2017
DOI: 10.1016/j.foodpol.2017.04.006
|View full text |Cite
|
Sign up to set email alerts
|

Illegal activity in the UK halal (sheep) supply chain: Towards greater understanding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

3
55
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 37 publications
(58 citation statements)
references
References 29 publications
3
55
0
Order By: Relevance
“…We found this framework well-suited for systematising our data, thereby facilitating the explicit identification of strategies used by farmers as well as permitting quantitative analysis. In short, we found it particularly helpful in the modelling process [ 39 ].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We found this framework well-suited for systematising our data, thereby facilitating the explicit identification of strategies used by farmers as well as permitting quantitative analysis. In short, we found it particularly helpful in the modelling process [ 39 ].…”
Section: Methodsmentioning
confidence: 99%
“…We do this by identifying the VCS used by dairy farmers engaged in on-farm diversification. We employ a theoretically informed conceptual business model [ 39 ] in order to identify explicitly the informal strategies followed by dairy farmers in their value-added ventures. Given that most of these farmers do not adopt a formal strategic planning approach [ 40 ], our empirical research is based on the Business Model Canvas (BMC) approach [ 41 ] as a suitable conceptual framework to explore the ways in which farmers create value through new ventures [ 42 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Manning, Smith and Soon (2016), for example, identify the 2008 nancial crisis as a partial cause of the 2013 Horsemeat Scandal. McElwee, Smith and Lever (2017) and Somerville, Smith and McElwee (2015) present case studies to understand specic drivers of food fraud and examine how criminal networks perpetuate fraud in practice. Spink and Moyer (2011) categorize the eects of food fraud into primary eects, classied as food safety and public health consequences, and secondary eects, classied as public fear and market price impacts.…”
mentioning
confidence: 99%
“…developed to address known issues or activities, making TACCP and VACCP 349 of limited value with regard to emerging crime risk or entrepreneurial, 350 enterprising, situational crime risk that is reactive, responsive and specific to an 351 organisation, the products it produces and the associated supply chain(Soon 352 and Manning, 2017;McElwee et al, 2017;Smith, 2017).353 Van Ruth et al, (2017) considered food supply chain vulnerability to fraud 354 and based their conceptualisation on the elements of opportunity (suitable 355 target in terms of time, space and technical opportunities), motivation (the 356 economic drivers, supply and pricing, value added product attributes where the 357 potential to substitute an inferior product has the potential for a higher financial 358 gain, economic environment and financial strains and culture and behaviour 359 including business strategy and business culture) and the control measures 360 (technical and managerial measures) linking their work to the routine activity 361 theory developed by Cohen and Felson (1979). 362 Guardians are the individuals operating at national, supply chain or 363 individual business levels (Spink et al, 2015) that have the knowledge, skills 364 and understanding to implement a FCCF.…”
mentioning
confidence: 99%