Next Article in Journal
Glutathione-Capped CdTe Quantum Dots Based Sensors for Detection of H2O2 and Enrofloxacin in Foods Samples
Previous Article in Journal
Two-Phase Extraction Processes, Physicochemical Characteristics, and Autoxidation Inhibition of the Essential Oil Nanoemulsion of Citrus reticulata Blanco (Tangerine) Leaves
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Spatial-Temporal Event Analysis as a Prospective Approach for Signalling Emerging Food Fraud-Related Anomalies in Supply Chains

1
Food Quality and Design, Wageningen University and Research, P.O. Box 17, 6700 AA Wageningen, The Netherlands
2
Department of Analytical Chemistry, Faculty of Sciences, University of Granada, C/Fuentenueva, s/n, E-18071 Granada, Spain
3
School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, Belfast BT9 5BN, UK
4
Institute for Global Food Security, School of Biological Sciences, Queen’s University, 19 Chlorine Gardens, Belfast BT9 5DL, UK
5
UCD School of Agriculture and Food Science, University College Dublin, 4 Dublin, Ireland
*
Author to whom correspondence should be addressed.
Foods 2023, 12(1), 61; https://doi.org/10.3390/foods12010061
Submission received: 22 November 2022 / Revised: 18 December 2022 / Accepted: 19 December 2022 / Published: 22 December 2022
(This article belongs to the Section Food Analytical Methods)

Abstract

:
One of the pillars on which food traceability systems are based is the unique identification and recording of products and batches along the supply chain. Patterns of these identification codes in time and place may provide useful information on emerging food frauds. The scanning of codes on food packaging by users results in interesting spatial-temporal datasets. The analysis of these data using artificial intelligence could advance current food fraud detection approaches. Spatial-temporal patterns of the scanned codes could reveal emerging anomalies in supply chains as a result of food fraud in the chain. These patterns have not been studied yet, but in other areas, such as biology, medicine, credit card fraud, etc., parallel approaches have been developed, and are discussed in this paper. This paper projects these approaches for transfer and implementation in food supply chains in view of future applications for early warning of emerging food frauds.

1. Introduction

Food fraud is an emerging international issue that is often defined as the deliberate and intentional adulteration, substitution, dilution, simulation, tampering, counterfeiting or imitation of food, food ingredients or food packaging; or false or misleading label claims made about a product for economic gain [1,2]. Hence, food fraud is economically motivated but does not necessarily involve a health hazard [3,4]. However, in some cases consumers do pay for these practices with their health, and in the worst cases, even with their lives [5,6]. Food fraud is most likely to occur when a motivated offender and opportunity arises in the absence of control measures [1,7]. Food fraud can be divided into various kinds, which are outlined below [3,8,9,10]:
Adulteration. The food is added with one or some substances in a premeditated and intentional manner to cover up some defects in nutrition, weight, color, etc.
Substitution The high-value ingredient or part of the food is replaced by that of lower value to increase its perceived value or reduce the cost of its production.
Simulation. It consists of forming, ex novo, a food that may appear to be the original.
Counterfeiting. The faking of a higher quality product with one of lesser quality to obtain an illicit economic benefit.
Theft. Dishonestly obtaining food, drink, or feed products to profit from their use or sale.
Misrepresentation/mislabeling. The food has not been properly labelled and does not correctly cite the list of ingredients it contains or involves marketing which may wrongly portray its quality, safety, origin, or freshness.
Product overrun. The product did not pass the standards either with factory defects or was slightly damaged, or there is a product made in excess of production agreements.
Packaging recycling. The original product is replaced with a lower quality product. This type of fraud is common in beverages, as with wine, for example.
Diversion. The sale or distribution of legitimate products outside of the intended markets.
Waste diversion. This involves the illegal diverting of food or drink meant for disposal back into the supply chain. In this case, the label of the product can be counterfeited, changing the expiration date of the food.
Document fraud. Making, using, or possessing dishonest documents with the objective of selling or marketing a fraudulent or substandard food.
In this context, the involvement of all participants (primary/secondary/tertiary processors; wholesalers; brokers etc.) in the supply chain is crucial, since it involves all of the operations that are indispensable for a product to reach the final customer in optimal conditions [11].
However, although there are three main segments in the supply chain, each involves several stages and nodes that make the process complex and, therefore, transparency at every stage is crucial to avoid any kind of food fraud. In other words, the supply chain is the complete life cycle of a food product, involving each step from raw material to final sale; therefore, it requires coordination among all the nodes/steps in the chain.
In this regard, the Global Food Safety Initiative (GFSI) is an important global collaborative platform that is industry-driven and aims to provide leadership and guidance on food safety management systems, such as the International Featured Standards (IFS), Food Safety System Certification (FSSC 22000), and Brand Reputation through Compliance of Global Standards (BRC standards) [12,13,14]. In 2014, GFSI [15] recognised the importance of the fight against food fraud by recommending two fundamental steps to be taken to prevent food fraud. The first was to carry out a ‘food fraud vulnerability assessment’ in which information from the supply chain (raw materials, packaging, etc.) was collected. The SSAFE food fraud vulnerability self-assessment tool was developed by SSAFE in collaboration with Wageningen University, the Free University of Amsterdam, PwC, and many stakeholders, and was provided free of charge to the food industry (www.ssafe-food.org, accessed on 16 October 2022). In the assessment, various technical and managerial control measures are considered. Technical control measures include fraud monitoring systems based on analytical testing, mass balance information systems, as well as track and trace systems.
In these traceability systems, interesting data of product identifiers in time and place are collected. These spatial-temporal data may be an interesting source for the early warning of emerging frauds, which is explored in the current paper. This commentary paper is divided into four sections. Following this introduction, the second section presents the common procedures of food traceability systems, the third section discusses spatial-temporal analysis and its potential application in the food industry, and the last section is devoted to future prospects, which includes a discussion of the challenges and limitations of this approach.

2. Current Track and Trace Practices in the Food Industry

Food traceability allows for the tracing of all of the steps that a food has followed from its origin, through its transformation process, and ending up in the hands of consumers. Currently, within food traceability, it is possible to designate two approaches to ensure the authenticity of a food: (i) the intrinsic approach, based on markers in the product, which may change throughout the chain, with tracers added or naturally present, etc., and (ii) the extrinsic or digital approach based on controlling product labelling using barcodes, smart packaging, etc., since most goods are identified by labelling and contain a basic barcode that must comply with international standards for food traceability [16].
Regarding digital information systems, there are many information and communication technology-based systems applied in the industry. Examples would be the use of radio frequency tags (RFID) or near-field communication (NFC). Similarly, the use of labels printed with bi-directional quick response codes (QR codes) provides consumers with information on the origin of the product they are buying, giving them added value. This provides an excellent link between the physical world and the internet, since consumers could easily access the full history of a product by simply using their mobile devices. Therefore, the use of QR codes is having an increasing impact on how brands present and sell their products that they distribute at retail.
In fact, it would be possible to achieve the forward and backward traceability of primary, secondary and tertiary industrial packaging of food after reading these codes, as it would be possible to obtain real-time, certified, and geo-localised information on the situation of the packaging at any given moment. The task of data and information assignment to the products and the task of reading or accessing the information could be automated by these tags. In this regard, there is one Spanish company which focuses its business activity on the traceability of packaging by means of GPS coordinates (position coordinates) obtained when scanning the QR codes on the packaging (https://qrtracing.com/ accessed on 16 October 2022).
The spatial-temporal data generated in the current traceability systems may potentially also serve as an early warning source to flag suspected anomalies in the chain.

3. Spatial-Temporal Data Analysis

In recent years, technological advances derived from Artificial Intelligence (AI), nanotechnology, robotics, the Internet of Things (IoT), i.e., the so-called fourth industrial revolution (IR 4.0), are accentuating the possibilities of unprecedented processing, storage, and access to knowledge [17,18]. Big Data and technologies are ever-present. Indeed, in the last few years we have been living in the transition from the IoT to the so-called Internet of Everything, applying the most innovative technologies that facilitate the digitisation of processes and providing an innovative solution for the control and traceability of assets in the supply chain. IoT is a collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves. Data on food product identifiers can be collected along the chain by using these technologies. AI can be used to make sense of the data. AI calculations can fuse the data of different sources along the chain and provide input for decision support tools to enhance food quality and safety. As a result of all of this, logistics and distribution companies are investing in technologies that enable real-time tracking of the product along the entire supply chain, from the moment it leaves the supplier to the final consumer [19,20]. In this sense, thanks to the advance of new technologies, it is possible to record the movement of goods after scanning a product’s identification code, giving rise to real-time reading, leading to "spatial-temporal" databases (a combination of spatial and temporal data). Blockchain technology (BCT) allows the unmodifiable storage of the traceability along the chain [21,22]. BCT is a chronological data structure in which transactions are grouped into groups or blocks which are then recorded identically in a computer network [23]. However, it is important to note that it is only a means to ensure that data cannot be modified after it has been entered into the system. It does not prevent the upload of incorrect or falsified information. Moreover, it has a high degree of complexity, a significant verification mechanism and cost of implementation, and the confidentiality and data protection are some of the issues that need to be overcome to optimally implement BCT in the food chain.
At this point, however, a very important aspect must be taken into account: the protection of the information collected. Data protection is focused on two important aspects: security (protects data) and privacy (protects identity). For this reason, the use of this type of data would imply implementing the necessary security measures to ensure that the privacy of the information and data transferred is maintained throughout the entire life cycle of the data.
Temporal data are observations that refer to different moments in time, while spatial data refer to different geographic locations. In other words, the main difference between the two types of data is that they refer to different dimensions. The temporal dimension is linear (past-present-future), while the spatial dimension is two-dimensional, i.e., the geographic data refer to locations that are related to each other in several directions (north, south, east, and west), which implies a greater complexity in the observations. Thus, spatial-temporal databases host data collected across both space and time that describe an event in a particular location and period of time. The information stored in spatial-temporal databases depends on certain characteristics, namely: (i) the spatial domain, (ii) the temporal domain, and (iii) movement and change. The latter characteristic refers, on the one hand, to movement due to alterations in position in space over time; and on the other hand, change deals with how the spatial object undergoes transformation in its extension.
Note that the study of spatial-temporal data is a tool that has been applied for years in different scientific fields (such as spatial data_ by using geographic information systems (GIS) for different purposes, one of the most recent of which is for the respiratory syndrome coronavirus 2 (SARS-CoV-2) pandemic [24,25]. However, its implementation as a tool to control the traceability of goods has not been fully exploited, since it requires the application of probabilistic and statistical models for the analysis of high-dimensional data that often exhibit complex correlation structures in time and/or space (globalisation).

3.1. Examples of Spatial-Temporal Data Analysis Applications Outside the food Traceability Domain

The analysis of spatial-temporal data is commonly used with the aim of testing certain hypotheses, models, or to study the behaviour of events in different areas. The following involves examples of some areas in which this type of analysis is carried out.
Applications for spatial-temporal data analysis include the study of marine biology, in this case the spatial-temporal analysis of a shoal of fish which allowed the determination of the movement of the shoal, and to know in which season they migrate or even to determine whether fishing should be avoided [26]. In another area, such as medicine, the spatial-temporal analysis of a virus can be used to determine its level of evolution/mutation and/or the degree of particular spread of an epidemic, as for example in the current severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) pandemic [27,28]. In the cosmetics sector, Benatia et al. [29] described an approach to follow products along the supply chain. They proposed the use of spatial-temporal data and the employment of an enumeration tree algorithm that provides products with genuine trajectories based on simulation data. Each transaction was represented by identification (ID), action, location, timestamp, and duration. The goal was to evaluate if a product was delivered in time or not and the genuine product trajectories were inferred using a frequent pattern mining algorithm. Another example of spatial-temporal analysis of data is in the field of crime investigation. Esquivel et al. [30] employed an artificial neural network to build models in order to predict future crimes based on past patterns [31] through the development of a genetic-fuzzy system which encompasses spatial-temporal patterns for predicting future crimes.

3.2. Examples of Spatial-Temporal Data Analysis Applications in the Food Traceability Domain

In the framework of food quality control, spatial-temporal data analysis could represent an important advance for the assurance of product traceability.
In this sense, the analysis of spatial-temporal data could help to extend the use, for example, of QR codes or RFID tags for food fraud detection since these identifiers themselves are not that important; it is the information that is retrieved from them about a certain product batch, and the time and location of the scan. When an identifier is scanned, this is registered, together with the location and moment the code is scanned (if not restricted by the user). In a real-life situation, the scanning logs would reveal if the products sent to location A were indeed scanned in the location and/or surroundings in a given period in which it is expected to be sold (before its sell-by date). It would also show if the number of scans reflect what is typically expected (e.g., 10–20% of all products are scanned). Combining location and the number of scans in a given time period would generate a certain pattern. Hence, when looking at the spatial dimension (where products are scanned) and the temporal patterns (when products are scanned) it would be possible to establish if everything is normal or not. These patterns can be described and generated with algorithms to determine both situations.
For example, this approach could detect copied or reused product packaging, since the packaging would likely still contain the identifiers, and when scanned, the locations and time (dates) will be unusual. This may be after the sell-by dates of the products or scanned in areas where the products were never sent to, or one may see an unusual high number of identifiers being scanned (>>10–20%, for instance, that was expected to be scanned). This will flag anomalies and be an indication (early warning) of counterfeited products.
In this way, it will allow the detection of reiterative, yet novel and useful behaviour, through the evaluation of patterns to be able to assess whether the behaviour of the product within the distribution chain is normal or not. A pattern can be defined as a constant and recurrent characteristic or feature that helps to identify a phenomenon or problem and serves as an indicator or model to predict its future behaviour. It should be noted that the analysis of this type of data requires the application of a multivariate approach using machine learning methods (ML), which are a combination of many different methods, among which are two central concepts, artificial neural networks (ANN) and deep learning (DL).
The spatial-temporal data analysis could be applied to scans taken along the chain in traceability systems. However, the approach could also focus on consumers who scan QR codes in retail outlets. Figure 1 depicts the general workflow of the latter variant.
The key to making the most of this multivariate approach is to know the type of data being collected, how to structure and organise it, and which type of multivariate technique is most appropriate or has the greatest potential. For example, ML can help detect possible anomalies since from a properly trained and validated multivariate model it would be possible to assess whether a new spatial-temporal data vector of a food behaves according to the built model or not.
It is in this context which some authors have proposed the use of spatial-temporal data analysis to control the traceability of some food products such as wine, Ziziphus jujuba (Chinese red date) and meat in a digital way [32,33,34]. The most common frauds in the wine sectors can be categorised as ′ counterfeiting′, ′packaging recycling′, and even ′product overrun′. In this context, Popivić et al. [32] proposed the use of a mobile app in which every time users scan a QR code (which uniquely identifies a product), they provide an update on the status and location of that bottle. They carried out a pilot study with some companies in the sector that export their wine bottles to different countries. To ensure the authenticity of the wine bottles, the authors designed a smart label for each bottle, which consisted of a QR code, and a letter stamped on the bottle using invisible photochromatic functional ink. The mandatory requirement to receive authenticity confirmation is to successfully match the QR code—letter code. Therefore, each bottle was individually tracked and traced throughout the supply chain and the information updates were used to identify whether there was a potential counterfeit issue with a wine bottle.
Sun et al. [33] designed an anti-counterfeit system for identifying the origin of Chinese red dates based on GPS coordinates and encrypted Chinese-sensible codes per product. They selected several product characteristics (i.e., product weight, GPS coordinates, origin, and product code) and subsequently generated dedicated codes that were stamped on the products. In this way, when the products moved from one place to another, the QR codes were read, and the locations were evaluated using the GPS coordinates with the goal of detecting any anomaly throughout the supply chain. The results showed that 6310 of the product labels that were generated were correctly identified and allowed for the tracing of the origin of the products to the end consumer, resulting in a recognition rate of approximately 98%. The other 2% of product labels were not identified, and according to the authors, this was caused by the deterioration of the smart codes.
Similarly, Ren et al. [34] employed RFID technology to assess the traceability of meat products through spatial-temporal data analysis. Specifically, they developed software that tracked the information of the meat with the RFID tag in such a way that it could be known in which shop the meat was purchased. Finally, they compared the application of this promising approach with the traditional traceability system based on barcode reading, demonstrating the potential of this system, since it has faster data acquisition, a higher reorganisation rate and involves a more automated process.

3.3. Adaptation of Spatial-Temporal Data Analysis in Food Traceability Systems for Early Warning of Food Authenticity Infringements

As far as the adaptation of this approach is concerned, it should be noted at this point that the volume of available spatial-temporal information will be largely influenced by consumer behaviour, since this is spontaneous and hardly controllable. However, it would be possible to assume some hypothetical scenarios in which the scanning of a smart tag could be concentrated. For example, the scanning locations may be more concentrated at the locations of the retailer, the scanning time is more likely to appear in the peak shopping time period of retailers, and the daily scanning number of a certain area may be within a reasonable range. Thus, out of this hypothetical scenario it could be assumed that if there are anomalies in the spatial-temporal patterns it could be due to food fraud, such as:
Counterfeiting: the smart tag (QR code, RFID tag etc.) is copied and pasted on many counterfeit foods illegally, and the smart tag will be scanned many times in many unexpected areas.
Theft and diversion may lead to the authentic food being sold by the expected retailers, and the locations of scanning the smart tag do not occur in the retailers.
Packaging recycling: the smart tag is exposed to consumers again, and consumers may scan the QR code at an unexpected time and location.
In this regard, some publications have suggested their use for following products en route and in some cases in detecting one type of food fraud, such as counterfeiting, e.g., for the fraud detection of champagne [35]. However, there has been limited use of the spatial-temporal information for the purpose of crime detection, with only a few studies demonstrating its potential (Section 3.2). It is probable that the use of spatial-temporal data analysis to detect food fraud has not expanded due to several challenges. Firstly, most food companies have been not fully aware of the potential of the spatial-temporal information about consumer scanning of the smart labels to detect food fraud. At present, there are few articles or reports illustrating the feasibility of the spatial-temporal information in fraud detection. Secondly, a system for capturing and storing the spatial-temporal data needs to be generated. As smart tags are usually printed on food packaging and scanned by different consumers at different times and places, it is necessary to have software available that is capable of processing this data online to provide a quick response on the status of the product for this complex situation [36]. Lastly, there is always a cost/benefit balance aspect, and there is some question as to whether it is worth it to invest in these systems and whether they will they result in sufficient benefits.

4. Future Implications and Perspectives

Currently, different information systems exist, such as smart tags and QR codes, which aim to provide consumers with more information and to generate more transparency regarding the food consumed, or to ensure that the data is not altered once it is generated (as is the case of Blockchain technology). However, the analysis of spatial-temporal data together with the application of artificial intelligence could lead to further advancements in fighting food fraud, as it could be used as an early warning food fraud tool given that the position, time and/or additional information of the product would be obtained when its identification code is scanned. Conversely, it should be noted that to implement such a tool, it is necessary to face several challenges: generating a system for capturing and storing the time-space data and producing software capable of quickly processing the data in real time to provide a rapid response on the status of the product, while another challenge involves the availability, security and ownership of information throughout the supply chain.

Author Contributions

Conceptualization, A.M.J.-C., P.L., H.W.; Formal analysis, A.M.J.-C., P.L.; Investigation, A.M.J.-C., P.L.; Project administration, S.M.v.R.; Resources, S.M.v.R.; Writing–original draft, A.M.J.-C.; Writing–review & editing, S.M.v.R., S.W.E., H.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

AMJC wish to acknowledge the University of Granada (Spain) for the ‘Further Training Abroad UGR-Fellowship’ (Perfeccionamiento de Doctores 2020).

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Van Ruth, S.M.; Huisman, W.; Lunning, P.A. Food fraud vulnerability and its key factors. Trends Food Sci. Technol. 2017, 67, 70–75. [Google Scholar] [CrossRef]
  2. Everstine, K.; Spink, J.; Kennedy, S. Economically motivated adulteration (EMA) of food: Common characteristics of EMA incidents. J. Food Prot. 2013, 76, 723–735. [Google Scholar] [CrossRef] [PubMed]
  3. Spink, J.; Bedard, B.; Keogh, J.; Moyer, D.C.; Scimeca, J.; Vasan, A. International survery of food fraud and related termi-nology: Preliminary results and discussion. J. Food Sci. 2019, 84, 2705–2718. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Spink, J.; Moyer, D.C. Defining the Public Health Threat of Food Fraud. J. Food Sci. 2011, 76, 157–163. [Google Scholar] [CrossRef]
  5. WHO. Toxicological and Health Aspects of Melamine and Cyanuric Acid: Report of a WHO Expert Meeting. Health Canada, Ottawa, Canada, 1–4 December 2008. Available online: https://apps.who.int/iris/handle/10665/44106 (accessed on 1 July 2022).
  6. Food Safety News. Ecstasy in Champagne Warning in Europe Expanded; One Dead. 2022. Available online: https://www.foodsafetynews.com/2022/06/ecstasy-in-champagne-warning-in-europe-expanded-one-dead/ (accessed on 1 July 2022).
  7. Spink, J.W. The current state of food fraud prevention: Overview and requirements to address ‘How to Start?’ and ‘How Much is Enough?’. Curr. Opin. Food Sci. 2019, 27, 130–138. [Google Scholar] [CrossRef]
  8. Visciano, P.; Schirone, M. Food frauds: Global incidents and misleading situations. Trends Food Sci. Technol. 2021, 114, 424–442. [Google Scholar] [CrossRef]
  9. Spink, J. Glossary of Food Fraud-Related Terms. FFPA Glossary of Food Fraud Related Terms v15. 2020, pp. 1–66. Available online: https://www.foodfraudpreventionthinktank.com/wp-content/uploads/2020/11/FFPTTReport-Food-Fraud-Terminology-Glossary-2020-May-17-v17.pdf (accessed on 27 September 2022).
  10. Robson, K.; Dean, M.; Haughey, S.; Elliot, C. A comprehensive review of food fraud terminologies and food fraud mitigation guides. Food Control 2021, 120, 107516. [Google Scholar] [CrossRef]
  11. Badia-Melis, R.; Mishra, P.; Ruiz-García, L. Food traceability: New trends and recent advances. A review. Food Control 2015, 57, 393–401. [Google Scholar] [CrossRef]
  12. FSSC2200. Food Safety System Certification 22000. Revised Version 2018. Available online: https://www.fssc22000.com/wp-content/uploads/19.1210-Guidance_ISO-22000-Interpretation_Version-5.pdf (accessed on 25 May 2022).
  13. BRC. Global Standard for Food Safety (Issue 8). 2018, Revised Version 2018. Available online: https://www.brcgs.com/product/global-standard-for-food-safety-issue-8/p-616/ (accessed on 27 September 2022).
  14. IFS. IFS Guideline Product Fraud Mitigation v2. 2020. Available online: www.ifs-certification.com (accessed on 24 May 2022).
  15. GFSI. GFSI Position on Mitigating the Public Health Risk of Food Fraud. Silver Spring: GFSI. 2014. Available online: http://www.mygfsi.com/files/Technical_Documents/Food_Fraud_Position_Paper.pdf (accessed on 25 May 2022).
  16. Faccilongo, N.; Contò, F.; Dicecca, R.; Zaza, C.; La Sala, P. RFID sensor for agri-food supply chain management and control. Int. J. Sustain. Agric. Manag. Inform. 2016, 2, 206–221. [Google Scholar] [CrossRef]
  17. Akyazi, T.; Goti, A.; Oyarbide, A.; Alberdi, E.; Bayon, F. A guide for the food industry to meet the future skills requirements emerging with industry 4.0. Foods 2020, 9, 492. [Google Scholar] [CrossRef]
  18. Bai, C.; Dallasega, P.; Orzes, G.; Sarkis, J. Industry 4.0 technologies assessment: A sustainability perspective. Int. J. Prod. Econ. 2020, 229, 107776. [Google Scholar] [CrossRef]
  19. Yang, M.H.; Luo, J.N.; Lu, S.Y. A novel multilayered RFID tagged cargo integrity assurance scheme. Sensors 2015, 15, 27087–27115. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  20. Wang, F.; Wang, F.; Ma, X.; Liu, J. Demystifying the crowd intelligence in last mile parcel delivery for smart cities. IEEE Netw. 2019, 33, 23–29. [Google Scholar] [CrossRef]
  21. Arokiaraj, D.; Ganesh, K.C.; Victer, P.P. Blockchain technology in the food supply chain: Empirical analysis. Int. J. Inf. Syst. Proj. Manag. 2022, 15. [Google Scholar] [CrossRef]
  22. Galvez, J.F.; Mejuto, J.C.; Simal-Gandara, J.S. Future challenges on the use of blockchain for food traceability analysis. Trends Anal. Chem. 2018, 107, 222–232. [Google Scholar] [CrossRef]
  23. Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, clas-sification and open issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
  24. Najmeh Neysany, S.; Hua, L.; Reza, A. Ten GIS-Based Solutions for Managing and Controlling COVID-19 Pandemic Outbreak. SN Comput. Sci. 2022, 3, 269. [Google Scholar] [CrossRef]
  25. Church, R.L. Geographical Information Systems and Location Science. Comput. Oper. Res. 2002, 29, 541–562. [Google Scholar] [CrossRef]
  26. Hughes, J.M.; Meadows, N.M.; Stewart, J.; Booth, D.J.; Fowler, A.M. Movement patterns of an iconic recreational fish species, mulloway (Argyrosomus japonicus), revealed by cooperative citizen-science tagging programs in coastal eastern Australia. Fish. Res. 2022, 247, 1067179. [Google Scholar] [CrossRef]
  27. Wojciechowski, T.W.; Sadler, R.C.; Buchalski, Z.M.; Harris, A.; Lederer, D.; Furr-Holden, D. Trajectory modeling of spa-tio-temporal trends in COVID-19 incidence in Flint and Genesee County, Michigan. Ann. Epidemiol. 2022, 67, 29–34. [Google Scholar] [CrossRef]
  28. Kianfar, N.; Mesgari, M.S.; Mollalo, A.; Kaveh, M. Spatio-temporal modeling of COVID-19 prevalence and mortality using artificial neural network algorithms. Spat. Spatio-Temporal Epidemiol. 2022, 40, 100471. [Google Scholar] [CrossRef] [PubMed]
  29. Benatia, M.; Baudry, D.; Louis, A. Detecting counterfit products by means of frequent pattern mining. J. Ambient. Intell. Humaniz. Comput. 2020, 13, 3683–3692. [Google Scholar] [CrossRef]
  30. Esquivel, N.; Nicolis, O.; Peralta, B.; Mateu, J. Spatio-temporal prediction of baltimore crime events using clstm neural net-works. IEEE Access 2020, 8, 209101–209112. [Google Scholar] [CrossRef]
  31. Farjami, Y.; Abdi, K. A genetic-fuzzy algorithm for spatio-temporal crime prediction. J. Ambient. Intell. Humaniz. Comput. 2021, 3, 1–13. [Google Scholar] [CrossRef]
  32. Popovíc, T.; Krco, S.; Maras, V.; Hakola, L.; Radonjic, S.; van Kranenburg, R.; Sandi, S. A novel solution for counterfeit prevention in the wine industry based on IoT, smart tags, and crow-sourced information. Internet Things 2021, 14, 100375. [Google Scholar] [CrossRef]
  33. Sun, C.H.; Li, W.Y.; Zhou, C.; Li, M.; Yang, X.T. Anti-counterfeit system for agricultural product origin labelling based on GPS data and encrypted Chinese-sensible Code. Comput. Electron. Agric. 2013, 92, 82–91. [Google Scholar] [CrossRef]
  34. Ren, S.; Xu, H.; Li, A.; Zhou, G. Meat-productions tracking and traceability system based on internet of things with RFID and GIS. Trans. Chin. Soc. Agric. Eng. 2010, 26, 229–235. [Google Scholar] [CrossRef]
  35. Jesse, C. QR Code Champagne Tracking Technology Helps to Safeguard against Fraud. 2019. Available online: https://www.qrcodepress.com/qr-code-champagne-tracking-technology-helps-to-safeguard-against-fraud/8536714/ (accessed on 8 July 2022).
  36. Hamdi, A.; Shaban, K.; Erradi, A.; Mohamed, A.; Khan Rumi, S.; Salim, F. Spatiotemporal data mining: A survey on cha-llenges and open problems. Artif. Intell. Rev. 2021, 55, 1441–1488. [Google Scholar] [CrossRef]
Figure 1. Outline of the use of spatial-temporal analysis of data collected from consumers who scan QR or other smart labels.
Figure 1. Outline of the use of spatial-temporal analysis of data collected from consumers who scan QR or other smart labels.
Foods 12 00061 g001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiménez-Carvelo, A.M.; Li, P.; Erasmus, S.W.; Wang, H.; van Ruth, S.M. Spatial-Temporal Event Analysis as a Prospective Approach for Signalling Emerging Food Fraud-Related Anomalies in Supply Chains. Foods 2023, 12, 61. https://doi.org/10.3390/foods12010061

AMA Style

Jiménez-Carvelo AM, Li P, Erasmus SW, Wang H, van Ruth SM. Spatial-Temporal Event Analysis as a Prospective Approach for Signalling Emerging Food Fraud-Related Anomalies in Supply Chains. Foods. 2023; 12(1):61. https://doi.org/10.3390/foods12010061

Chicago/Turabian Style

Jiménez-Carvelo, Ana M., Pengfei Li, Sara W. Erasmus, Hui Wang, and Saskia M. van Ruth. 2023. "Spatial-Temporal Event Analysis as a Prospective Approach for Signalling Emerging Food Fraud-Related Anomalies in Supply Chains" Foods 12, no. 1: 61. https://doi.org/10.3390/foods12010061

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop