Supply Chain Management (Part 2 of 2): Application Applied to Food Fraud Prevention

  • John W. Spink
Part of the Food Microbiology and Food Safety book series (FMFS)


This chapter presents the application of supply chain management practices to food fraud prevention. There are SCM systems that are created to address current concerns and also to comply with laws, regulations, certifications, standards, and common practices. This chapter will expand on the previous review of the SCM fundamentals and address several key application challenges as well as the presentation of some specific studies. Since food fraud prevention is currently being developed and implemented, it is opportune to review the broader business application as well as specific insight from other industries.


  1. Anthony, S. D. (2012). First mover or fast follower? Harvard Busines Review Online, Innovation, June 14, 2012, URL:
  2. Arway, A. G. (2016). Supply chain security: A comprehensive approach. Boca Raton, Florida: CRC Press.Google Scholar
  3. Bazerman, M. H. (2001). Consumer research for consumers. Journal of Consumer Research, 27(4), 499–504.CrossRefGoogle Scholar
  4. Bix, L., Clarke, R., Lockhart, H., Twede, D., & Spink, J. (2007). Global data standards in the healthcare supply chain: The Business Case, prepared for The GS1 Healthcare Users Group (HUG). East Lansing, Michigan, Michigan State University, School of Packaging, May 30, 2007.Google Scholar
  5. Bowersox, D. J., Closs, D. J., & Cooper, M. B. (2002). Supply chain logistics management. New York: McGraw-Hill.Google Scholar
  6. BRIDGE. (2007). Building Radio frequency IDentification for the Global Environment (BRIDGE), Pharma traceability pilot, problem analysis, authors: John Jenkins Associates and WP6 partners, 11 July 2007, This work has been partly funded by the European Commission contract No: IST-2005-033546, Disclaimer: This document results from work being done in the framework of the BRIDGE project. It does not represent an official deliverable formally approved by the European Commission.Google Scholar
  7. CA-SB-1476. (2006). California State Bill SB-1476, Figueroa Professions and vocations (AKA Drug Pedigree).Google Scholar
  8. CSBP, California State Board of Pharmacy. (2007). Background and Summary of the California ePedigree Law, December 2007, URL:
  9. CSBP, California State Board of Pharmacy. (2012). California’s E-Pedigree Law, Supply Chain Integrity Workshop, U.S. Pharmacopeia May 22–23, 2012.Google Scholar
  10. CSBP, California State Board of Pharmacy. (2013). California’s E-Pedigree Law Preempted, November 27, 2013, URL:
  11. DCA, California State Department of Consumer Affairs. (2013). California’s E-Pedigree Law Preempted, November 27, 2013,
  12. Dietrich, E., Puskar, E., Grace, A., Allen, M. A., & Schmitt, G. (2006). Considering RFID for use in the fight against counterfeiting. Emerging technology overview, Presented by the CACP’s Technology Task Force, Coalition Against Counterfeiting and Piracy (CACP), U.S. Chamber of Commerce.Google Scholar
  13. GS1, Global Standards 1. (2007). The GS1 Traceability Standard: What you need to know, January 2007.Google Scholar
  14. GS1, Global Standards 1. (2018a). Global Trade Item Number (GTIN), URL:
  15. GS1, Global Standards 1. (2018b). Home Page. from
  16. HDMA, Healthcare Foundation. (2004). Adopting EPC in Healthcare: Cost & benefits, 2004 HDMA Healthcare Foundation Adopting EPC in Healthcre: Costs & benefits, Published By:, HDMA Healthcare Foundation, by A.T. Kearny.Google Scholar
  17. IRS, US Internal Revenue Service. (2018). Tax-exempt status for your organization, Publication 557, (Rev. January 2018). Cat. No. 46573C. URL:
  18. ISO, International Organization for Standardization. (2005). “ISO 22000 Food safety management systems -- Requirements for any organization in the food chain.” 2012, from
  19. ISO, International Organization for Standardization. (2017). Technical Committee 292 Security Management and Resilience, Work Group 04 Product Fraud Countermeasures and Controls, Home Page, URL:
  20. ISO, International Standards Organization. (2011). “ISO 12931 - Performance criteria for authentication solutions for anti-counterfeiting in the field of material goods.” 2012, from
  21. Makadok, R. (1998). Can first-mover and early-mover advantages be sustained in an industry with low barriers to entry/imitation? Strategic Management Journal, 19(7), 683–696.CrossRefGoogle Scholar
  22. MSU-FFI, Food Fraud Initiaive. (2018). Blog series, food fraud initiative, Michigan State University, developed and presented by John Spink, URL:
  23. MSU FFI, Michigan State University Food Fraud Initiative. (2017). The role of enterprise risk management in food fraud prevention, MSU Food Fraud Initiative Report (FFIR), Funded by an anonymous donor, URL:, URL Video:
  24. Porter, M. E. (1985). Technology and competitive advantage. Journal of Business Strategy, 5(3), 60–78.CrossRefGoogle Scholar
  25. Public Law 100-293. (1988). 100th Congress, An Act to amend the Federal Food, Drug, and Cosmetic Act to ban the reimportation of drugs produced in the United States, to place restrictions on the distribution of drug samples, to ban certain resales of drugs by hospitals and other health care entities, and for other purposes; Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled; SHORT TITLE.—This Act may be cited as the “Prescription Drug Marketing Act of 1987” (PDMA), URL:
  26. Public Law 113-54. (2011). 113th Congress, An Act to amend the Federal Food, Drug, and Cosmetic Act with respect to human drug compounding and drug supply chain security, and for other purposes. <<NOTE: Nov. 27, 2013 - [H.R. 3204], Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, <<NOTE: Drug Quality and Security Act. 21 USC 301 note.>> SECTION 1. SHORT TITLE - This Act may be cited as the “Drug Quality and Security Act”. URL:
  27. RFID Journal. (2002). Auto-ID Center makes its case: White papers say a retailer with 800 stores could save $150 million per year from tracking individual items, September 5, 2002, URL:
  28. Spink, J. (2014). Food fraud prevention overview, Introducing the Food Fraud Prevention Cycle (FFPC)/ Food fraud prevention system, GFSI China Focus Day 2014, Beijing.Google Scholar
  29. Spink, J., Zhang, G., Chen, W., & Speier-Pero, C. (2019). Introducing the food fraud prevention cycle (FFPC): A dynamic information management and strategic roadmap. Food Control, 105, 233–241.Google Scholar
  30. Voss, M. D., Closs, D. J., Calantone, R. J., Helferich, O. K., & Speier-Pero, C. (2009). The role of security in the food supplier selection decision. Journal of Business Logistics, 30(1), 127.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • John W. Spink
    • 1
  1. 1.Michigan State UniversityOkemosUSA

Personalised recommendations