2019
DOI: 10.1016/j.foodcont.2019.05.019
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain and more - Algorithm driven food traceability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
120
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 179 publications
(120 citation statements)
references
References 25 publications
0
120
0
Order By: Relevance
“…Commenting on this feeding measure, Kamilaris et al (2019) argue that the need for such intermediaries may compromise the building of decentralized trust for BC technology. An increasing number of studies suggest the use of IoT sensors to automatically enter data to ensure that the feeding process remains objective by eliminating human interaction and the risk of input errors or fraudulent behaviours (Creydt and Fischer, 2019;Kamble et al, and products/packaging upgrades (Li, 2013) (1) Unsuitability for average users: product authentication can require specific equipment, training, or the involvement of trained inspectors, such as public or private certification bodies or law enforcement services (Li, 2013) (2) Packaging cloning: these measures can be subject to cloning and reuse on counterfeit products (Pustjens et al, 2016) (3) No protection against upstream counterfeiting*: these measures do not prevent potential unfair practices, such as food adulteration and non-compliance with compulsory production specifications…”
Section: Blockchain Systemsmentioning
confidence: 99%
“…Commenting on this feeding measure, Kamilaris et al (2019) argue that the need for such intermediaries may compromise the building of decentralized trust for BC technology. An increasing number of studies suggest the use of IoT sensors to automatically enter data to ensure that the feeding process remains objective by eliminating human interaction and the risk of input errors or fraudulent behaviours (Creydt and Fischer, 2019;Kamble et al, and products/packaging upgrades (Li, 2013) (1) Unsuitability for average users: product authentication can require specific equipment, training, or the involvement of trained inspectors, such as public or private certification bodies or law enforcement services (Li, 2013) (2) Packaging cloning: these measures can be subject to cloning and reuse on counterfeit products (Pustjens et al, 2016) (3) No protection against upstream counterfeiting*: these measures do not prevent potential unfair practices, such as food adulteration and non-compliance with compulsory production specifications…”
Section: Blockchain Systemsmentioning
confidence: 99%
“…We are not suggesting that BC can replace the various technologies daily used to assess food safety and integrity, but that BCTs can enhance them through a higher traceability (Creydt & Fischer, 2019; Galvez et al., 2018). Furthermore, BCTs can improve the ability of food companies to mitigate food safety failures by quickly identifying and linking outbreaks back to their specific sources (Levitt, 2016).…”
Section: Traceability In the Agrofood Industrymentioning
confidence: 99%
“…RFID tags have broad application prospects for the following reasons: (i) they offer a large storage capacity (one to thousands of bytes); (ii) their readable distance through a scanner has a wide range (from a few centimeters to about two hundred meters); (iii) they can be operated without contact, and no particular angle is needed to read information; (iv) they are readable in diverse conditions (even in the dark or under water); and (v) they are recyclable. 129,130 However, the biggest disadvantage of RFID is its cost, which is a stumbling block to wide-spread commercialization. Using RFID tags in IFP, the link of the supply chain at which the food begins to corrupt can be identied and RFID can speed customer checkout by recognition technology.…”
Section: Communicating Technologies In Ifp Using Pesmentioning
confidence: 99%