A Review of the Economic Impact of Counterfeiting and Piracy Methodologies and Assessment of Currently Utilized Estimates<\/a>, International Journal of Comparative and Applied Criminology]. Even though these estimates are often considered quantitative their authors were very clear that their findings were \u201ceducated guesses\u201d and one even stated that there were \u201cno methods known to develop an overall estimate.\u201d While this research was for intellectual property rights violations of trademark, patent, or copyright, the findings also apply to Food Fraud.<\/p>\n\n\n\nIt cannot be emphasized enough that any seizure data is based only on what we caught and that there is probably no way to correlate this with the actual incidents in the marketplace. That is a bold and important statement. In our article we stated: \u201cThe models being used to estimate the impact are being generated from extremely low-frequency events, or if the exact process and method of the counterfeiters is considered, events that have never occurred before.\u201d We went on to point out that the data uncertainty was based on: \u201c(1) the lack of historical data; (2) the incomplete and often inaccurate nature of available data; (3) the seemingly arbitrary infringements by the counterfeiters (data uncertainty created by the data generator which in this case is a human); and (4) the model uncertainty which is also referenced as formulation errors.\u201d Thus, a survey of the marketplace can be valuable as a snap-shot of activity in a known, infiltrated, high-counterfeit activity setting\u2026 but a random sampling of the globe would require millions of samples to even approach being considered anywhere near statistically significant.<\/p>\n\n\n\n
Even though the quantitative, statistically significant estimates are unknown or unknowable\u2026 we do know the vulnerabilities. We can assess how counterfeit or diverted product did get into a marketplace. Although that exact type of fraud may not occur again, we can assess whether the system is still vulnerable.<\/p>\n\n\n\n
Although the estimates of product counterfeiting and product fraud lack accuracy and precision, this should not be an impossible hindrance to governments or companies taking action. It is important to note that governments do require more quantitative rigor when deciding which projects to fund, but this lack of data hasn\u2019t hindered resource commitment in areas such as homeland security or human trafficking. It is critical that the estimates be framed as based on \u201cuncertain\u201d data and be viewed more as an evaluation of the vulnerability rather than an exact estimate of the threat. Once we evaluate the vulnerabilities we can begin protecting the supply chain gaps. A first step in determining the appropriate, strategic, and efficient Food Fraud Prevention program \u2013 beyond what is technically required by law \u2013 is to evaluate the vulnerabilities that allowed past incidents to occur. JWS.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"
From time to time, we share here a flashback to previous posts that remain relevant today. This week we revisit a journal article that focused on the effort to quantify the impact of food fraud. While that might seem like a task that can be completed with just […]<\/p>\n","protected":false},"author":16,"featured_media":5322,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[4],"tags":[480,481],"uagb_featured_image_src":{"full":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2023\/11\/food-fraud-prevention-think-tank-image-10136a.jpg",1120,630,false],"thumbnail":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2023\/11\/food-fraud-prevention-think-tank-image-10136a-150x150.jpg",150,150,true],"medium":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2023\/11\/food-fraud-prevention-think-tank-image-10136a-300x169.jpg",300,169,true],"medium_large":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2023\/11\/food-fraud-prevention-think-tank-image-10136a-768x432.jpg",768,432,true],"large":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2023\/11\/food-fraud-prevention-think-tank-image-10136a-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2023\/11\/food-fraud-prevention-think-tank-image-10136a.jpg",1120,630,false],"2048x2048":["https:\/\/blog.foodfraudpreventionthinktank.com\/wp-content\/uploads\/2023\/11\/food-fraud-prevention-think-tank-image-10136a.jpg",1120,630,false]},"uagb_author_info":{"display_name":"John W. Spink, PhD","author_link":"https:\/\/blog.foodfraudpreventionthinktank.com\/author\/john-w-spink-phd\/"},"uagb_comment_info":0,"uagb_excerpt":"From time to time, we share here a flashback to previous posts that remain relevant today. This week we revisit a journal article that focused on the effort to quantify the impact of food fraud. While that might seem like a task that can be completed with just […]","_links":{"self":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts\/5317"}],"collection":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/comments?post=5317"}],"version-history":[{"count":5,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts\/5317\/revisions"}],"predecessor-version":[{"id":5329,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/posts\/5317\/revisions\/5329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/media\/5322"}],"wp:attachment":[{"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/media?parent=5317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/categories?post=5317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.foodfraudpreventionthinktank.com\/wp-json\/wp\/v2\/tags?post=5317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}