": { - "version": "13.20.0", - "resolved": "https://registry.npmjs.org/globals/-/globals-13.20.0.tgz", - "integrity": "sha512-Qg5QtVkCy/kv3FUSlu4ukeZDVf9ee0iXLAUYX13gbR17bnejFTzr4iS9bY7kwCf1NztRNm1t91fjOiyx4CSwPQ==", + "version": "13.24.0", + "resolved": "https://registry.npmjs.org/globals/-/globals-13.24.0.tgz", + "integrity": "sha512-AhO5QUcj8llrbG09iWhPU2B204J1xnPeL8kQmVorSsy+Sjj1sk8gIyh6cUocGmH4L0UuhAJy+hJMRA4mgA4mFQ==", "dev": true, + "license": "MIT", "dependencies": { "type-fest": "^0.20.2" }, @@ -981,11 +1013,12 @@ "integrity": "sha512-RbJ5/jmFcNNCcDV5o9eTnBLJ/HszWV0P73bc+Ff4nS/rJj+YaS6IGyiOL0VoBYX+l1Wrl3k63h/KrH+nhJ0XvQ==", "dev": true }, - "node_modules/grapheme-splitter": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/grapheme-splitter/-/grapheme-splitter-1.0.4.tgz", - "integrity": "sha512-bzh50DW9kTPM00T8y4o8vQg89Di9oLJVLW/KaOGIXJWP/iqCN6WKYkbNOF04vFLJhwcpYUh9ydh/+5vpOqV4YQ==", - "dev": true + "node_modules/graphemer": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/graphemer/-/graphemer-1.4.0.tgz", + "integrity": "sha512-EtKwoO6kxCL9WO5xipiHTZlSzBm7WLT627TqC/uVRd0HKmq8NXyebnNYxDoBi7wt8eTWrUrKXCOVaFq9x1kgag==", + "dev": true, + "license": "MIT" }, "node_modules/has-flag": { "version": "4.0.0", @@ -1023,10 +1056,11 @@ } }, "node_modules/ignore": { - "version": "5.2.4", - "resolved": "https://registry.npmjs.org/ignore/-/ignore-5.2.4.tgz", - "integrity": "sha512-MAb38BcSbH0eHNBxn7ql2NH/kX33OkB3lZ1BNdh7ENeRChHTYsTvWrMubiIAMNS2llXEEgZ1MUOBtXChP3kaFQ==", + "version": "5.3.2", + "resolved": "https://registry.npmjs.org/ignore/-/ignore-5.3.2.tgz", + "integrity": "sha512-hsBTNUqQTDwkWtcdYI2i06Y/nUBEsNEDJKjWdigLvegy8kDuJAS8uRlpkkcQpyEXL0Z/pjDy5HBmMjRCJ2gq+g==", "dev": true, + "license": "MIT", "engines": { "node": ">= 4" } @@ -1042,6 +1076,7 @@ "resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-3.3.0.tgz", "integrity": "sha512-veYYhQa+D1QBKznvhUHxb8faxlrwUnxseDAbAp457E0wLNio2bOSKnjYDhMj+YiAq61xrMGhQk9iXVk5FzgQMw==", "dev": true, + "license": "MIT", "dependencies": { "parent-module": "^1.0.0", "resolve-from": "^4.0.0" @@ -1162,21 +1197,12 @@ "integrity": "sha512-RHxMLp9lnKHGHRng9QFhRCMbYAcVpn69smSGcq3f36xjgVVWThj4qqLbTLlq7Ssj8B+fIQ1EuCEGI2lKsyQeIw==", "dev": true }, - "node_modules/js-sdsl": { - "version": "4.4.0", - "resolved": "https://registry.npmjs.org/js-sdsl/-/js-sdsl-4.4.0.tgz", - "integrity": "sha512-FfVSdx6pJ41Oa+CF7RDaFmTnCaFhua+SNYQX74riGOpl96x+2jQCqEfQ2bnXu/5DPCqlRuiqyvTJM0Qjz26IVg==", - "dev": true, - "funding": { - "type": "opencollective", - "url": "https://opencollective.com/js-sdsl" - } - }, "node_modules/js-yaml": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/js-yaml/-/js-yaml-4.1.0.tgz", "integrity": "sha512-wpxZs9NoxZaJESJGIZTyDEaYpl0FKSA+FB9aJiyemKhMwkxQg63h4T1KJgUGHpTqPDNRcmmYLugrRjJlBtWvRA==", "dev": true, + "license": "MIT", "dependencies": { "argparse": "^2.0.1" }, @@ -1194,7 +1220,8 @@ "version": "0.4.1", "resolved": "https://registry.npmjs.org/json-schema-traverse/-/json-schema-traverse-0.4.1.tgz", "integrity": "sha512-xbbCH5dCYU5T8LcEhhuh7HJ88HXuW3qsI3Y0zOZFKfZEHcpWiHU/Jxzk629Brsab/mMiHQti9wMP+845RPe3Vg==", - "dev": true + "dev": true, + "license": "MIT" }, "node_modules/json-stable-stringify-without-jsonify": { "version": "1.0.1", @@ -1231,6 +1258,7 @@ "resolved": "https://registry.npmjs.org/levn/-/levn-0.4.1.tgz", "integrity": "sha512-+bT2uH4E5LGE7h/n3evcS/sQlJXCpIp6ym8OWJ5eV6+67Dsql/LaaT7qJBAt2rzfoa/5QBGBhxDix1dMt2kQKQ==", "dev": true, + "license": "MIT", "dependencies": { "prelude-ls": "^1.2.1", "type-check": "~0.4.0" @@ -1342,17 +1370,18 @@ } }, "node_modules/optionator": { - "version": "0.9.1", - "resolved": "https://registry.npmjs.org/optionator/-/optionator-0.9.1.tgz", - "integrity": "sha512-74RlY5FCnhq4jRxVUPKDaRwrVNXMqsGsiW6AJw4XK8hmtm10wC0ypZBLw5IIp85NZMr91+qd1RvvENwg7jjRFw==", + "version": "0.9.4", + "resolved": "https://registry.npmjs.org/optionator/-/optionator-0.9.4.tgz", + "integrity": "sha512-6IpQ7mKUxRcZNLIObR0hz7lxsapSSIYNZJwXPGeF0mTVqGKFIXj1DQcMoT22S3ROcLyY/rz0PWaWZ9ayWmad9g==", "dev": true, + "license": "MIT", "dependencies": { "deep-is": "^0.1.3", "fast-levenshtein": "^2.0.6", "levn": "^0.4.1", "prelude-ls": "^1.2.1", "type-check": "^0.4.0", - "word-wrap": "^1.2.3" + "word-wrap": "^1.2.5" }, "engines": { "node": ">= 0.8.0" @@ -1431,6 +1460,7 @@ "resolved": "https://registry.npmjs.org/parent-module/-/parent-module-1.0.1.tgz", "integrity": "sha512-GQ2EWRpQV8/o+Aw8YqtfZZPfNRWZYkbidE9k5rpl/hC3vtHHBfGm2Ifi6qWV+coDGkrUKZAxE3Lot5kcsRlh+g==", "dev": true, + "license": "MIT", "dependencies": { "callsites": "^3.0.0" }, @@ -1476,6 +1506,7 @@ "resolved": "https://registry.npmjs.org/prelude-ls/-/prelude-ls-1.2.1.tgz", "integrity": "sha512-vkcDPrRZo1QZLbn5RLGPpg/WmIQ65qoWWhcGKf/b5eplkkarX0m9z8ppCat4mlOqUsWpyNuYgO3VRyrYHSzX5g==", "dev": true, + "license": "MIT", "engines": { "node": ">= 0.8.0" } @@ -1522,10 +1553,11 @@ } }, "node_modules/punycode": { - "version": "2.3.0", - "resolved": "https://registry.npmjs.org/punycode/-/punycode-2.3.0.tgz", - "integrity": "sha512-rRV+zQD8tVFys26lAGR9WUuS4iUAngJScM+ZRSKtvl5tKeZ2t5bvdNFdNHBW9FWR4guGHlgmsZ1G7BSm2wTbuA==", + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/punycode/-/punycode-2.3.1.tgz", + "integrity": "sha512-vYt7UD1U9Wg6138shLtLOvdAu+8DsC/ilFtEVHcH+wydcSpNE20AfSOduf6MkRFahL5FY7X1oU7nKVZFtfq8Fg==", "dev": true, + "license": "MIT", "engines": { "node": ">=6" } @@ -1591,6 +1623,7 @@ "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-4.0.0.tgz", "integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g==", "dev": true, + "license": "MIT", "engines": { "node": ">=4" } @@ -1770,6 +1803,7 @@ "resolved": "https://registry.npmjs.org/strip-json-comments/-/strip-json-comments-3.1.1.tgz", "integrity": "sha512-6fPc+R4ihwqP6N/aIv2f1gMH8lOVtWQHoqC4yK6oSDVVocumAsfCqjkXnqiYMhmMwS/mEHLp7Vehlt3ql6lEig==", "dev": true, + "license": "MIT", "engines": { "node": ">=8" }, @@ -1845,6 +1879,7 @@ "resolved": "https://registry.npmjs.org/type-check/-/type-check-0.4.0.tgz", "integrity": "sha512-XleUoc9uwGXqjWwXaUTZAmzMcFZ5858QA2vvx1Ur5xIcixXIP+8LnFDgRplU30us6teqdlskFfu+ae4K79Ooew==", "dev": true, + "license": "MIT", "dependencies": { "prelude-ls": "^1.2.1" }, @@ -1857,6 +1892,7 @@ "resolved": "https://registry.npmjs.org/type-fest/-/type-fest-0.20.2.tgz", "integrity": "sha512-Ne+eE4r0/iWnpAxD852z3A+N0Bt5RN//NjJwRd2VFHEmrywxf5vsZlh4R6lixl6B+wz/8d+maTSAkN1FIkI3LQ==", "dev": true, + "license": "(MIT OR CC0-1.0)", "engines": { "node": ">=10" }, @@ -1878,6 +1914,7 @@ "resolved": "https://registry.npmjs.org/uri-js/-/uri-js-4.4.1.tgz", "integrity": "sha512-7rKUyy33Q1yc98pQ1DAmLtwX109F7TIfWlW1Ydo8Wl1ii1SeHieeh0HHfPeL2fMXK6z0s8ecKs9frCuLJvndBg==", "dev": true, + "license": "BSD-2-Clause", "dependencies": { "punycode": "^2.1.0" } @@ -1914,10 +1951,11 @@ } }, "node_modules/word-wrap": { - "version": "1.2.3", - "resolved": "https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.3.tgz", - "integrity": "sha512-Hz/mrNwitNRh/HUAtM/VT/5VH+ygD6DV7mYKZAtHOrbs8U7lvPS6xf7EJKMF0uW1KJCl0H701g3ZGus+muE5vQ==", + "version": "1.2.5", + "resolved": "https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.5.tgz", + "integrity": "sha512-BN22B5eaMMI9UMtjrGd5g5eCYPpCPDUy0FJXbYsaT5zYxjFOckS53SQDE3pWkVoWpHXVb3BrYcEN4Twa55B5cA==", "dev": true, + "license": "MIT", "engines": { "node": ">=0.10.0" } @@ -1929,10 +1967,11 @@ "dev": true }, "node_modules/ws": { - "version": "8.13.0", - "resolved": "https://registry.npmjs.org/ws/-/ws-8.13.0.tgz", - "integrity": "sha512-x9vcZYTrFPC7aSIbj7sRCYo7L/Xb8Iy+pW0ng0wt2vCJv7M9HOMy0UoN3rr+IFC7hb7vXoqS+P9ktyLLLhO+LA==", + "version": "8.18.0", + "resolved": "https://registry.npmjs.org/ws/-/ws-8.18.0.tgz", + "integrity": "sha512-8VbfWfHLbbwu3+N6OKsOMpBdT4kXPDDB9cJk2bJ6mh9ucxdlnNvH1e+roYkKmN9Nxw2yjz7VzeO9oOz2zJ04Pw==", "dev": true, + "license": "MIT", "engines": { "node": ">=10.0.0" }, @@ -1983,20 +2022,20 @@ } }, "@eslint-community/regexpp": { - "version": "4.5.0", - "resolved": "https://registry.npmjs.org/@eslint-community/regexpp/-/regexpp-4.5.0.tgz", - "integrity": "sha512-vITaYzIcNmjn5tF5uxcZ/ft7/RXGrMUIS9HalWckEOF6ESiwXKoMzAQf2UW0aVd6rnOeExTJVd5hmWXucBKGXQ==", + "version": "4.11.1", + "resolved": "https://registry.npmjs.org/@eslint-community/regexpp/-/regexpp-4.11.1.tgz", + "integrity": "sha512-m4DVN9ZqskZoLU5GlWZadwDnYo3vAEydiUayB9widCl9ffWx2IvPnp6n3on5rJmziJSw9Bv+Z3ChDVdMwXCY8Q==", "dev": true }, "@eslint/eslintrc": { - "version": "2.0.2", - "resolved": "https://registry.npmjs.org/@eslint/eslintrc/-/eslintrc-2.0.2.tgz", - "integrity": "sha512-3W4f5tDUra+pA+FzgugqL2pRimUTDJWKr7BINqOpkZrC0uYI0NIc0/JFgBROCU07HR6GieA5m3/rsPIhDmCXTQ==", + "version": "2.1.4", + "resolved": "https://registry.npmjs.org/@eslint/eslintrc/-/eslintrc-2.1.4.tgz", + "integrity": "sha512-269Z39MS6wVJtsoUl10L60WdkhJVdPG24Q4eZTH3nnF6lpvSShEK3wQjDX9JRWAUPvPh7COouPpU9IrqaZFvtQ==", "dev": true, "requires": { "ajv": "^6.12.4", "debug": "^4.3.2", - "espree": "^9.5.1", + "espree": "^9.6.0", "globals": "^13.19.0", "ignore": "^5.2.0", "import-fresh": "^3.2.1", @@ -2006,19 +2045,19 @@ } }, "@eslint/js": { - "version": "8.38.0", - "resolved": "https://registry.npmjs.org/@eslint/js/-/js-8.38.0.tgz", - "integrity": "sha512-IoD2MfUnOV58ghIHCiil01PcohxjbYR/qCxsoC+xNgUwh1EY8jOOrYmu3d3a71+tJJ23uscEV4X2HJWMsPJu4g==", + "version": "8.57.1", + "resolved": "https://registry.npmjs.org/@eslint/js/-/js-8.57.1.tgz", + "integrity": "sha512-d9zaMRSTIKDLhctzH12MtXvJKSSUhaHcjV+2Z+GK+EEY7XKpP5yR4x+N3TAcHTcu963nIr+TMcCb4DBCYX1z6Q==", "dev": true }, "@humanwhocodes/config-array": { - "version": "0.11.8", - "resolved": "https://registry.npmjs.org/@humanwhocodes/config-array/-/config-array-0.11.8.tgz", - "integrity": "sha512-UybHIJzJnR5Qc/MsD9Kr+RpO2h+/P1GhOwdiLPXK5TWk5sgTdu88bTD9UP+CKbPPh5Rni1u0GjAdYQLemG8g+g==", + "version": "0.13.0", + "resolved": "https://registry.npmjs.org/@humanwhocodes/config-array/-/config-array-0.13.0.tgz", + "integrity": "sha512-DZLEEqFWQFiyK6h5YIeynKx7JlvCYWL0cImfSRXZ9l4Sg2efkFGTuFf6vzXjK1cq6IYkU+Eg/JizXw+TD2vRNw==", "dev": true, "requires": { - "@humanwhocodes/object-schema": "^1.2.1", - "debug": "^4.1.1", + "@humanwhocodes/object-schema": "^2.0.3", + "debug": "^4.3.1", "minimatch": "^3.0.5" } }, @@ -2029,9 +2068,9 @@ "dev": true }, "@humanwhocodes/object-schema": { - "version": "1.2.1", - "resolved": "https://registry.npmjs.org/@humanwhocodes/object-schema/-/object-schema-1.2.1.tgz", - "integrity": "sha512-ZnQMnLV4e7hDlUvw8H+U8ASL02SS2Gn6+9Ac3wGGLIe7+je2AeAOxPY+izIPJDfFDb7eDjev0Us8MO1iFRN8hA==", + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/@humanwhocodes/object-schema/-/object-schema-2.0.3.tgz", + "integrity": "sha512-93zYdMES/c1D69yZiKDBj0V24vqNzB/koF26KPaagAfd3P/4gUlh3Dys5ogAK+Exi9QyzlD8x/08Zt7wIKcDcA==", "dev": true }, "@nodelib/fs.scandir": { @@ -2089,6 +2128,12 @@ "@types/node": "*" } }, + "@ungap/structured-clone": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/@ungap/structured-clone/-/structured-clone-1.2.0.tgz", + "integrity": "sha512-zuVdFrMJiuCDQUMCzQaD6KL28MjnqqN8XnAqiEq9PNm/hCPTSGfrXCOfwj1ow4LFb/tNymJPwsNbVePc1xFqrQ==", + "dev": true + }, "@zotero/eslint-config": { "version": "1.0.7", "resolved": "https://registry.npmjs.org/@zotero/eslint-config/-/eslint-config-1.0.7.tgz", @@ -2097,9 +2142,9 @@ "requires": {} }, "acorn": { - "version": "8.8.2", - "resolved": "https://registry.npmjs.org/acorn/-/acorn-8.8.2.tgz", - "integrity": "sha512-xjIYgE8HBrkpd/sJqOGNspf8uHG+NOHGOw6a/Urj8taM2EXfdNAH2oFcPeIFfsv3+kz/mJrS5VuMqbNLjCa2vw==", + "version": "8.12.1", + "resolved": "https://registry.npmjs.org/acorn/-/acorn-8.12.1.tgz", + "integrity": "sha512-tcpGyI9zbizT9JbV6oYE477V6mTlXvvi0T0G3SNIYE2apm/G5huBa1+K89VGeovbg+jycCrfhl3ADxErOuO6Jg==", "dev": true }, "acorn-jsx": { @@ -2167,12 +2212,12 @@ "dev": true }, "axios": { - "version": "1.6.7", - "resolved": "https://registry.npmjs.org/axios/-/axios-1.6.7.tgz", - "integrity": "sha512-/hDJGff6/c7u0hDkvkGxR/oy6CbCs8ziCsC7SqmhjfozqiJGc8Z11wrv9z9lYfY4K8l+H9TpjcMDX0xOZmx+RA==", + "version": "1.7.7", + "resolved": "https://registry.npmjs.org/axios/-/axios-1.7.7.tgz", + "integrity": "sha512-S4kL7XrjgBmvdGut0sN3yJxqYzrDOnivkBiN0OFs6hLiUam3UPvswUo0kqGyhqUZGEOytHyumEdXsAkgCOUf3Q==", "dev": true, "requires": { - "follow-redirects": "^1.15.4", + "follow-redirects": "^1.15.6", "form-data": "^4.0.0", "proxy-from-env": "^1.1.0" } @@ -2376,27 +2421,28 @@ } }, "eslint": { - "version": "8.38.0", - "resolved": "https://registry.npmjs.org/eslint/-/eslint-8.38.0.tgz", - "integrity": "sha512-pIdsD2jwlUGf/U38Jv97t8lq6HpaU/G9NKbYmpWpZGw3LdTNhZLbJePqxOXGB5+JEKfOPU/XLxYxFh03nr1KTg==", + "version": "8.57.1", + "resolved": "https://registry.npmjs.org/eslint/-/eslint-8.57.1.tgz", + "integrity": "sha512-ypowyDxpVSYpkXr9WPv2PAZCtNip1Mv5KTW0SCurXv/9iOpcrH9PaqUElksqEB6pChqHGDRCFTyrZlGhnLNGiA==", "dev": true, "requires": { "@eslint-community/eslint-utils": "^4.2.0", - "@eslint-community/regexpp": "^4.4.0", - "@eslint/eslintrc": "^2.0.2", - "@eslint/js": "8.38.0", - "@humanwhocodes/config-array": "^0.11.8", + "@eslint-community/regexpp": "^4.6.1", + "@eslint/eslintrc": "^2.1.4", + "@eslint/js": "8.57.1", + "@humanwhocodes/config-array": "^0.13.0", "@humanwhocodes/module-importer": "^1.0.1", "@nodelib/fs.walk": "^1.2.8", - "ajv": "^6.10.0", + "@ungap/structured-clone": "^1.2.0", + "ajv": "^6.12.4", "chalk": "^4.0.0", "cross-spawn": "^7.0.2", "debug": "^4.3.2", "doctrine": "^3.0.0", "escape-string-regexp": "^4.0.0", - "eslint-scope": "^7.1.1", - "eslint-visitor-keys": "^3.4.0", - "espree": "^9.5.1", + "eslint-scope": "^7.2.2", + "eslint-visitor-keys": "^3.4.3", + "espree": "^9.6.1", "esquery": "^1.4.2", "esutils": "^2.0.2", "fast-deep-equal": "^3.1.3", @@ -2404,22 +2450,19 @@ "find-up": "^5.0.0", "glob-parent": "^6.0.2", "globals": "^13.19.0", - "grapheme-splitter": "^1.0.4", + "graphemer": "^1.4.0", "ignore": "^5.2.0", - "import-fresh": "^3.0.0", "imurmurhash": "^0.1.4", "is-glob": "^4.0.0", "is-path-inside": "^3.0.3", - "js-sdsl": "^4.1.4", "js-yaml": "^4.1.0", "json-stable-stringify-without-jsonify": "^1.0.1", "levn": "^0.4.1", "lodash.merge": "^4.6.2", "minimatch": "^3.1.2", "natural-compare": "^1.4.0", - "optionator": "^0.9.1", + "optionator": "^0.9.3", "strip-ansi": "^6.0.1", - "strip-json-comments": "^3.1.0", "text-table": "^0.2.0" } }, @@ -2434,9 +2477,9 @@ } }, "eslint-scope": { - "version": "7.2.0", - "resolved": "https://registry.npmjs.org/eslint-scope/-/eslint-scope-7.2.0.tgz", - "integrity": "sha512-DYj5deGlHBfMt15J7rdtyKNq/Nqlv5KfU4iodrQ019XESsRnwXH9KAE0y3cwtUHDo2ob7CypAnCqefh6vioWRw==", + "version": "7.2.2", + "resolved": "https://registry.npmjs.org/eslint-scope/-/eslint-scope-7.2.2.tgz", + "integrity": "sha512-dOt21O7lTMhDM+X9mB4GX+DZrZtCUJPL/wlcTqxyrx5IvO0IYtILdtrQGQp+8n5S0gwSVmOf9NQrjMOgfQZlIg==", "dev": true, "requires": { "esrecurse": "^4.3.0", @@ -2444,20 +2487,20 @@ } }, "eslint-visitor-keys": { - "version": "3.4.0", - "resolved": "https://registry.npmjs.org/eslint-visitor-keys/-/eslint-visitor-keys-3.4.0.tgz", - "integrity": "sha512-HPpKPUBQcAsZOsHAFwTtIKcYlCje62XB7SEAcxjtmW6TD1WVpkS6i6/hOVtTZIl4zGj/mBqpFVGvaDneik+VoQ==", + "version": "3.4.3", + "resolved": "https://registry.npmjs.org/eslint-visitor-keys/-/eslint-visitor-keys-3.4.3.tgz", + "integrity": "sha512-wpc+LXeiyiisxPlEkUzU6svyS1frIO3Mgxj1fdy7Pm8Ygzguax2N3Fa/D/ag1WqbOprdI+uY6wMUl8/a2G+iag==", "dev": true }, "espree": { - "version": "9.5.1", - "resolved": "https://registry.npmjs.org/espree/-/espree-9.5.1.tgz", - "integrity": "sha512-5yxtHSZXRSW5pvv3hAlXM5+/Oswi1AUFqBmbibKb5s6bp3rGIDkyXU6xCoyuuLhijr4SFwPrXRoZjz0AZDN9tg==", + "version": "9.6.1", + "resolved": "https://registry.npmjs.org/espree/-/espree-9.6.1.tgz", + "integrity": "sha512-oruZaFkjorTpF32kDSI5/75ViwGeZginGGy2NoOSg3Q9bnwlnmDm4HLnkl0RE3n+njDXR037aY1+x58Z/zFdwQ==", "dev": true, "requires": { - "acorn": "^8.8.0", + "acorn": "^8.9.0", "acorn-jsx": "^5.3.2", - "eslint-visitor-keys": "^3.4.0" + "eslint-visitor-keys": "^3.4.1" } }, "esprima": { @@ -2586,9 +2629,9 @@ "dev": true }, "follow-redirects": { - "version": "1.15.5", - "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.5.tgz", - "integrity": "sha512-vSFWUON1B+yAw1VN4xMfxgn5fTUiaOzAJCKBwIIgT/+7CuGy9+r+5gITvP62j3RmaD5Ph65UaERdOSRGUzZtgw==", + "version": "1.15.9", + "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.9.tgz", + "integrity": "sha512-gew4GsXizNgdoRyqmyfMHyAmXsZDk6mHkSxZFCzW9gwlbtOW44CDtYavM+y+72qD/Vq2l550kMF52DT8fOLJqQ==", "dev": true }, "form-data": { @@ -2664,9 +2707,9 @@ } }, "globals": { - "version": "13.20.0", - "resolved": "https://registry.npmjs.org/globals/-/globals-13.20.0.tgz", - "integrity": "sha512-Qg5QtVkCy/kv3FUSlu4ukeZDVf9ee0iXLAUYX13gbR17bnejFTzr4iS9bY7kwCf1NztRNm1t91fjOiyx4CSwPQ==", + "version": "13.24.0", + "resolved": "https://registry.npmjs.org/globals/-/globals-13.24.0.tgz", + "integrity": "sha512-AhO5QUcj8llrbG09iWhPU2B204J1xnPeL8kQmVorSsy+Sjj1sk8gIyh6cUocGmH4L0UuhAJy+hJMRA4mgA4mFQ==", "dev": true, "requires": { "type-fest": "^0.20.2" @@ -2678,10 +2721,10 @@ "integrity": "sha512-RbJ5/jmFcNNCcDV5o9eTnBLJ/HszWV0P73bc+Ff4nS/rJj+YaS6IGyiOL0VoBYX+l1Wrl3k63h/KrH+nhJ0XvQ==", "dev": true }, - "grapheme-splitter": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/grapheme-splitter/-/grapheme-splitter-1.0.4.tgz", - "integrity": "sha512-bzh50DW9kTPM00T8y4o8vQg89Di9oLJVLW/KaOGIXJWP/iqCN6WKYkbNOF04vFLJhwcpYUh9ydh/+5vpOqV4YQ==", + "graphemer": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/graphemer/-/graphemer-1.4.0.tgz", + "integrity": "sha512-EtKwoO6kxCL9WO5xipiHTZlSzBm7WLT627TqC/uVRd0HKmq8NXyebnNYxDoBi7wt8eTWrUrKXCOVaFq9x1kgag==", "dev": true }, "has-flag": { @@ -2711,9 +2754,9 @@ } }, "ignore": { - "version": "5.2.4", - "resolved": "https://registry.npmjs.org/ignore/-/ignore-5.2.4.tgz", - "integrity": "sha512-MAb38BcSbH0eHNBxn7ql2NH/kX33OkB3lZ1BNdh7ENeRChHTYsTvWrMubiIAMNS2llXEEgZ1MUOBtXChP3kaFQ==", + "version": "5.3.2", + "resolved": "https://registry.npmjs.org/ignore/-/ignore-5.3.2.tgz", + "integrity": "sha512-hsBTNUqQTDwkWtcdYI2i06Y/nUBEsNEDJKjWdigLvegy8kDuJAS8uRlpkkcQpyEXL0Z/pjDy5HBmMjRCJ2gq+g==", "dev": true }, "immediate": { @@ -2820,12 +2863,6 @@ "integrity": "sha512-RHxMLp9lnKHGHRng9QFhRCMbYAcVpn69smSGcq3f36xjgVVWThj4qqLbTLlq7Ssj8B+fIQ1EuCEGI2lKsyQeIw==", "dev": true }, - "js-sdsl": { - "version": "4.4.0", - "resolved": "https://registry.npmjs.org/js-sdsl/-/js-sdsl-4.4.0.tgz", - "integrity": "sha512-FfVSdx6pJ41Oa+CF7RDaFmTnCaFhua+SNYQX74riGOpl96x+2jQCqEfQ2bnXu/5DPCqlRuiqyvTJM0Qjz26IVg==", - "dev": true - }, "js-yaml": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/js-yaml/-/js-yaml-4.1.0.tgz", @@ -2967,9 +3004,9 @@ } }, "optionator": { - "version": "0.9.1", - "resolved": "https://registry.npmjs.org/optionator/-/optionator-0.9.1.tgz", - "integrity": "sha512-74RlY5FCnhq4jRxVUPKDaRwrVNXMqsGsiW6AJw4XK8hmtm10wC0ypZBLw5IIp85NZMr91+qd1RvvENwg7jjRFw==", + "version": "0.9.4", + "resolved": "https://registry.npmjs.org/optionator/-/optionator-0.9.4.tgz", + "integrity": "sha512-6IpQ7mKUxRcZNLIObR0hz7lxsapSSIYNZJwXPGeF0mTVqGKFIXj1DQcMoT22S3ROcLyY/rz0PWaWZ9ayWmad9g==", "dev": true, "requires": { "deep-is": "^0.1.3", @@ -2977,7 +3014,7 @@ "levn": "^0.4.1", "prelude-ls": "^1.2.1", "type-check": "^0.4.0", - "word-wrap": "^1.2.3" + "word-wrap": "^1.2.5" } }, "p-limit": { @@ -3108,9 +3145,9 @@ } }, "punycode": { - "version": "2.3.0", - "resolved": "https://registry.npmjs.org/punycode/-/punycode-2.3.0.tgz", - "integrity": "sha512-rRV+zQD8tVFys26lAGR9WUuS4iUAngJScM+ZRSKtvl5tKeZ2t5bvdNFdNHBW9FWR4guGHlgmsZ1G7BSm2wTbuA==", + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/punycode/-/punycode-2.3.1.tgz", + "integrity": "sha512-vYt7UD1U9Wg6138shLtLOvdAu+8DsC/ilFtEVHcH+wydcSpNE20AfSOduf6MkRFahL5FY7X1oU7nKVZFtfq8Fg==", "dev": true }, "queue-microtask": { @@ -3384,9 +3421,9 @@ } }, "word-wrap": { - "version": "1.2.3", - "resolved": "https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.3.tgz", - "integrity": "sha512-Hz/mrNwitNRh/HUAtM/VT/5VH+ygD6DV7mYKZAtHOrbs8U7lvPS6xf7EJKMF0uW1KJCl0H701g3ZGus+muE5vQ==", + "version": "1.2.5", + "resolved": "https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.5.tgz", + "integrity": "sha512-BN22B5eaMMI9UMtjrGd5g5eCYPpCPDUy0FJXbYsaT5zYxjFOckS53SQDE3pWkVoWpHXVb3BrYcEN4Twa55B5cA==", "dev": true }, "wrappy": { @@ -3396,9 +3433,9 @@ "dev": true }, "ws": { - "version": "8.13.0", - "resolved": "https://registry.npmjs.org/ws/-/ws-8.13.0.tgz", - "integrity": "sha512-x9vcZYTrFPC7aSIbj7sRCYo7L/Xb8Iy+pW0ng0wt2vCJv7M9HOMy0UoN3rr+IFC7hb7vXoqS+P9ktyLLLhO+LA==", + "version": "8.18.0", + "resolved": "https://registry.npmjs.org/ws/-/ws-8.18.0.tgz", + "integrity": "sha512-8VbfWfHLbbwu3+N6OKsOMpBdT4kXPDDB9cJk2bJ6mh9ucxdlnNvH1e+roYkKmN9Nxw2yjz7VzeO9oOz2zJ04Pw==", "dev": true, "requires": {} }, diff --git a/package.json b/package.json index f033a383fc..681c826fbc 100644 --- a/package.json +++ b/package.json @@ -17,9 +17,12 @@ "devDependencies": { "@zotero/eslint-config": "^1.0.5", "chromedriver": "^122.0.4", + "clarinet": "^0.12.6", "eslint": "^8.38.0", "eslint-plugin-zotero-translator": "file:.ci/eslint-plugin-zotero-translator", - "selenium-webdriver": "^4.0.0-alpha.7", - "clarinet": "^0.12.6" + "selenium-webdriver": "^4.0.0-alpha.7" + }, + "dependencies": { + "ESLint": "npm:eslint@^8.57.1" } }