跳到主要內容

臺灣博碩士論文加值系統

(44.213.60.33) 您好!臺灣時間:2024/07/17 05:22
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:黃文庭
研究生(外文):HUANG, WEN-TING
論文名稱:食品詐欺脆弱性評估工具之應用一以澱粉糖食品公司為例
論文名稱(外文):Application of Food Fraud Vulnerability Assessment Tool - Case Study of Starch Sugar Food Company
指導教授:莊培梃莊培梃引用關係
指導教授(外文):CHUANG, PEI-TING
口試委員:張正明邱致穎莊培宏莊培梃
口試委員(外文):CHANG, CHENG-MINGCIOU, JHIH-YINGCHUANG, PEI-HUNGCHUANG, PEI-TING
口試日期:2023-07-21
學位類別:碩士
校院名稱:國立臺灣海洋大學
系所名稱:食品安全與風險管理研究所
學門:農業科學學門
學類:食品科學類
論文種類:學術論文
論文出版年:2023
畢業學年度:111
語文別:中文
論文頁數:129
中文關鍵詞:食品詐欺脆弱性評估澱粉糖SSAFE
外文關鍵詞:food fraudvulnerability assessmentstarch sugarSSAFE
相關次數:
  • 被引用被引用:0
  • 點閱點閱:208
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本論文是探討食品詐欺脆弱性評估工具之應用-以澱粉糖食品公司為例。 近年來國內外媒體報導的食品詐欺事件複雜且多樣,商業競爭日趨激烈,為了 解決食品詐欺的根本原因,企業必須提前識別食品詐欺發生的可能性,以制訂 有效的管制措施。本研究使用 SSAFE 脆弱性評估工具,對個案澱粉糖食品公 司進行決策樹 (Decision Tree) 診斷及詐欺脆弱性評估問卷調查,調查後依據總 部辦公室與工廠、廠別、部門、產線等類別,分別對澱粉糖食品公司內部進行 了分組,經由 EXCEL 處理後產生脆弱性雷達圖及風險比例分析圖。研究為了 進一步探索不同類別之間感知詐欺脆弱性的差異,同時進行了多重對應分析 (Multiple Correspondence Analysis, MCA),透過多重對應分析,對這些差異做出 了一般性判斷,接著並使用了 Mann-Whitney U 和 Kruskal-Wallis 無母數檢驗, 分析不同分組在感知詐欺脆弱性方面的差異,分析工具是採用 XLstat 及 SPSS 統計分析軟體來進行,用來檢查這種差異是否具有統計學意義。研究結果顯示, SSAFE 食品詐欺脆弱性評估工具,是一個能主動預防和減輕食品詐欺的有效評估工具,但目前在台灣的澱粉糖行業尚未得到有效推廣與應用。個案澱粉糖食 品公司的食品安全管理系統和監控措施,主要僅針對食品供應鏈中傳統的品質 安全風險,所以現有的管理措施和監控體系可能無法有效控制食品詐欺風險。 然而,鑑於臺灣食品詐欺事件的普遍存在,以及考慮了危害的嚴重性,因此, 建議個案公司必須要主動從源頭上控管食品詐欺風險,以減少未來可能發生的 食品詐欺事件。本研究結果確定了 SSAFE 食品詐欺脆弱性評估工具應用在澱 粉糖企業是有效的,可以提前了解澱粉糖食品企業中的詐欺脆弱性的程度,並 確定哪些因素導致了這種脆弱性,以幫助澱粉糖食品企業發現詐欺風險的薄弱環節,從而提供有關導致食品詐欺潛在因素的信息。
This study was the application of a vulnerability assessment tool for food fraud – in case of the starch sugar food company. In recent years, the food fraud incidents re- ported by the media have become increasingly, complex and variable because fierce commercial competition. To solve the root cause of food fraud, the companies must to identify the potential possibility of food fraud in advance to establish an effective con- trol measure. This study used the SSAFE vulnerability assessment tool for decision tree diagnosis and fraud vulnerability assessment questionnaire survey for the case of starch sugar food company. After the investigation, the company was divided into groups according to categories such as headquarters, factories, plants, departments, and production lines. Vulnerability radar charts and risk ratio analysis charts were gen- erated after processing by EXCEL. Furthermore, consider to differences in perceived vulnerability to fraud among different categories, multiple correspondence analyses (MCA) were carried out to make general judgments on these differences. Then, Mann- Whitney U and Kruskal-Wallis non-parametric tests were used to analyze the differ- ences in perceived fraud vulnerability among different groups, and the analysis tools used were XLstat and SPSS statistical analysis software to check if the differences had statistical significance. The result of study show that the SSAFE food fraud vulnera- bility assessment tool was an effective assessment tool for actively preventing and mitigating food fraud. However, it has not been effectively promoted and applied in the starch sugar industry in Taiwan. The food safety management system and moni- toring measures in case of the company that mainly focus on traditional quality and safety risks in the food supply chain only. Therefore, the present existing management measures and monitoring systems may not effectively control food fraud risks. How- ever, considering the widespread existence of food fraud incidents in Taiwan and the seriousness of the harm, it is recommended that the case company actively control the risk of food fraud from the source to reduce the possibility of future food fraud inci- dents happened. The result of this study confirmed that the SSAFE food fraud vulner- ability assessment tool was effective in the application to starch sugar companies, which can identify the degree of vulnerability to fraud in starch sugar companies in advance and determine which factors lead to the vulnerability to help the company identify the weak links in fraud risk and provide information regarding the potential factors causing food fraud.
摘要 i
Abstract ii
圖目次 v
表目次 vi
第一章、 緒論 1
第一節、 研究動機 1
第二節、 研究目的 3
第三節、 研究流程 3
第四節、 名詞解釋 5
第五節、 研究範圍 6
第二章、 文獻探討 7
第一節、 臺灣歷年食品詐欺事件 7
第二節、 食品安全與風險管理 10
第三節、 臺灣食品業者對食品詐欺風險的管理 17
第四節、 食品詐欺脆弱性評估工具的應用 20
第三章、 研究設計與實施 23
第一節、 研究架構 23
第二節、 研究假設 24
第三節、 研究對象 24
第四節、 研究方法 25
第五節、 研究工具 25
第六節、 資料處理與分析 45
第四章、 研究結果與討論 47
第一節、 探討雷達圖與百分比堆疊橫條圖分析結果 47
第二節、 探討 MCA 多重對應分析與無母數檢驗分析結果 65
第三節、 研究假設顯著分析之判定結果 89
第五章、 結論與建議 93
第一節、 研究結論 93
第二節、 研究建議 95
參考文獻 97
附錄一 101
FSSC 食品詐欺防範文件 101
附錄二 110
SSAFE 決策樹工具 110
附錄三 111
食品詐欺脆弱性評估工具之應用-以澱粉糖食品公司為例問卷 111
一、中文文獻:
司法院裁判書查詢系統,(2023)。臺灣食品詐欺事件裁判書。參照網址:https: //judgment.judicial.gov.tw/FJUD/default.aspx 檢索日期:2023/3/16
全國法規資料庫,(2023)。食品安全衛生管理法及中華民國刑法等。參照網址:https://law.moj.gov.tw/LawClass/LawAll.aspx?pcode=L0040001 檢索日期:2023/3/7
李其樺,(2017)。從商業倫理探討臺灣食品安全問題-以頂新案為例。中國文化 大學哲學研究所博士論文。
林志鴻,孟聖博,胡滋賀和王心靈,(2018)。運用作業風險管理防範黑心食品 之探討。危機管理學刊,15(1),79-92。
林宛葶,(2016)。論食品安全風險控管─以國家與食品業者共同管制為中心。國立臺灣大學法律學研究所碩士論文。
邱健人,(1998)。食品品質衛生安全管理學。藝軒圖書出版社。
邱文聰,(2015)。從迷失的身分重新找尋食品攙偽假冒管制的可能途徑—以食品身分標準為分析焦點。政大法學評論,(141),1-49。
邱玉蟬和游絲涵,(2016)。食品安全事件的風險建構與溝通。中華傳播學刊,(30),179-220。
施富議,(2014)。臺灣食品安全事件危機管理之研究-以 2013 年順丁烯二酸酐為例。淡江大學公共行政學系公共政策碩士在職專班碩士論文。
柯舜傑,(2005)。排列檢定與無母數檢定。淡江大學數學學系碩士論文。
洪長春和李慧芳,(2018)。食品安全相關專利及政策之分析研究。財團法人國家實驗研究院科技政策研究與資訊中心。 洪德欽,(2016)。專號序:食品安全的法理與論證。歐美研究,46(4),443-456。
楊柏春,(2006)。台灣澱粉糖產業競爭優勢與競爭策略之研究。開南大學企業管理研究所在職專班碩士論文。
臺灣優良食品發展協會 (TQF),(2016)。澱粉糖類工廠專責文件。參照網址:
https://web.tqf.org.tw/upload/publish/24%E6%BE%B1%E7%B2%89%E7%B3 %96%E9%A1%9E%E5%B7%A5%E5%BB%A0%E5%B0%88%E5%89%872 0160923V1.1.pdf 檢索日期:2023/3/5
程明修,(2009)。行政法上之預防原則(Vorsorgeprinzip)食品安全風險管理手段 之擴張。月旦法學雜誌,200904(167),127-136。
蔡憲唐,呂豐吉,吳東儒和羅世雄,(2011)。三聚氰胺事件影響消費者乳製食 品購買決策之研究。商業現代化學刊,6(2),113-131。
蔡心慈,(2017)。摻偽蜂蜜理學辦別指標之建立。國立臺灣大學生物產業機電 工程學研究所碩士論文。
盧冠宏,潘怡君和沈立言,(2016)。臺灣食品安全事件的省思:從危機處理提 升至風險管理。中國飲食文化,12(1),245-271。
譚偉恩,(2016)。食品供應鏈中惡意汙染行為之防治:以美國、歐盟與國際組 織的實踐為例。歐美研究,46(4),563-602。

二、外文文獻:
Abdi, H., & Valentin, D. (2007). Multiple correspondence analysis. Encyclopedia of measurement and statistics, 2(4), 651-657.
Bansal, S., Singh, A., Mangal, M., Mangal, A. K., & Kumar, S. (2017). Food adulteration: Sources, health risks, and detection methods. Critical Reviews in Food Science and Nutrition, 57(6), 1174-1189.
Coleman, J. W. (1987). Toward an integrated theory of white-collar crime. American journal of Sociology, 93(2), 406-439.
Closs, D. J., & McGarrell, E. F. (2004). Enhancing security throughout the supply chain: IBM Center for the Business of Government Washington, DC.
Farias De Abreu, V. L .F., Silva, R., Luchese, R., Monteiro, S. S., Esmerino, E. A., & Mathias, S. P. (2020). Impact assessment of the implementation of food defense plan in a Brazilian army military organization. Food Control, 118, 107288.
FSSC, (2019). FSSC Food Fraud Mitigation Guidance Document. Retrieved from https://www.fssc.com/schemes/fssc-22000/documents/version-5- 1/#guidance-documents Retrieval Date:2023/3/5
Godfray, H. C. J., Beddington, J. R., Crute, I. R., Haddad, L., Lawrence, D., Muir, J. F., . . . Toulmin, C. (2010). Food security: the challenge of feeding 9 billion people. Science, 327(5967), 812-818.
GFSI (2014). GFSI Position on mitigating the public health risk of food fraud. Retrieved from https://mygfsi.com/press_releases/gfsi-position-paper-on- mitigating-the-public-health-risk-of-food-fraudRetrieval Date:2023/3/5
GSFI, (2018). GSFI Food Fraud Technical Document. Retrieved from https://mygfsi.com/wp-content/uploads/2019/09/Food-Fraud-GFSI- Technical-Document.pdf Retrieval Date:2023/3/5
Horn, F. P., & Breeze, R. G. (1999). Agriculture and food security. Annals of the New York Academy of Sciences, 894(1), 9-17.
Kendall, H., Clark, B., Rhymer, C., Kuznesof, S., Hajslova, J., Tomaniova, M., . . . Frewer, L. (2019). A systematic review of consumer perceptions of food fraud and authenticity: A European perspective. Trends in Food Science & Technology, 94, 79-90.
Kim, J. H., & Eun, J. B. (2016). Preparedness of food industry in korea for united states food and drug administration food safety modernization act. Food Science and Industry, 49(3), 55-61.
Lotta, F., & Bogue, J. (2015). Defining food fraud in the modern supply chain. European Food and Feed Law Review., 10(2), 114-122.
Manning, L., & Soon, J. M. (2014). Developing systems to control food adulteration. Food Policy, 49(1), 23-32.
Manning, L., & Soon, J. M. (2016). Food safety, food fraud, and food defense: a fast evolving literature. Journal of Food Science, 81(4), R823-R834.
Manning, L., & Soon, J. M. (2019). Food fraud vulnerability assessment: Reliable data sources and effective assessment approaches. Trends in Food Science & Technology, 91, 159-168.
Reynoso, R.N. (2018a). Food defense KPI in the business processes of the food supply chain. Contaduríally administración, 63(1), 19-20.
Reynoso, R.N. (2018b). KPI de defensa alimentaria en procesos de negocio de la cadena de suministros alimenticia. Contaduríally administración, 63(1), 1-23.
Reeve, L., Stevenson, P., Wooten, C., Beach, K., & Wheeler, R. (2006). AIB International guide to food defense for food retail and food service operations: AIB International.
Rezazade, F., Summers, J., & Teik, D. O. L. (2022). A holistic approach to food fraud vulnerability assessment. Food Control, 131, 108440.
Robson, K., Dean, M., Haughey, S., & Elliott, C. (2021). A comprehensive review of food fraud terminologies and food fraud mitigation guides. Food Control, 120, 107516.
Soon, J. M., Krzyzaniak, S.U., Shuttlewood, Z., Smith, M., & Jack, L. (2019). Food fraud vulnerability assessment tools used in food industry. Food Control, 101, 225-232.
Spink, J., & Moyer, D. C. (2011). Defining the public health threat of food fraud. Journal of Food Science, 76(9), R157-163.
Spink, J., Moyer, D. C., & Whelan, P. (2016). The role of the public private partnership in Food Fraud prevention—includes implementing the strategy. Current Opinion in Food Science, 10, 68-75.
Spink, J. W. (2019). The current state of food fraud prevention: overview and requirements to address ‘How to Start?’and ‘How Much is Enough?’. Current Opinion in Food Science, 27, 130-138.
Sumar, S., & Ismail, H. (1995). Adulteration of foods–past and present. Nutrition & Food Science.95(4),11-15.
SSAFE, (2023). Food Fraud Vulnerability Assessment Tool. Retrieved from https://www.ssafe-food.org/tools/food-fraud-vulnerability-assessment-tool Retrieval Date:2023/3/16
Tibola, C. S., da Silva, S. A., Dossa, A. A., & Patrício, D. I. (2018). Economically motivated food fraud and adulteration in Brazil: Incidents and alternatives to minimize occurrence. Journal of Food Science, 83(8), 2028-2038.
Trivedi, D. K., Hollywood, K. A., Rattray, N. J., Ward, H., Trivedi, D. K., Greenwood, J., . . . Goodacre, R. (2016). Meat, the metabolites: an integrated metabolite profiling and lipidomics approach for the detection of the adulteration of beef with pork. Analyst, 141(7), 2155-2164.
van Ruth, S. M., Huisman, W., & Luning, P. A. (2017). Food fraud vulnerability and its key factors. Trends in Food Science & Technology, 67, 70-75.
van Ruth, S. M., Luning, P. A., Silvis, Z. C. J., Yang, Y., & Huisman, W. (2018). Differences in fraud vulnerability in various food supply chains and their tiers. Food Control, 84, 375-381.
XLstat, (2023). XLstat Help Center. Retrieved from https://help.xlstat.com/getting- started Retrieval Date:2023/3/16
Yang, Y., Huisman, W., Hettinga, K. A., Liu, N., Heck, J., Schrijver, G. H., . . . van Ruth, S. M. (2019). Fraud vulnerability in the Dutch milk supply chain: Assessments of farmers, processors and retailers. Food Control, 95, 308-317.
Yang, Y., Huisman, W., Hettinga, K. A., Zhang, L., & van Ruth, S. M. (2020). The Chinese milk supply chain: A fraud perspective. Food Control, 113.107211.
Yang, Z., Zhou, Q., Wu, W., Zhang, D., Mo, L., Liu, J., & Yang, X. (2022). Food fraud vulnerability assessment in the edible vegetable oil supply chain: A perspective of Chinese enterprises. Food Control, 138.1
Yoon, E., & Shanklin, C. W. (2007). Food terrorism: Perceptional gaps between importance and performance of preventive measures. Journal of Foodservice Business Research, 10(4), 3-23.

電子全文 電子全文(網際網路公開日期:20280727)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊