<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-23T03:26:41Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/4370" metadataPrefix="marc">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/4370</identifier><datestamp>2022-04-29T12:02:47Z</datestamp><setSpec>com_10259_4354</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_4355</setSpec></header><metadata><record xmlns="http://www.loc.gov/MARC21/slim" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dcterms="http://purl.org/dc/terms/" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<leader>00925njm 22002777a 4500</leader>
<datafield tag="042" ind1=" " ind2=" ">
<subfield code="a">dc</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Davidson, Rebecca K.</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Antunes, Wilson .</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Madslien, Elisabeth H.</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Belenguer, José</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Gerevini, Marco</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Torroba Pérez, Tomás</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Prugger, Raffaello</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="c">2017</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">Purpose – Consumer confidence in the European food industry has been shaken by a number of recent&#xd;
scandals due to food fraud and accidental contamination, reminding the authors that deliberate incidents can&#xd;
occur. Food defence methods aim to prevent or mitigate deliberate attacks on the food supply chain but are&#xd;
not a legal requirement. The purpose of this paper is to discuss how proactive and reactive food defence&#xd;
practices can help prevent or mitigate malicious attacks on the food chain and also food fraud, food crime and&#xd;
food safety. The authors look at how food defence differs from food safety and how it contributes to food&#xd;
supply chain integrity.&#xd;
Design/methodology/approach – Food defence has been the focus of two different EU FP7 security&#xd;
projects, EDEN and SNIFFER. Food industry stakeholders participated in workshops and demonstrations on&#xd;
food defence and relevant technology was tested in different food production scenarios.&#xd;
Findings – Food industry end-users reported a lack of knowledge regarding food defence practices. They&#xd;
wished for further guidelines and training on risk assessment as well as access to validated test methods.&#xd;
Novel detection tools and methods showed promise with authentication, identification, measurement,&#xd;
assessment and control at multiple levels of the food supply chain prior to distribution and retail.&#xd;
Practical implications – The prevention of a contamination incident, prior to retail, costs less than dealing&#xd;
with a large foodborne disease outbreak. Food defence should therefore be integral to food supply chain&#xd;
integrity and not just an afterthought in the wake of an incident.&#xd;
Originality/value – It is argued that food defence practices have a vital role to play across the board in&#xd;
unintentional and intentional food contamination incidents. The application of these methods can help ensure&#xd;
food supply chain integrity.</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">http://hdl.handle.net/10259/4370</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Food safety</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Food security</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Fraud</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Terrorism</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Food defence</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Public perception</subfield>
</datafield>
<datafield tag="245" ind1="0" ind2="0">
<subfield code="a">From food defence to food supply chain integrity</subfield>
</datafield>
</record></metadata></record></GetRecord></OAI-PMH>