Abstract

AbstractBackground and ObjectivesThis article analyses the approach of identifying critical traceability events (CTE) and corresponding key data elements (KDE). The CTE–KDE approach is evidence‐based that identifies, and documents activities. It can be easily performed by (i) auditors; (ii) food manufacturers/processors; (iii) food suppliers to access gaps in process and supply chain. For example, for a grain processor storage of grain is identified as a CTE performed under grain elevator, and the necessary KDE includes the location of storage bin and supplier details. The CTE–KDE approach requires verifiable data, and the ability to assess graduated levels of success based on data. This article proposes the use of vulnerability analysis to predict levels of success in each CTE–KDE situation.Significance and NoveltyA vulnerability analysis model identifies, quantifies, and prioritizes various factors responsible for reducing the efficacy of a system. Vulnerability analysis measures system attributes (data) related to: (i) frequency of occurrence; (ii) degree of impact of occurrence; and (iii) likelihood of detection. This article applies vulnerability analysis as a standard method for identifying when and how a traceability system will fail. Vulnerability analysis of an evidence‐based CTE–KDE framework accounts for complex interactions among supply chain participants' critical activities. The need for standard measures of evaluating traceability systems is clear. Such analysis must restrict CTE to be measurable events and key data elements to measurable system attributes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call