<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Public Health</journal-id>
<journal-title>Frontiers in Public Health</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Public Health</abbrev-journal-title>
<issn pub-type="epub">2296-2565</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpubh.2021.752112</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Public Health</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Enterprise Food Fraud in China: Key Factors Identification From Social Co-governance Perspective</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Niu</surname> <given-names>Liangyun</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1430337/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Chen</surname> <given-names>Mo</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1285331/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Chen</surname> <given-names>Xiujuan</given-names></name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/729423/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Wu</surname> <given-names>Linhai</given-names></name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/729435/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Tsai</surname> <given-names>Fu-Sheng</given-names></name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
<xref ref-type="aff" rid="aff6"><sup>6</sup></xref>
<xref ref-type="corresp" rid="c002"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/525965/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>School of Economics, Anyang Normal University</institution>, <addr-line>Anyang</addr-line>, <country>China</country></aff>
<aff id="aff2"><sup>2</sup><institution>School of Economics and Management, Nanjing University of Aeronautics and Astronautics</institution>, <addr-line>Nanjing</addr-line>, <country>China</country></aff>
<aff id="aff3"><sup>3</sup><institution>School of Business, Institute for Food Safety Risk Management, Jiangnan University</institution>, <addr-line>Wuxi</addr-line>, <country>China</country></aff>
<aff id="aff4"><sup>4</sup><institution>Department of Business Administration, Cheng Shiu University</institution>, <addr-line>Kaohsiung</addr-line>, <country>Taiwan</country></aff>
<aff id="aff5"><sup>5</sup><institution>Center for Environmental Toxin and Emerging-Contaminant Research, Cheng Shiu University</institution>, <addr-line>Kaohsiung</addr-line>, <country>Taiwan</country></aff>
<aff id="aff6"><sup>6</sup><institution>Super Micro Mass Research and Technology Center, Cheng Shiu University</institution>, <addr-line>Kaohsiung</addr-line>, <country>Taiwan</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Pauline Douglas, Ulster University, United Kingdom</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Guanghua Han, Shanghai Jiao Tong University, China; Zengjin Liu, Shanghai Academy of Agricultural Sciences, China</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Linhai Wu <email>wlh6799&#x00040;jiangnan.edu.cn</email></corresp>
<corresp id="c002">Fu-Sheng Tsai <email>fusheng_tsai&#x00040;hotmail.com</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Public Health Policy, a section of the journal Frontiers in Public Health</p></fn></author-notes>
<pub-date pub-type="epub">
<day>19</day>
<month>11</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="collection">
<year>2021</year>
</pub-date>
<volume>9</volume>
<elocation-id>752112</elocation-id>
<history>
<date date-type="received">
<day>02</day>
<month>08</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>22</day>
<month>10</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2021 Niu, Chen, Chen, Wu and Tsai.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Niu, Chen, Chen, Wu and Tsai</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract><p>Food fraud not only exacerbates human public health risks but also threatens the business development of food and related industries. Therefore, how to curb food fraud effectively becomes a crucial issue for governments, industries, and consumers. Previous studies have demonstrated that enterprise food fraud is subject to joint influences of factor at various hierarchical levels within a complex system of stakeholders. To address enterprise food fraud, it is necessary to identify the key such factors and elucidate the functional mechanisms, as well as systematic analysis of the interrelationships among clusters and factors. Hence, we grounded on a social co-governance perspective and investigated the food fraud key influencing factors and their interrelationships in an emerging food market &#x02013; China, by using the DEMATEL-based analytic network process (DANP). Results showed that the identified key cluster was government regulation, social governance, and detection techniques. Four other key factors were also identified, including government regulatory capability and penalty intensity, expected economic benefits, maturity of market reputation mechanism, and transparency of supply chain. Policy implications from the social co-governance perspective for China and similar economies are discussed finally.</p></abstract>
<kwd-group>
<kwd>food fraud</kwd>
<kwd>business ethics</kwd>
<kwd>social co-governance</kwd>
<kwd>safety and quality</kwd>
<kwd>DEMATEL-based ANP</kwd>
</kwd-group>
<contract-sponsor id="cn001">National Social Science Fund of China<named-content content-type="fundref-id">10.13039/501100012456</named-content></contract-sponsor>
<counts>
<fig-count count="1"/>
<table-count count="5"/>
<equation-count count="11"/>
<ref-count count="100"/>
<page-count count="14"/>
<word-count count="11467"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>Introduction</title>
<p>Food fraud is a collective term used to encompass the deliberate substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging or false/misleading statements made about a product for economic gain (<xref ref-type="bibr" rid="B1">1</xref>&#x02013;<xref ref-type="bibr" rid="B5">5</xref>). With the escalation in incidents, scope, and harm, research on food fraud has increased in recent years (<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B7">7</xref>). In recent years, food fraud has become a serious and challenging issue for worldwide society (<xref ref-type="bibr" rid="B8">8</xref>&#x02013;<xref ref-type="bibr" rid="B10">10</xref>). Food fraud grows obstacles for food safety regulation and the food industry (<xref ref-type="bibr" rid="B11">11</xref>, <xref ref-type="bibr" rid="B12">12</xref>). It also increases human health risks (<xref ref-type="bibr" rid="B13">13</xref>), hinders development of the food market/industries, and causes trust issues among stakeholders, including food producers and dealers, consumers, trading partners, and regulatory authorities (<xref ref-type="bibr" rid="B14">14</xref>). Food fraud can also be more difficult to expose and can carry greater threat than conventional food safety issues (<xref ref-type="bibr" rid="B15">15</xref>).</p>
<p>For example, one of the most notorious food fraud cases worldwide was the discovery in 2008 of the illegal addition of melamine, an industrial raw material, to infant milk powder in China, which negatively impacted 300,000 infants, six of whom died (<xref ref-type="bibr" rid="B16">16</xref>, <xref ref-type="bibr" rid="B17">17</xref>). The company in question is a large enterprise group with a history of over 50 years and total assets of nearly RMB 2 billion (as of the end of 2007). In order to reduce costs, the enterprise involved used water and melamine in the milk to counterfeit. This is an example of food fraud as &#x00027;commercial enterprise crime&#x00027; carried out by producers in the food supply chain. The discovery in 2013 of the addition of horsemeat to certain products in many European countries is another example of significant food fraud (<xref ref-type="bibr" rid="B18">18</xref>). Such incidents have led governments and relevant organizations in various countries to step up food safety regulation (<xref ref-type="bibr" rid="B19">19</xref>). For instance, In China, the government has repeatedly restructured its food safety regulatory bodies, reformed regulatory rules and practices, and promulgated the highly stringent <italic>Law on Food Safety</italic> protocols, which are targeted at effective regulation (<xref ref-type="bibr" rid="B20">20</xref>, <xref ref-type="bibr" rid="B21">21</xref>).</p>
<p>Previous food safety regulations, however, are not designed to curb deliberate misconduct and are therefore not effective at addressing intentional food fraud (<xref ref-type="bibr" rid="B22">22</xref>, <xref ref-type="bibr" rid="B23">23</xref>). Existing systems (and research on them) only focused on the compliance of food producers with food safety control systems, particularly the <italic>Hazard Analysis Critical Control Point</italic> (HACCP) system, to minimize the microbial, chemical, and physical risks incurred during food production (<xref ref-type="bibr" rid="B24">24</xref>, <xref ref-type="bibr" rid="B25">25</xref>). Food fraud is a deliberate behavior of a food producer (generally) and will include attempts to evade supervision and regulation (<xref ref-type="bibr" rid="B11">11</xref>). Lord et al. (<xref ref-type="bibr" rid="B26">26</xref>) emphasizes that food fraud constitutes a crime and generally occurs along the supply chain of ordinary food, similar to other criminal activities.</p>
<p>Existing food fraud research is heavily weighted toward food science, packaging and labeling, and legal areas of knowledge discovery (<xref ref-type="bibr" rid="B27">27</xref>). Enterprise food fraud is a business behavior performed under certain conditions. Moving forward, this requires a business decision-making perspective to further study the problem of food fraud in food companies (<xref ref-type="bibr" rid="B13">13</xref>). So far, Van Ruth et al. (<xref ref-type="bibr" rid="B23">23</xref>), Levi et al. (<xref ref-type="bibr" rid="B28">28</xref>), Meerza et al. (<xref ref-type="bibr" rid="B29">29</xref>&#x02013;<xref ref-type="bibr" rid="B31">31</xref>) and other studies have initially discussed how various factors affect the fraud behavior of food companies. We have a clearer understanding of the fraudulent decision-making behavior of food companies and laid the foundation. For instance, Meerza et al. (<xref ref-type="bibr" rid="B31">31</xref>) studied the Optimal Policy Response to Food Fraud and found that under different circumstances, strict monitoring and enforcement and increased certification costs will have different effects on companies&#x00027; food fraud behaviors. However, the existing research only analyzes the influence of various factors on the fraud behavior of food companies. So, among these factors, which ones are the key factors? What are their interrelationships between factors? Existing research ignores these important issues. According to our knowledge, there is currently no literature report that identifies the key factors that affect the food fraud behavior of companies and analyzes the internal relationships between the factors.</p>
<p>In addition, enterprise food fraud is not only influenced by the action of certain individual factors, but also joint, organizational actions of a complicated system of clusters (cluster is a factor sets formed by different factors of the same class) at different hierarchical levels and among factors within a cluster (<xref ref-type="bibr" rid="B32">32</xref>). However, studies on the correlations among clusters and factors that motivate enterprise food fraud and how such clusters and factors jointly influence enterprise food fraud remain limited.</p>
<p>Heeding to such thoughts of the gaps in the literature, we argue that studies need to explore key factors of food fraud from more systematic and holistic theoretical lens and methodology, such as the social co-governance perspective and the DEMATEL-based analytic network process (DANP) method proposed here. Social co-governance theory for food safety emphasizes on &#x0201C;social participation for the collective pursuit of food safety&#x0201D; (<xref ref-type="bibr" rid="B33">33</xref>). As compared with traditional governance approaches for food issues, social co-governance stresses more on the wide and collective efforts from a diverse set of stakeholders, which ensures better informational transparency/symmetry, risk and cost sharing capacity, and resource richness (<xref ref-type="bibr" rid="B34">34</xref>). Such relationship also stresses social contract beyond economic ones (<xref ref-type="bibr" rid="B35">35</xref>). For methodological concern, Huang et al. (<xref ref-type="bibr" rid="B36">36</xref>) and Wu et al. (<xref ref-type="bibr" rid="B37">37</xref>) found the DANP to be an effective approach for studying the correlations among factors and (more usefully) the inter- and intra-clusters (factor sets) relationships at different hierarchical levels.</p>
<p>From the analysis of the development history of food fraud, the problem of food counterfeiting exists in any country in the world with varying degrees. And food fraud often occurs in the highly competitive food market. China has a highly competitive and relatively mature food market, which is similar to the food markets in the United States and the European Union. However, about 50% of food safety incidents in China are caused by food fraud, which is the result of the combination of complex factors such as the huge return from food consumption market, the large number of food enterprises with insufficient integrity, and the weakness of food supervision in China, etc., which might be different from the United States and the European Union but similar to most developing countries. Therefore, using China as the research object to study food fraud is reasonably significant and is of positive value in understanding the causes of food fraud/counterfeiting in similar economies&#x00027; contexts with potential measures that might be taken by the whole society.</p>
</sec>
<sec id="s2">
<title>Literature Review</title>
<sec>
<title>Extant Literature</title>
<sec>
<title>Production View</title>
<p>Information asymmetry between producers and consumers creates an adverse choice for oversupply of low-quality, unsafe products (<xref ref-type="bibr" rid="B38">38</xref>, <xref ref-type="bibr" rid="B39">39</xref>). Traditional food regulation is dominated by the command-control type of intervention. In most developed countries, food safety regulation has focused on the imposition of standards that specify how food products should be produced and/or their final safety level (<xref ref-type="bibr" rid="B40">40</xref>). However, since the 1990s, food operators have frequently been given more responsibility to monitor food safety (<xref ref-type="bibr" rid="B41">41</xref>). For example, the UK Food Safety Act (1990) encourages food companies to establish private food safety control measures to ensure the quality and safety of food produced and sold (<xref ref-type="bibr" rid="B42">42</xref>). The EU Food Hygiene Regulations, implemented on January 1, 2006, require all food producers and operators to have food safety control measures to prove that they are managing food safety in their businesses. In United States, food safety control measures, such as HACCP, become a category of food safety regulation (<xref ref-type="bibr" rid="B43">43</xref>).</p>
<p>Food risks may be caused by malpractice of suppliers who exploit the fact that their production processes and resulting product properties cannot be directly observed by buyers (<xref ref-type="bibr" rid="B44">44</xref>). However, current food safety regulations aim to deal with unintentional food safety incidents such as microorganisms, physics and chemistry, rather than deliberately deceiving people. Besides, the design of food safety control measures from a production view could not take into account deliberate fraud. So, malicious intent is the blind spot of current food safety law (<xref ref-type="bibr" rid="B2">2</xref>). Food fraud often occurs outside the authorized supply chain and usually involves the addition of unsupervised substances (<xref ref-type="bibr" rid="B13">13</xref>). The fraudsters can design and manufacture adulterated materials based on the nature of the adulterated product, thereby escaping existing food safety controls (<xref ref-type="bibr" rid="B45">45</xref>). Therefore, existing food safety control measures are not effective against food fraud (<xref ref-type="bibr" rid="B22">22</xref>, <xref ref-type="bibr" rid="B23">23</xref>).</p>
</sec>
<sec>
<title>Criminology View</title>
<p>Food fraud is crime-committed by producers and operators in the food supply chain to make full use of the opportunities of crime (<xref ref-type="bibr" rid="B26">26</xref>). In order to successfully implement food fraud, fraudsters actively seek for the opportunity and actively avoid detection using their technical expertise (<xref ref-type="bibr" rid="B46">46</xref>). In terms of the nature of food fraud, the collapse of the security of the entire food supply chain depends on a single factor, the criminal (<xref ref-type="bibr" rid="B45">45</xref>). Since food fraud is caused by conscious intelligent human opponents, food fraud is a crime and the crime prevention related theories have been applied in research (<xref ref-type="bibr" rid="B3">3</xref>, <xref ref-type="bibr" rid="B4">4</xref>, <xref ref-type="bibr" rid="B47">47</xref>, <xref ref-type="bibr" rid="B48">48</xref>). The routine activity theory sees crime as the outcome of the convergence in time and place of (<xref ref-type="bibr" rid="B1">1</xref>) motivated offenders and (<xref ref-type="bibr" rid="B2">2</xref>) suitable targets in (<xref ref-type="bibr" rid="B3">3</xref>) the absence of capable guardians (<xref ref-type="bibr" rid="B23">23</xref>). Food fraud and other types of corporate crime have similar characteristics. In accordance with the routine activity theory, it is necessary to study the factors affecting the food fraud vulnerability from three aspects: opportunities, motivations and control measures, and develop a food fraud vulnerability assessment tool (<xref ref-type="bibr" rid="B23">23</xref>). From the view point of the Criminology, food fraud vulnerability assessment tools should be used, identify potential weaknesses of food systems, and to effectively prevent food fraud (<xref ref-type="bibr" rid="B49">49</xref>, <xref ref-type="bibr" rid="B50">50</xref>). Nonetheless, if (as the present study does) the food fraud is defined as a commercial enterprise crime, then we need to extend such a crime prevention theory to designing organizational and institutional prevention strategies to enhance the integrity of the food system (<xref ref-type="bibr" rid="B26">26</xref>).</p>
</sec>
</sec>
<sec>
<title>Social &#x02013;Co-governance Perspective</title>
<p>Based on the reviews above, we found that the production viewpoint does not take into account the deliberate characteristics of food fraud, so it is ineffective to control food fraud. Although the criminological viewpoint makes up for the above shortcomings of production viewpoint, and places its emphases on preventing food fraud through prevention. However, under the background of rapid development of food production technology and increasingly internationalization and complexity of food supply chain, it is far from enough to rely solely on the strength and resources of enterprises and governments to prevent food fraud. With the purpose to reduce costs and improve the effectiveness of food safety regulation, the new collaborations between public authorities and food operators in monitoring food safety has been developed (<xref ref-type="bibr" rid="B34">34</xref>, <xref ref-type="bibr" rid="B40">40</xref>, <xref ref-type="bibr" rid="B51">51</xref>). But, establishing a better food economy with sustainable development needs the efforts of all stakeholders and the integration of relevant resources. Involvement of all stakeholders to work together helps to improve the practicability of decision-making and reduce the burden on participants (<xref ref-type="bibr" rid="B33">33</xref>). Therefore, food safety risk governance must introduce the participation of consumers, non-governmental organizations and other social forces to guide the whole society to co-govern together (<xref ref-type="bibr" rid="B52">52</xref>).</p>
<p>In theory, social co-governance is rooted in the theory of cooperative governance. In the late 20th century, the role orientation of &#x0201C;super nanny&#x0201D; of the government in western countries&#x00027; welfare systems resulted in many disadvantages, such as expansion of functions, overstaffed institutions and inefficiency, which caused public discontent due to inadequate governance of environmental protection, market monopoly, food safety and other issues (<xref ref-type="bibr" rid="B33">33</xref>). In order to solve the problems of fragmentation and decentralization of government governance, the theory of social governance, which emphasizes the multi-dispersed subjects to reach a multilateral interactive cooperative network, began to emerge at the end of the 20th century (<xref ref-type="bibr" rid="B53">53</xref>). As an important stakeholder of food safety, the media, employees, consumers and other social entities can also play an important role in preventing food safety risks. Social co-governance of food safety is a concept aimed at strengthening the partnership among the government, enterprises and social entities. The concept of social co-governance has become a practice in many countries. In the EU, governments, enterprises, social organizations, and citizens are actively involved in food safety governance. In China, the Food Safety Law of the People&#x00027;s Republic of China on October 1, 2015 established social co-governance as an important criterion for food safety risk governance. According to this, both theory and practice require that the discussion of the governance of food fraud be extended to the main constituents of a society.</p>
<p>In sum, the governance of food fraud with production and criminological views is mainly from the two main entities of the enterprise and the government, respectively. This paper expands the research scope to a pluralistic social groups (i.e., enterprise, government, consumers, and other stakeholders) based on the theory of social co-governance. A major reason is that the social co-governance theory suggests that stakeholders such as the consumers, social organizations or the other relatively neglected actors can also play an important role in ensuring food safety and in preventing fraud, posing a powerful complement to government governance and corporate self-discipline (<xref ref-type="bibr" rid="B33">33</xref>). To this end, based on our review of the perspective of social co-governance, this paper proposes five dimensions and 12 factors that may affect the corporate food fraud behavior (<xref ref-type="table" rid="T1">Table 1</xref>).</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Key clusters and factors influencing enterprise food fraud.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left"><bold>Target</bold></th>
<th valign="top" align="left"><bold>Cluster</bold></th>
<th valign="top" align="left"><bold>Factor</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Enterprise food fraud</td>
<td valign="top" align="left">Enterprise characteristics (D<sub>1</sub>)</td>
<td valign="top" align="left">Enterprise scale (C<sub>11</sub>)</td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Enterprise business ethics (C<sub>12</sub>)</td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Manager&#x00027;s awareness of social responsibility (C<sub>13</sub>)</td>
</tr>
<tr>
<td/>
<td valign="top" align="left">Economic benefits and technical hardness of food fraud (D<sub>2</sub>)</td>
<td valign="top" align="left">Expected economic benefits (C<sub>21</sub>)</td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Technical hardness of food fraud (C<sub>22</sub>)</td>
</tr>
<tr>
<td/>
<td valign="top" align="left">Government regulation, social governance, and detection techniques (D<sub>3</sub>)</td>
<td valign="top" align="left">Government regulatory capability and penalty intensity (C<sub>31</sub>)</td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Supervision by social forces (C<sub>32</sub>)</td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Utility of detection techniques and methodologies (C<sub>33</sub>)</td>
</tr>
<tr>
<td/>
<td valign="top" align="left">Market governance (D<sub>4</sub>)</td>
<td valign="top" align="left">Maturity of market reputation mechanism (C<sub>41</sub>)</td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Consumption behavior on food market (C<sub>42</sub>)</td>
</tr>
<tr>
<td/>
<td valign="top" align="left">Internal relationship and transparency of food supply chain (D<sub>5</sub>)</td>
<td valign="top" align="left">Constraints by downstream enterprises (C<sub>51</sub>)</td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Transparency of supply chain (C<sub>52</sub>)</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec>
<title>Enterprise Characteristics Cluster</title>
<p>Enterprise food fraud is closely related to business scale, business ethics, and awareness of social responsibilities.</p>
<sec>
<title>Enterprise Scale</title>
<p>Enterprise scale refers to the number of employees and the size of assets. Though an enterprise may engage in food fraud regardless of its scale (<xref ref-type="bibr" rid="B47">47</xref>), a food enterprise of smaller scale has higher risk of deliberate crime as it may choose not to recall sold products suspected of authenticity or safety problems and may ignore consumer grievances (<xref ref-type="bibr" rid="B54">54</xref>). For instance, Wu et al. (<xref ref-type="bibr" rid="B55">55</xref>) reported that small-scale enterprises are more inclined to abuse food additives. Levi et al. (<xref ref-type="bibr" rid="B28">28</xref>) also revealed that smaller farms are more vulnerable to risks and may resort to food fraud when facing quality uncertainty or price pressure.</p>
</sec>
<sec>
<title>Business Ethics</title>
<p>Business ethics refers to the integrity and ethical atmosphere within the enterprise. Business ethics are basic ethical codes that an enterprise complies with in all production and trade activities (<xref ref-type="bibr" rid="B56">56</xref>). Food fraud is unethical conduct (<xref ref-type="bibr" rid="B57">57</xref>), which is often closely related to business culture and the decision-maker&#x00027;s failure to stand behind the ethical bottom line (<xref ref-type="bibr" rid="B58">58</xref>). Business ethics is an important risk factor for corporate financial fraud (<xref ref-type="bibr" rid="B59">59</xref>, <xref ref-type="bibr" rid="B60">60</xref>). Similarly, business ethics are key cultural factors leading to food fraud vulnerability (<xref ref-type="bibr" rid="B23">23</xref>). Enhancing an enterprise&#x00027;s business ethics imposes a positive influence on the enterprise from a cultural perspective and encourages the business to refrain from food fraud (<xref ref-type="bibr" rid="B61">61</xref>).</p>
</sec>
<sec>
<title>Manager&#x00027;s Awareness of Social Responsibility</title>
<p>Manager awareness refers to the attitude of managers toward the social responsibility that the enterprise should take. Social responsibilities are fundamental duties related to environmental protection, justice, and equality that an enterprise assumes while striving for maximum benefits (<xref ref-type="bibr" rid="B62">62</xref>). Furthermore, ensuring food safety is the most important social responsibility of a food enterprise (<xref ref-type="bibr" rid="B63">63</xref>). Though most enterprises understand social responsibilities of food safety for the sake of a good public image (<xref ref-type="bibr" rid="B64">64</xref>), the concept of social responsibility originated and evolved to promote compliance with ethics and legislation among increasing cases of non-compliance (<xref ref-type="bibr" rid="B65">65</xref>). Illegal conduct will decrease if an enterprise strictly adheres to its social responsibilities. A manager&#x00027;s awareness of these social responsibilities also influences both willingness and performance. The stronger the manager&#x00027;s awareness of social responsibilities, the more responsible an enterprise is in regard to food safety and food fraud misconduct (<xref ref-type="bibr" rid="B66">66</xref>).</p>
</sec>
</sec>
<sec>
<title>Expected Economic Benefits and Technical Hardness Cluster</title>
<p>Food fraud is intrinsically subject to expected economic benefits and technical hardness.</p>
<sec>
<title>Expected Economic Benefits</title>
<p>Although food fraud may require an input of resources, it will also undoubtedly generate benefits (<xref ref-type="bibr" rid="B67">67</xref>). This is why fraudsters choose to misbehave in violation of social ethics and even with the risk of punishment (<xref ref-type="bibr" rid="B68">68</xref>, <xref ref-type="bibr" rid="B69">69</xref>). For example, Levi et al. (<xref ref-type="bibr" rid="B28">28</xref>) found that enterprise food fraud aims to maximize the perceived quality of low-quality products to achieve higher economic benefits. Bitzios et al. (<xref ref-type="bibr" rid="B70">70</xref>) also determined that foods bearing geographical indication (GI) labels usually resulted in better quality foods and higher consumer acknowledgment; furthermore, when substantial economic benefits are expected from counterfeiting ordinary food into a GI product, the enterprise exhibits a higher probability of committing food fraud.</p>
</sec>
<sec>
<title>Technical Hardness</title>
<p>An enterprise will be more inclined to commit fraud when it is technically easy (<xref ref-type="bibr" rid="B71">71</xref>). The technical hardness of fraud can be measured from both knowledge and substance aspects. On the knowledge side, a fraudster is usually a technical expert with rich knowledge of production and knows how to perform the fraud and how to evade capture (<xref ref-type="bibr" rid="B46">46</xref>). Furthermore, it is relatively easy to acquire the knowledge and techniques necessary for food fraud (<xref ref-type="bibr" rid="B23">23</xref>). On the substance side, most food fraud does not necessitate complicated equipment or other substances and the required additives are often easily available (<xref ref-type="bibr" rid="B72">72</xref>). For example, the infant milk powder incident in China resulted from adding melamine to milk to conceal that it had been diluted with water (<xref ref-type="bibr" rid="B16">16</xref>). Melamine is an ordinary and easily accessible chemical and its addition to the milk did not require any complicated techniques.</p>
</sec>
</sec>
<sec>
<title>Government Regulation, Social Governance, and Detection Techniques Cluster</title>
<p>Food fraud is subject to impact from government regulatory capability and penalty intensity, social supervision, and utility of detection techniques and methodologies.</p>
<sec>
<title>Government Regulatory Capability and Penalty Intensity</title>
<p>Food fraud rampancy is closely related to inefficient government regulation (<xref ref-type="bibr" rid="B73">73</xref>). In China, the deficiency in food safety supervision and control, as well as the fragmentation of regulatory agencies, has resulted in poor regulation (<xref ref-type="bibr" rid="B47">47</xref>) as well as increased opportunities for fraudulent behavior. In addition, the government sampling inspection system is based on conventional empirical methodologies, information, and knowledge (i.e., what additives may be supplemented to food), and often cannot identify fraud based on the latest developments (<xref ref-type="bibr" rid="B74">74</xref>, <xref ref-type="bibr" rid="B75">75</xref>). Furthermore, there is no punitive &#x0201C;joint examination&#x0201D; on similar enterprises. Therefore, the food quality sampling inspection system itself does not effectively deter food fraudsters (<xref ref-type="bibr" rid="B76">76</xref>). In addition, relatively moderate punishment coupled with high expected economic benefits does not constitute an effective deterrent, thus resulting in the high risk of food fraud (<xref ref-type="bibr" rid="B54">54</xref>).</p>
</sec>
<sec>
<title>Supervision of Social Forces</title>
<p>Media, consumers, employees, and social organizations can help alleviate food fraud (<xref ref-type="bibr" rid="B33">33</xref>). For example, Peng et al. (<xref ref-type="bibr" rid="B77">77</xref>) found that food safety scandals disclosed by the media can lead to a decline in sales and damage to the brand&#x00027;s reputation, which might reversely help correct the misconducts of food producers. However, companies may be under the expectation that food fraud will not be discovered, which can induce enterprise misconduct. Traditionally, China is a institution-driven market economy with limited participation by civil society (<xref ref-type="bibr" rid="B78">78</xref>). If the general public identify and report fraud cases, those committing the fraud are exposed (<xref ref-type="bibr" rid="B69">69</xref>) and the enterprise manager&#x00027;s psychological expectations may change. The &#x0201C;whistler&#x0201D; inside the enterprise can help discover the fraudulent behavior (<xref ref-type="bibr" rid="B79">79</xref>). Waterhouse et al. (<xref ref-type="bibr" rid="B80">80</xref>) indicated that employees are more aware of hidden fraud and therefore whistle-blowing is a powerful tool to prevent fraudulent activities from inside food enterprises. Li et al. (<xref ref-type="bibr" rid="B81">81</xref>) stated that social organizations can help to avoid the dual failure of public government power and private market power and play an irreplaceable role in supervising the operation of food enterprises.</p>
</sec>
<sec>
<title>Utility of Detection Techniques and Methodologies</title>
<p>A fundamental reason why food fraud is rampant is the poor utility of food testing methodologies, which are unable to detect food fraud (<xref ref-type="bibr" rid="B11">11</xref>). Generally speaking, food testing methodologies are based on known additives and pollutants and whether such additives are excessive compared with the prescribed threshold values (<xref ref-type="bibr" rid="B82">82</xref>). However, the sophistication of food and raw materials complicates both analysis and detection (<xref ref-type="bibr" rid="B67">67</xref>), particularly when the testing institutes do not know the additives (<xref ref-type="bibr" rid="B6">6</xref>). Thus, in response to enterprise food fraud, it is important to combine targeted and non-targeted testing methods (<xref ref-type="bibr" rid="B19">19</xref>).</p>
</sec>
</sec>
<sec>
<title>Market Governance Cluster</title>
<p>Food fraud is also subject to influence from the maturity of the market reputation mechanism and consumption behavior on the food market.</p>
<sec>
<title>Maturity of Market Reputation Mechanism</title>
<p>Good market reputation can enhance market sales (<xref ref-type="bibr" rid="B83">83</xref>) and can be the primary means by which an enterprise avoids market risks and achieves economic benefits (<xref ref-type="bibr" rid="B84">84</xref>). Therefore, market reputation constitutes a foundation of survival and benefits. Food fraud can result in severe damage to an enterprise&#x00027;s market reputation (<xref ref-type="bibr" rid="B85">85</xref>), not just for the enterprise committing the wrongdoing, but also for other enterprises in the same industry, causing heavy economic losses. For example, the 2008 melamine infant milk powder incident in China damaged the reputation of the company involved so badly that it went bankrupt in the same year. Therefore, reputation is a key market mechanism for preventing enterprise food fraud (<xref ref-type="bibr" rid="B54">54</xref>). For instance, a mature market reputation mechanism, whereby any enterprise food fraud is disclosed to the general public, can deter other enterprises from committing such misconduct.</p>
</sec>
<sec>
<title>Consumption Behavior on Food Market</title>
<p>Regulation of food systems exists to ensure safety and enhance consumer confidence in the food which they purchase and consume. However, food fraud scandals have caused consumers to be anxious and distrustful of local food products, and further stimulate distrust in food system. Consumers&#x00027; awareness of food fraud incidents has reduced consumers&#x00027; willingness to pay for products from companies and industries that have experienced food fraud scandals (<xref ref-type="bibr" rid="B86">86</xref>). Moreover, when consumers believe that there is a lack of regulatory protection, they will develop strategies to reduce the risk of food fraud to prevent the purchase and consumption of fraudulent food (<xref ref-type="bibr" rid="B54">54</xref>). The three main coping approaches include purchasing decision making, information searching &#x00026; sharing and daily self-preservation strategies (<xref ref-type="bibr" rid="B87">87</xref>). These risk mitigation strategies of consumers (that is, consumer behavior) affect the food fraud behavior of companies.</p>
</sec>
</sec>
<sec>
<title>Internal Relationship and Transparency Along Food Supply Chain Cluster</title>
<p>Mutual constraints among stakeholders and transparency along the food supply chain are also key factors influencing enterprise food fraud.</p>
<sec>
<title>Constraints by Downstream Enterprises in the Supply Chain</title>
<p>Previous studies have demonstrated that downstream enterprises in the supply chain can constrain upstream enterprises by inspecting the safety and authenticity of foods or materials, thus preventing food fraud. Babich and Tang (<xref ref-type="bibr" rid="B88">88</xref>) and Cao et al. (<xref ref-type="bibr" rid="B89">89</xref>) showed that inspection and deferred payment mechanisms can prevent adulteration by suppliers and upstream enterprises. Nevertheless, deficiencies in the constraints mechanism by downstream enterprises can also increase the probability of enterprise food fraud. Levi et al. (<xref ref-type="bibr" rid="B28">28</xref>) revealed that, compared with concentrated supply chains, distributed supply chains entail difficulties for downstream enterprises to impose constraints on upstream enterprises, thus raising the probability of food fraud along the supply chain.</p>
</sec>
<sec>
<title>Transparency of Supply Chain</title>
<p>Increasing complexity of the supply chain network can result in less visibility of the operational management of suppliers and is a key cause of food fraud (<xref ref-type="bibr" rid="B70">70</xref>). For example, Waterhouse et al. (<xref ref-type="bibr" rid="B80">80</xref>) determined that adulterated wine can reach consumers due to the non-transparent chain of supply and distribution. The melamine infant milk powder scandal in China also provides evidence that non-transparency of the upstream supply chain can lead to food fraud (<xref ref-type="bibr" rid="B61">61</xref>). Ensuring transparency of the supply chain can enhance food safety and quality (<xref ref-type="bibr" rid="B90">90</xref>). The Safe Supply of Affordable Food Everywhere (<xref ref-type="bibr" rid="B91">91</xref>) organization states that efforts should be made to acquire and maintain enhanced traceability information to ensure high transparency of the supply chain and minimization of food fraud.</p>
</sec>
</sec>
</sec>
</sec>
<sec id="s3">
<title>Methods and Data</title>
<sec>
<title>Methods</title>
<p>Based on the existing literature, this paper has summarized some factors and clusters that influence the counterfeiting decisions of food companies, so what is the interrelationship between clusters and factors? What are the intrinsic mechanisms upon which they can influence food counterfeiting? What are the key clusters and key factors? To answer the questions, based on Hsu et al. (<xref ref-type="bibr" rid="B92">92</xref>) and Huang et al. (<xref ref-type="bibr" rid="B36">36</xref>), we applied the DANP method as follows:</p>
<sec>
<title>Acquired the Influential Net Relationship Map With DEMATEL</title>
<list list-type="simple">
<list-item><p>Step 1 &#x02013; Calculated direct relationship average matrix <italic>A</italic>. Firstly, a direct relationship matrix was generated based on the assessment results of each expert member. The average matrix <italic>A</italic> &#x0003D; [<sub><italic>a</italic><sub><italic>ij</italic></sub>]<italic>n</italic>&#x000D7;<italic>n</italic></sub>, <italic>i, j</italic> &#x0003D; 1, 2, &#x02026;, <italic>n</italic> was then obtained by calculating the average of the same factor of all direct relationship matrices.</p></list-item>
<list-item><p>Step 2 &#x02013; Calculated initial direct influence matrix <italic>D</italic>.
<disp-formula id="E1"><mml:math id="M1"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mi>D</mml:mi><mml:mo>=</mml:mo><mml:mi>z</mml:mi><mml:mo>&#x000D7;</mml:mo><mml:mi>A</mml:mi></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mi>z</mml:mi><mml:mo>=</mml:mo><mml:mo class="qopname">min</mml:mo><mml:mrow><mml:mo stretchy="true">{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mo class="qopname">max</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mstyle displaystyle="true"><mml:munderover accentunder="false" accent="false"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:munderover></mml:mstyle><mml:msub><mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>/</mml:mo><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:msub><mml:mrow><mml:mi>x</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mstyle displaystyle="true"><mml:munderover accentunder="false" accent="false"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:munderover></mml:mstyle><mml:msub><mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="true">}</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mtext>where</mml:mtext><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p></list-item>
<list-item><p>Step 3 &#x02013; Calculated total influence matrix <italic>T</italic>.
<disp-formula id="E2"><mml:math id="M2"><mml:mrow><mml:mi>T</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x000D7;</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:math></disp-formula>
where, <italic>t</italic><sub><italic>ij</italic></sub> is the degree of the direct and indirect influences of factor <italic>i</italic> on factor <italic>j</italic>.
<disp-formula id="E3"><mml:math id="M3"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mi>T</mml:mi><mml:mo>=</mml:mo><mml:mi>D</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:msup><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x0002B;</mml:mo><mml:msup><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>&#x0002B;</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>&#x0002B;</mml:mo><mml:msup><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>h</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mi>D</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>I</mml:mi><mml:mo>&#x02212;</mml:mo><mml:msup><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>h</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:msup><mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>I</mml:mi><mml:mo>&#x02212;</mml:mo><mml:mi>D</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mo>&#x02212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mtext>As&#x000A0;</mml:mtext><mml:mi>D</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x000D7;</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0003C;</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02264;</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02264;</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mtext>when&#x000A0;</mml:mtext><mml:mi>h</mml:mi><mml:mo>&#x02192;</mml:mo><mml:mi>&#x0221E;</mml:mi><mml:mo>,</mml:mo><mml:msup><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>h</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x000D7;</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
then
<disp-formula id="E4"><mml:math id="M4"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mi>T</mml:mi><mml:mo>=</mml:mo><mml:mi>D</mml:mi><mml:msup><mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>I</mml:mi><mml:mo>&#x02212;</mml:mo><mml:mi>D</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mo>&#x02212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p></list-item>
<list-item><p>Step 4 &#x02013; Calculated the sum of each line and each column of total influence matrix <italic>T</italic>.
<disp-formula id="E5"><mml:math id="M5"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi>r</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>=</mml:mo></mml:mtd><mml:mtd><mml:mstyle displaystyle="true"><mml:munderover accentunder="false" accent="false"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:munderover></mml:mstyle><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi>c</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>=</mml:mo></mml:mtd><mml:mtd><mml:mstyle displaystyle="true"><mml:munderover accentunder="false" accent="false"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:munderover></mml:mstyle><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
where, <italic>r</italic><sub><italic>i</italic></sub> is the total of the direct and indirect influences of factor <italic>i</italic> on other factors in the system and <italic>c</italic><sub><italic>j</italic></sub> is the total of the direct and indirect influences that factor <italic>j</italic> receives from other factors in the system. When <italic>i</italic> &#x0003D; <italic>j</italic>, <italic>r</italic><sub><italic>i</italic></sub> &#x0002B; <italic>c</italic><sub><italic>i</italic></sub> is the sum of influence that factor <italic>i</italic> imposes on other factors and receives from other factors and <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> is the difference of influence that factor <italic>i</italic> imposes on other factors and receives from other factors. <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> &#x0003E; 0 indicates that factor <italic>i</italic> has influence on other factors and is the cause factor in the system. <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> &#x0003C; 0 indicates that factor <italic>i</italic> is influenced by other factors and is the result factor in the system.</p></list-item>
<list-item><p>Step 5 &#x02013; Acquired the influential net relationship map.</p></list-item>
</list>
</sec>
<sec>
<title>Calculated the Mixed Weight by Combining DEMATEL and the Analytic Network Process</title>
<p>Assuming each cluster has an equal degree of influence, ANP standardizes an unweighted supermatrix established by pair comparison between indicators into a weighted supermatrix. However, different clusters have different influences on enterprise food fraud. Therefore, DEMATEL can be used to determine the degree of influence of each cluster and thus normalize the ANP unweighted supermatrix to simulate real-world situations (<xref ref-type="bibr" rid="B92">92</xref>).</p>
<list list-type="simple">
<list-item><p>Step 1 &#x02013; Acquired the unweighted supermatrix. We first divided the total influence matrix T into the <italic>T</italic><sub><italic>D</italic></sub> matrix (by cluster) and <italic>T</italic><sub><italic>C</italic></sub> matrix (by factor) based on clusters and factors in <xref ref-type="table" rid="T1">Table 1</xref>.
<disp-formula id="E6"><mml:math id="M6"><mml:mtable columnalign='left'><mml:mtr><mml:mtd><mml:msub><mml:mi>T</mml:mi><mml:mi>C</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:msup><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msup><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:msup><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msup></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mover><mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:munder><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mn>11</mml:mn><mml:mo>&#x022EF;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mtext>&#x000A0;</mml:mtext></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:munder><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mn>1</mml:mn><mml:mo>&#x022EF;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msub><mml:mi>m</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mtext>&#x000A0;</mml:mtext></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:munder><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn><mml:mo>&#x022EF;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mtext>&#x000A0;</mml:mtext></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mover></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>T</mml:mi><mml:mi>D</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>We then calculated the standardized total influence matrix <inline-formula><mml:math id="M7"><mml:msubsup><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>c</mml:mi></mml:mrow><mml:mrow><mml:mi>a</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula>.
<disp-formula id="E7"><mml:math id="M8"><mml:mtable columnalign='left'><mml:mtr><mml:mtd><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mi>&#x003B1;</mml:mi></mml:msubsup><mml:mo>=</mml:mo><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:msup><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msup><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:msup><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msup></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mover><mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mn>1</mml:mn><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>n</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>n</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:munder><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mn>11</mml:mn><mml:mo>&#x022EF;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mtext>&#x000A0;</mml:mtext></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:munder><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mn>1</mml:mn><mml:mo>&#x022EF;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msub><mml:mi>m</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mtext>&#x000A0;</mml:mtext></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:munder><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn><mml:mo>&#x022EF;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mtext>&#x000A0;</mml:mtext></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mover></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mtext>where</mml:mtext><mml:mo>,</mml:mo><mml:msubsup><mml:mi>T</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mn>11</mml:mn></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mn>1</mml:mn><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mn>1</mml:mn><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mstyle displaystyle='true'><mml:munderover><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:munderover><mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mstyle><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>Finally, we calculated the unweighted supermatrix <italic>W</italic>.
<disp-formula id="E8"><mml:math id="M9"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mi>W</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msubsup><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>C</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi></mml:mrow></mml:msubsup></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mi>&#x02032;</mml:mi></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p></list-item>
<list-item><p>Step 2 &#x02013; Calculated the weighted standardized supermatrix <italic>W</italic><sup>&#x003B1;</sup>.
<disp-formula id="E9"><mml:math id="M10"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:msubsup><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable style="text-align:axis;" equalrows="false" columnlines="none none none none none none none none none" equalcolumns="false" class="array"><mml:mtr><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mi>j</mml:mi></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup><mml:mo>/</mml:mo><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable style="text-align:axis;" equalrows="false" columnlines="none none none none none none none none none" equalcolumns="false" class="array"><mml:mtr><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mn>11</mml:mn></mml:mrow></mml:msubsup></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mn>1</mml:mn><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x022EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>n</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup></mml:mtd><mml:mtd><mml:mo>&#x022EF;</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi><mml:mi>n</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msubsup></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:munderover accentunder="false" accent="false"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:munderover></mml:mstyle><mml:msubsup><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>.</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msup><mml:mrow><mml:mi>W</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi></mml:mrow></mml:msubsup><mml:mi>W</mml:mi></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p></list-item>
<list-item><p>Step 3 &#x02013; Calculated the ultimate supermatrix <italic>W</italic><sup>&#x0002A;</sup>.
<disp-formula id="E10"><mml:math id="M11"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:msup><mml:mrow><mml:mi>W</mml:mi></mml:mrow><mml:mrow><mml:mo>&#x0002A;</mml:mo></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:munder><mml:mrow><mml:mo class="qopname">lim</mml:mo></mml:mrow><mml:mrow><mml:mi>g</mml:mi><mml:mo>&#x02192;</mml:mo><mml:mi>&#x0221E;</mml:mi></mml:mrow></mml:munder></mml:mstyle><mml:msup><mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msup><mml:mrow><mml:mi>W</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x003B1;</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>g</mml:mi></mml:mrow></mml:msup></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p></list-item>
<list-item><p>Step 4 &#x02013; Calculated the mixed weight as per the following formula:
<disp-formula id="E11"><mml:math id="M12"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mi>Z</mml:mi><mml:mo>=</mml:mo><mml:mi>w</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:mi>T</mml:mi><mml:mo>&#x000D7;</mml:mo><mml:mi>w</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>I</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:mi>T</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mi>w</mml:mi></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
where, <italic>Z</italic> is the mixed weight and W is the comprehensive weight of secondary indicators.</p></list-item>
</list>
</sec>
</sec>
<sec>
<title>Data</title>
<p>In order to ensure the data quality and quantity requirements of the DANP method, we have done following efforts. In terms of data quality, since sample&#x00027;s appropriateness and richness is very important (<xref ref-type="bibr" rid="B93">93</xref>), this paper selects qualified experts based on three criteria. First, experts are experienced and have at least 15 years of research or work experience in food safety areas. Second, experts must have an academic professorship, food industrial manager, or a government food safety governor background, in order to possess a more comprehensive knowledge structure. This determines the diversity, representativeness and breadth of the expert group, and can give a comprehensive evaluation based on the comprehensive consideration of the views and interests of different stakeholders related to food fraud. Third, experts all must be from China.</p>
<p>It should be noted that the research method used in this paper does not require a high number of experts to participate in the evaluation. For example, when Chiu and Tzeng (<xref ref-type="bibr" rid="B94">94</xref>) and Shen and Tzeng (<xref ref-type="bibr" rid="B95">95</xref>) used DANP (DEMATEL-based ANP) to conduct the study, the number of experts participating in the evaluation was only eight. Thus, our study refers to the literature of Chiu and Tzeng (<xref ref-type="bibr" rid="B94">94</xref>), Shen and Tzeng (<xref ref-type="bibr" rid="B95">95</xref>), Chuang and Chen (<xref ref-type="bibr" rid="B96">96</xref>), and Huang et al. (<xref ref-type="bibr" rid="B36">36</xref>), and uses the average deviation rate (or what is referred to as &#x0201C;errors of gap ratio&#x0201D;) to determine the number of experts, which satisfies the number of participating experts in the evaluation process as required by the DANP method. In terms of data quantity, according to Chiu et al. (<xref ref-type="bibr" rid="B94">94</xref>), Huang et al. (<xref ref-type="bibr" rid="B36">36</xref>), Chuang and Chen (<xref ref-type="bibr" rid="B96">96</xref>) and Shen and Tzeng (<xref ref-type="bibr" rid="B95">95</xref>), this paper uses the average deviation rate to assess whether the expert size reaches theoretical saturation <inline-formula><mml:math id="M13"><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>n</mml:mi><mml:mo>&#x02212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:mfrac><mml:mstyle displaystyle='true'><mml:munderover><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:munderover><mml:mrow><mml:mstyle displaystyle='true'><mml:munderover><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:munderover><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:msubsup><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mi>p</mml:mi></mml:msubsup><mml:mo>&#x02212;</mml:mo><mml:msubsup><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>p</mml:mi><mml:mo>&#x02212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:msubsup><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mi>p</mml:mi></mml:msubsup></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow></mml:mstyle><mml:mo>&#x000D7;</mml:mo><mml:mn>100</mml:mn><mml:mi>&#x00025;</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:math></inline-formula>. <italic>p</italic> is the number of experts, <inline-formula><mml:math id="M14"><mml:msubsup><mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>p</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula> is the average effect of factor <italic>i</italic> on factor <italic>j</italic>, and <italic>n</italic> is the number of factors being affected. In this paper, a group of experts were invited to participate in the project, who come from China National Food Industry Association, China Agricultural University, Shandong Agricultural University, Jiangnan University, Jiangsu Academy of Agricultural Sciences and other institutions. Experts can express their opinions and discuss together before evaluating the relationship between the two factors. Since the opinions of the experts are expressed in terms of language rather than numerical values, when the evaluation results are finally collected, experts are required to score the pairwise relationship between the factors according to the corresponding integer values in <xref ref-type="table" rid="T2">Table 2</xref>.</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Conversion between linguistic variables and integer rank.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left"><bold>Linguistic variable</bold></th>
<th valign="top" align="center"><bold>Corresponding integer</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">No (no influence)</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left">VL (very low influence)</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">L (low influence)</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">H (high influence)</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left">VH (very high influence)</td>
<td valign="top" align="center">4</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Finally, regarding the theoretical saturation, we refer to Chuang and Chen (<xref ref-type="bibr" rid="B96">96</xref>) for our study. Using the average deviation rate (or &#x0201C;errors of gap ratio,&#x0201D; EGR) method, we calculated that the average deviation rate of the nine experts who participated in the evaluation was 4.25% &#x0003C;5% (see P24 of the revised paper). This indicates that we have more than 95% confidence that there is no significant difference between the results of 9 experts and 8 experts participating in the evaluation. According to Chuang and Chen (<xref ref-type="bibr" rid="B96">96</xref>), it is reasonable to assume that 9 experts are close to the theoretical saturation and meet the requirement of an appropriate number of experts.</p>
</sec>
</sec>
<sec sec-type="results" id="s4">
<title>Results</title>
<p>By averaging the expert assessment results, we obtained the direct relationship average matrix <italic>A</italic>. By repeating the above step, we then obtained the initial direct relationship matrix <italic>D</italic> (<xref ref-type="table" rid="T3">Table 3</xref>), line sum and column sum (<italic>r</italic><sub><italic>i</italic></sub> and <italic>c</italic><sub><italic>i</italic></sub>) of total influence matrix <italic>T</italic> and of each cluster and factor (<xref ref-type="table" rid="T4">Table 4</xref>), and the mixed weights of the clusters and factors. Finally, we performed normalized sorting of the mixed weights to compile (<xref ref-type="table" rid="T5">Table 5</xref>).</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Initial direct relationship matrix <italic>D</italic>.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th/>
<th valign="top" align="center"><bold>C<sub><bold>11</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>12</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>13</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>21</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>22</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>31</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>32</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>33</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>41</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>42</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>51</bold></sub></bold></th>
<th valign="top" align="center"><bold>C<sub><bold>52</bold></sub></bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">C<sub>11</sub></td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.09058</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.03261</td>
<td valign="top" align="center">0.02899</td>
<td valign="top" align="center">0.03623</td>
<td valign="top" align="center">0.03261</td>
<td valign="top" align="center">0.05435</td>
<td valign="top" align="center">0.07971</td>
<td valign="top" align="center">0.08696</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>12</sub></td>
<td valign="top" align="center">0.06884</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.11957</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.03623</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.05435</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.06159</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.07971</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>13</sub></td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.11594</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.05435</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.05072</td>
<td valign="top" align="center">0.10870</td>
<td valign="top" align="center">0.06522</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.07609</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>21</sub></td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.10507</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.06884</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>22</sub></td>
<td valign="top" align="center">0.09058</td>
<td valign="top" align="center">0.05797</td>
<td valign="top" align="center">0.05072</td>
<td valign="top" align="center">0.09420</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.06884</td>
<td valign="top" align="center">0.09058</td>
<td valign="top" align="center">0.07971</td>
<td valign="top" align="center">0.05435</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.07246</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>31</sub></td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.09420</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.10870</td>
<td valign="top" align="center">0.09420</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.06522</td>
<td valign="top" align="center">0.09420</td>
<td valign="top" align="center">0.10145</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>32</sub></td>
<td valign="top" align="center">0.06884</td>
<td valign="top" align="center">0.07971</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.07971</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.09058</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.08333</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>33</sub></td>
<td valign="top" align="center">0.06884</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.04710</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.04348</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.06522</td>
<td valign="top" align="center">0.06159</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.04348</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>41</sub></td>
<td valign="top" align="center">0.10507</td>
<td valign="top" align="center">0.11232</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.03986</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.09420</td>
<td valign="top" align="center">0.03261</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.09420</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>42</sub></td>
<td valign="top" align="center">0.02899</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.06522</td>
<td valign="top" align="center">0.05072</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.05797</td>
<td valign="top" align="center">0.10145</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.09420</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>51</sub></td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.09058</td>
<td valign="top" align="center">0.06884</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.09058</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.06522</td>
<td valign="top" align="center">0.06159</td>
<td valign="top" align="center">0.06884</td>
<td valign="top" align="center">0.05797</td>
<td valign="top" align="center">0.00000</td>
<td valign="top" align="center">0.09420</td>
</tr>
<tr>
<td valign="top" align="left">C<sub>52</sub></td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.07609</td>
<td valign="top" align="center">0.09420</td>
<td valign="top" align="center">0.07246</td>
<td valign="top" align="center">0.08333</td>
<td valign="top" align="center">0.08696</td>
<td valign="top" align="center">0.06522</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.05797</td>
<td valign="top" align="center">0.09783</td>
<td valign="top" align="center">0.00000</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>Values of <italic>r</italic><sub><italic>i</italic></sub>, <italic>c</italic><sub><italic>i</italic></sub>, <italic>r</italic><sub><italic>i</italic></sub> &#x0002B; <italic>c</italic><sub><italic>i</italic></sub>, and <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> for clusters and factors influencing enterprise food fraud.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left"><bold>Cluster</bold></th>
<th valign="top" align="center"><bold><italic>r</italic><sub><italic>i</italic></sub></bold></th>
<th valign="top" align="center"><bold><italic>c</italic><sub><italic>i</italic></sub></bold></th>
<th valign="top" align="center"><bold><italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub></bold></th>
<th valign="top" align="center"><bold><italic>r</italic><sub><italic>i</italic></sub> &#x0002B; <italic>c</italic><sub><italic>i</italic></sub></bold></th>
<th valign="top" align="center"><bold>Factor</bold></th>
<th valign="top" align="center"><bold><italic>r</italic><sub><italic>i</italic></sub></bold></th>
<th valign="top" align="center"><bold><italic>c</italic><sub><italic>i</italic></sub></bold></th>
<th valign="top" align="center"><bold><italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub></bold></th>
<th valign="top" align="center"><bold><italic>r</italic><sub><italic>i</italic></sub> &#x0002B; <italic>c</italic><sub><italic>i</italic></sub></bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">D<sub>1</sub></td>
<td valign="top" align="center">2.53517</td>
<td valign="top" align="center">2.72529</td>
<td valign="top" align="center">&#x02212;0.19012</td>
<td valign="top" align="center">5.26046</td>
<td valign="top" align="center">C<sub>11</sub></td>
<td valign="top" align="center">5.11596</td>
<td valign="top" align="center">6.20740</td>
<td valign="top" align="center">&#x02212;1.09144</td>
<td valign="top" align="center">11.32336</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>12</sub></td>
<td valign="top" align="center">6.35550</td>
<td valign="top" align="center">7.08381</td>
<td valign="top" align="center">&#x02212;0.72831</td>
<td valign="top" align="center">13.43931</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>13</sub></td>
<td valign="top" align="center">6.67952</td>
<td valign="top" align="center">6.24157</td>
<td valign="top" align="center">0.43795</td>
<td valign="top" align="center">12.92110</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>2</sub></td>
<td valign="top" align="center">2.62924</td>
<td valign="top" align="center">2.59154</td>
<td valign="top" align="center">0.0377</td>
<td valign="top" align="center">5.22078</td>
<td valign="top" align="center">C<sub>21</sub></td>
<td valign="top" align="center">6.91238</td>
<td valign="top" align="center">6.99331</td>
<td valign="top" align="center">&#x02212;0.08093</td>
<td valign="top" align="center">13.90570</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>22</sub></td>
<td valign="top" align="center">6.19436</td>
<td valign="top" align="center">5.94982</td>
<td valign="top" align="center">0.24455</td>
<td valign="top" align="center">12.14418</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>3</sub></td>
<td valign="top" align="center">2.77796</td>
<td valign="top" align="center">2.58851</td>
<td valign="top" align="center">0.18945</td>
<td valign="top" align="center">5.36647</td>
<td valign="top" align="center">C<sub>31</sub></td>
<td valign="top" align="center">7.38820</td>
<td valign="top" align="center">6.83774</td>
<td valign="top" align="center">0.55046</td>
<td valign="top" align="center">14.22594</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>32</sub></td>
<td valign="top" align="center">6.89975</td>
<td valign="top" align="center">6.40159</td>
<td valign="top" align="center">0.49816</td>
<td valign="top" align="center">13.30135</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>33</sub></td>
<td valign="top" align="center">5.59856</td>
<td valign="top" align="center">5.26934</td>
<td valign="top" align="center">0.32922</td>
<td valign="top" align="center">10.86790</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>4</sub></td>
<td valign="top" align="center">2.73436</td>
<td valign="top" align="center">2.63741</td>
<td valign="top" align="center">0.09695</td>
<td valign="top" align="center">5.37177</td>
<td valign="top" align="center">C<sub>41</sub></td>
<td valign="top" align="center">6.80847</td>
<td valign="top" align="center">7.07836</td>
<td valign="top" align="center">&#x02212;0.26989</td>
<td valign="top" align="center">13.88683</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>42</sub></td>
<td valign="top" align="center">6.31226</td>
<td valign="top" align="center">5.56394</td>
<td valign="top" align="center">0.74832</td>
<td valign="top" align="center">11.87619</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>5</sub></td>
<td valign="top" align="center">2.72901</td>
<td valign="top" align="center">2.86299</td>
<td valign="top" align="center">&#x02212;0.13398</td>
<td valign="top" align="center">5.59200</td>
<td valign="top" align="center">C<sub>51</sub></td>
<td valign="top" align="center">6.34861</td>
<td valign="top" align="center">7.02748</td>
<td valign="top" align="center">&#x02212;0.67887</td>
<td valign="top" align="center">13.37610</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>52</sub></td>
<td valign="top" align="center">6.73675</td>
<td valign="top" align="center">6.69597</td>
<td valign="top" align="center">0.04079</td>
<td valign="top" align="center">13.43272</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="T5">
<label>Table 5</label>
<caption><p>Normalized rank of mixed weights of clusters and factors influencing enterprise food fraud.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th/>
<th valign="top" align="center"><bold>Influence weight</bold></th>
<th valign="top" align="center"><bold>Rank</bold></th>
<th valign="top" align="center"><bold>Criterion</bold></th>
<th valign="top" align="center"><bold>Influence weight</bold></th>
<th valign="top" align="center"><bold>Rank</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">D<sub>1</sub></td>
<td valign="top" align="center">0.23108</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">C<sub>11</sub></td>
<td valign="top" align="center">0.06623</td>
<td valign="top" align="center">12</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>12</sub></td>
<td valign="top" align="center">0.08112</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>13</sub></td>
<td valign="top" align="center">0.08373</td>
<td valign="top" align="center">7</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>2</sub></td>
<td valign="top" align="center">0.17232</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">C<sub>21</sub></td>
<td valign="top" align="center">0.09111</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>22</sub></td>
<td valign="top" align="center">0.08121</td>
<td valign="top" align="center">9</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>3</sub></td>
<td valign="top" align="center">0.24903</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">C<sub>31</sub></td>
<td valign="top" align="center">0.09245</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>32</sub></td>
<td valign="top" align="center">0.08634</td>
<td valign="top" align="center">5</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>33</sub></td>
<td valign="top" align="center">0.07024</td>
<td valign="top" align="center">11</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>4</sub></td>
<td valign="top" align="center">0.17293</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">C<sub>41</sub></td>
<td valign="top" align="center">0.09057</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>42</sub></td>
<td valign="top" align="center">0.08236</td>
<td valign="top" align="center">8</td>
</tr>
<tr>
<td valign="top" align="left">D<sub>5</sub></td>
<td valign="top" align="center">0.17464</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">C<sub>51</sub></td>
<td valign="top" align="center">0.08541</td>
<td valign="top" align="center">6</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">C<sub>52</sub></td>
<td valign="top" align="center">0.08922</td>
<td valign="top" align="center">4</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec sec-type="discussion" id="s5">
<title>Discussion</title>
<p>Based on the calculation results obtained by the DANP method, this section identifies the interrelationships between Clusters and Factors that affect food counterfeiting and the intrinsic mechanisms that influence counterfeiting decisions of food companies, and identifies the key Clusters and key Factors from three aspects.</p>
<sec>
<title>Relationships Among Clusters and Factors That Influence Enterprise Food Fraud</title>
<p>The <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> and <italic>r</italic><sub><italic>i</italic></sub> &#x0002B; <italic>c</italic><sub><italic>i</italic></sub> values of each cluster and factor obtained from DEMATEL analysis are shown in <xref ref-type="table" rid="T4">Table 4</xref>. With reference to the plotting methods of Yang and Tzeng (<xref ref-type="bibr" rid="B97">97</xref>) and by use of the (<italic>r</italic><sub><italic>i</italic></sub> &#x0002B; <italic>c</italic><sub><italic>i</italic></sub>, <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub>) dataset, we obtained the influential net relationship map (<xref ref-type="fig" rid="F1">Figure 1</xref>).</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>Influence relationship net map among clusters and factors.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpubh-09-752112-g0001.tif"/>
</fig>
<p><xref ref-type="fig" rid="F1">Figure 1</xref> depicts the direct relationships among five clusters that influence enterprise food fraud, i.e., enterprise characteristics (<italic>D</italic><sub>1</sub>), economic benefits and technical hardness of food fraud (<italic>D</italic><sub>2</sub>), government regulation, social governance, and detection techniques (<italic>D</italic><sub>3</sub>), market governance (<italic>D</italic><sub>4</sub>), and internal relationship and transparency of food supply chain (<italic>D</italic><sub>5</sub>). The direct influence of cluster <italic>D</italic><sub>3</sub> on <italic>D</italic><sub>4</sub>, <italic>D</italic><sub>2</sub>, <italic>D</italic><sub>5</sub>, and <italic>D</italic><sub>1</sub> can be expressed as <italic>D</italic><sub>3</sub> &#x02192; {<italic>D</italic><sub>4</sub>, <italic>D</italic><sub>2</sub>, <italic>D</italic><sub>5</sub>, <italic>D</italic><sub>1</sub>}. Similarly, the direct influence of cluster <italic>D</italic><sub>4</sub> on <italic>D</italic><sub>2</sub>, <italic>D</italic><sub>5</sub>, and <italic>D</italic><sub>1</sub> can be expressed as <italic>D</italic><sub>4</sub> &#x02192; {<italic>D</italic><sub>2</sub>, <italic>D</italic><sub>5</sub>, <italic>D</italic><sub>1</sub>}; the direct influence of cluster <italic>D</italic><sub>2</sub> on <italic>D</italic><sub>5</sub> and <italic>D</italic><sub>1</sub> can be expressed as <italic>D</italic><sub>2</sub> &#x02192; {<italic>D</italic><sub>5</sub>,<italic>D</italic><sub>1</sub>}; and the direct influence of cluster <italic>D</italic><sub>5</sub> on <italic>D</italic><sub>1</sub> can be expressed as <italic>D</italic><sub>5</sub> &#x02192; {<italic>D</italic><sub>1</sub>}.</p>
<p><xref ref-type="fig" rid="F1">Figure 1</xref> also shows the direct influence relationship among factors within the same cluster. For example, cluster <italic>D</italic><sub>1</sub> encompasses three interrelated factors, i.e., enterprise scale (<italic>C</italic><sub>11</sub>), business ethics (<italic>C</italic><sub>12</sub>), and manager&#x00027;s awareness of social responsibilities (<italic>C</italic><sub>13</sub>). The direct influence of <italic>C</italic><sub>13</sub> on <italic>C</italic><sub>12</sub> and <italic>C</italic><sub>11</sub> can be expressed as <italic>C</italic><sub>13</sub> &#x02192; {<italic>C</italic><sub>12</sub>,<italic>C</italic><sub>11</sub>} and the direct influence of <italic>C</italic><sub>12</sub> on <italic>C</italic><sub>11</sub> can be expressed as <italic>C</italic><sub>12</sub> &#x02192; {<italic>C</italic><sub>11</sub>}. The direct influence relationship among factors within each of the other four clusters can be expressed in the same way as cluster <italic>D</italic><sub>1</sub>.</p>
</sec>
<sec>
<title>Intrinsic Mechanism of How Various Clusters and Factors Influence Enterprise Food Fraud</title>
<p>The <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> values in <xref ref-type="table" rid="T4">Table 4</xref> were used to determine by what intrinsic mechanism the clusters and factors influence enterprise food fraud. Firstly, at the cluster level, <italic>D</italic><sub>3</sub>, <italic>D</italic><sub>4</sub>, and <italic>D</italic><sub>2</sub> were identified as cause clusters based on their positive <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> values, with each influencing other clusters in the system to a certain degree. In addition, <italic>D</italic><sub>1</sub> and <italic>D</italic><sub>5</sub> were identified as result clusters based on their negative <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> values, with both influenced significantly by other clusters in the system. Therefore, the five clusters interacted intrinsically, such that clusters <italic>D</italic><sub>3</sub>, <italic>D</italic><sub>4</sub>, and <italic>D</italic><sub>2</sub> directly and/or indirectly influenced clusters <italic>D</italic><sub>1</sub> and <italic>D</italic><sub>5</sub>, and ultimately enterprise food fraud. This intrinsic mechanism can help us understand the causes of food fraud. In developed countries, the lack of detection technology is an important cause of food fraud (<xref ref-type="bibr" rid="B6">6</xref>). However, the <xref ref-type="fig" rid="F1">Figure 1</xref> shows that in China, the lack of government governance is highly related to insufficient supervision of social entities, but not for the reasons of governance approaches. This result might also apply to, and have implications for, other developing countries.</p>
<p>At the factor level, seven factors were identified as cause factors based on their positive <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> values, with each imposing significant influence on other factors in the system to varying degrees. These factors included consumption behavior on food market (<italic>C</italic><sub>42</sub>), government regulatory capability and penalty intensity (<italic>C</italic><sub>31</sub>), supervision by social forces (<italic>C</italic><sub>32</sub>), manager&#x00027;s awareness of social responsibility (<italic>C</italic><sub>13</sub>), technical hardness (<italic>C</italic><sub>22</sub>), utility of detection techniques and methodologies (<italic>C</italic><sub>33</sub>), and transparency of supply chain (<italic>C</italic><sub>52</sub>). The other five factors were identified as result factors based on their negative <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> values, with each influenced significantly by other factors to varying degrees. These factors included enterprise scale (<italic>C</italic><sub>11</sub>), business ethics (<italic>C</italic><sub>12</sub>), constraints by downstream enterprises (<italic>C</italic><sub>51</sub>), expected economic benefits (<italic>C</italic><sub>21</sub>), and maturity of market reputation mechanism (<italic>C</italic><sub>41</sub>). In summary, the factors interacted and influenced the fraudulent behavior of food enterprises intrinsically, with <italic>C</italic><sub>42</sub>,<italic>C</italic><sub>31</sub>, <italic>C</italic><sub>32</sub>,<italic>C</italic><sub>13</sub>,<italic>C</italic><sub>22</sub>,<italic>C</italic><sub>33</sub>, and <italic>C</italic><sub>52</sub> directly and/or indirectly influencing <italic>C</italic><sub>11</sub>, <italic>C</italic><sub>12</sub>, <italic>C</italic><sub>51</sub>, <italic>C</italic><sub>21</sub>, and <italic>C</italic><sub>41</sub>, and ultimately enterprise food fraud. From a supply perspective, an in-depth understanding of the unethical behavior of companies pursuing profits in the supply chain can help us understand the food fraud behavior of companies (<xref ref-type="bibr" rid="B1">1</xref>). However, this intrinsic mechanism further reveals the particularity of the causes of Chinese food fraud from the perspective of demand. As in <xref ref-type="table" rid="T4">Table 4</xref>, <italic>C</italic><sub>42</sub>&#x02032;<italic>sr</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> value is the largest, indicating that the consumption behavior of the food market, especially the food literacy of consumers, provides a market space for food fraud. This may also be an important reason why food fraud in rural China is more serious than in urban areas.</p>
<p>In addition to the above, another major advantage of the DANP method is that when a result factor emerges, the decision-maker can determine what has caused the issue by examining the cause factors. Take the internal relationships and transparency of the food supply chain (<italic>D</italic><sub>5</sub>) cluster as an example. <xref ref-type="table" rid="T4">Table 4</xref> shows that constraints by downstream enterprises (<italic>C</italic><sub>51</sub>) was the only result factor in this cluster, whereas transparency of supply chain (<italic>C</italic><sub>52</sub>) was the cause factor. Loose constraints on upstream enterprises by downstream enterprises on the supply chain may be due to inadequacy of supply chain transparency. Similarly, low manager awareness of social responsibilities may be due to small scale or poor business ethics of the enterprise. High expected economic benefits from food fraud may be due to the low technical hardness of fraud. These inferences conform to what occur in the real world and may provide essential references for the government in stipulating and enforcing relevant policies.</p>
</sec>
<sec>
<title>How to Identify the Clusters and Factors Influencing Enterprise Food Fraud</title>
<p>Based on the internal relationships among clusters and factors and the intrinsic mechanism of how they influence enterprise food fraud, we used the mixed weights in <xref ref-type="table" rid="T5">Table 5</xref> to further identify the key clusters and factors that influence enterprise food fraud.</p>
<p>Results demonstrated that the government regulation, social governance, and detection techniques (<italic>D</italic><sub>3</sub>) cluster had an influence weight of 0.24903, and thus was a key cluster ranking first among the five clusters, as also seen in <xref ref-type="fig" rid="F1">Figure 1</xref>. Furthermore, <italic>D</italic><sub>3</sub> had the maximum <italic>r</italic><sub><italic>i</italic></sub> &#x02212; <italic>c</italic><sub><italic>i</italic></sub> value, which did not differ significantly from that of <italic>D</italic><sub>5</sub>. This implies that, as a key cluster, <italic>D</italic><sub>3</sub> significantly influenced the other clusters and played a dominant role in the system. Therefore, based on the mixed weights, the DANP results were consistent with those obtained using DEMATEL. The results showed that the relationships between dimensions and real-world considerations are more significant than any single dimension. This also reveals the importance of establishing a system of social co-governance (implemented by improving all dimensions but not any single one) that is jointly supervised by the government and social entities in China.</p>
<p>Secondly, factors with a mixed weight &#x0003E; 0.09 in <xref ref-type="table" rid="T5">Table 5</xref> were identified as key factors that influence the food fraud behavior of enterprises. Government regulation and penalty intensity (<italic>C</italic><sub>31</sub>) was deemed a key factor based on its first-ranked mixed weight of 0.09245. This is consistent with the conclusions of Lord et al. (<xref ref-type="bibr" rid="B47">47</xref>) and Kendall et al. (<xref ref-type="bibr" rid="B54">54</xref>). The expected economic benefits (<italic>C</italic><sub>21</sub>) and maturity of market reputation mechanism (<italic>C</italic><sub>41</sub>) were also deemed as key factors with mixed weights of 0.09111 and 0.09057, ranking second and third, respectively. These findings are supported by Charlebois et al. (<xref ref-type="bibr" rid="B68">68</xref>). Transparency of supply chain (<italic>C</italic><sub>52</sub>) was also determined to be a key factor, with a mixed weight of 0.08922 (close to 0.09), ranking fourth in the system. This result is supported by Bitzios et al. (<xref ref-type="bibr" rid="B70">70</xref>).</p>
<p>The key factors identified above are consistent with previous studies, thus providing preliminary proof that the DANP method is applicable and the conclusions of the study are reliable. Furthermore, to verify the applicability of the DANP method, we compared the key factors identified by DEMATEL and DANP analyses, which showed consistent conclusions. Previous studies have generally identified key factors by the magnitude of the <italic>r</italic><sub><italic>i</italic></sub>&#x0002B;<italic>c</italic><sub><italic>i</italic></sub> values obtained using DEMATEL (<xref ref-type="bibr" rid="B55">55</xref>). As seen in <xref ref-type="table" rid="T4">Table 4</xref>, the first four key factors ranked by the DEMATEL <italic>r</italic><sub><italic>i</italic></sub> &#x0002B; <italic>c</italic><sub><italic>i</italic></sub> values were government regulation and penalty intensity, expected economic benefits from fraud, maturity of market reputation mechanism, and transparency of supply chain. These results agree with the conclusions obtained using the mixed weight magnitudes from DANP (<xref ref-type="table" rid="T5">Table 5</xref>). Therefore, it is reasonable to believe that the four key factors proposed by this paper are accurate. Thus, we found the DANP method to be applicable in the identification of key factors that influence enterprise food fraud behavior.</p>
<p>In addition to the four key factors above, six other factors, namely supervision by social forces (<italic>C</italic><sub>32</sub>), constraints by downstream enterprises (<italic>C</italic><sub>51</sub>), manager&#x00027;s awareness of social responsibility (<italic>C</italic><sub>13</sub>), consumption behavior on food market (<italic>C</italic><sub>42</sub>), technical hardness of food fraud (<italic>C</italic><sub>22</sub>), and enterprise business ethics (<italic>C</italic><sub>12</sub>), had mid-rank mixed weights ranging from 0.8 to 0.9, and were thus deemed to be secondary key factors. Two further factors, namely utility of detecting techniques and methodologies (<italic>C</italic><sub>33</sub>) and enterprise scale (<italic>C</italic><sub>11</sub>), ranked last in the system and were therefore deemed to be non-key factors. As seen from most food safety incidents in China, food fraud is primarily uncovered by simple detection. Thus, the utility of detection methodologies is not directly related to enterprise food fraud. Furthermore, although it is generally recognized that enterprise scale can influence fraudulent behavior (<xref ref-type="bibr" rid="B28">28</xref>, <xref ref-type="bibr" rid="B55">55</xref>), this was not supported in the current study. It is possible that food fraud occurs frequently in China and enterprises can commit food fraud regardless of enterprise scale. Therefore, food fraud may not be necessarily associated with enterprise scale.</p>
</sec>
</sec>
<sec id="s6">
<title>Policy Implications and Conclusions</title>
<sec>
<title>Policy Implications</title>
<p>In a complex system encompassing multiple stakeholders, we found that enterprise food fraud was subject to joint influences by multiple clusters. Government regulation, social governance, and detection techniques was the key cluster. Furthermore, government regulatory capability and penalty intensity, expected economic benefits from fraud, maturity of market reputation mechanism, and transparency of food supply chain were the four key factors. We further determined the intrinsic mechanism of fraudulent behaviors of food enterprises and demonstrated that the DANP method is effective at identifying key clusters and factors that influence enterprise food fraud.</p>
<p>The current research was based on participation of a group of experts and was conducted within the context in China&#x00027;s food systems. One common attribute is that all of the experts have deep care and understanding of policy making regarding food fraud. Thus, the results could have profound policy implications from the social co-governance perspective for China and similar economies. First, Fraudulent behavior depends not only on expected economic benefits but also on expected cost (i.e., probability of getting caught and the penalty if they are caught cheating). Among them, the probability of being caught is determined by factors such as the effectiveness of detection techniques and methods (i.e., utility of detection Techniques and methodologies), and the supervision of social forces. The punishment after being caught is determined by factors such as Government Penalty Intensity and Maturity of Market Reputation Mechanism. Due to the major attractive effect of expected economic benefits of committing food frauds for enterprises, the government should be increased penalty of getting caught, so that the economic costs of food fraud are increased to a level sufficient to change the psychological expectation for economic return of food fraud. From a social co-governance perspective, not only the government should exercise such a penalty system. Business partners (e.g., suppliers or buyers), for example, could exercise such penalty method by contract; while end consumers could exercise such penalty by collective actions of refusing purchases (<xref ref-type="bibr" rid="B98">98</xref>, <xref ref-type="bibr" rid="B99">99</xref>). In addition, in addition to strengthening supervision and sampling and improving the level of detection technology, it is also necessary to actively promote internal employees to provide food fraud clues.</p>
<p>Second, a regulation mechanism based on individual person&#x00027;s and an enterprise&#x00027;s life-long, public credit should be established. Food enterprises should be rated by credit levels and regulation should differ for the different levels, including punitive measures and close-out mechanisms against credit-losing enterprises. With such system, all stakeholders could see the credit and collectively perceive the credibility of a food enterprise.</p>
<p>Third, priority should be given to criminal liabilities. In parallel with behavioral and property punishments, confinement should be stressed, i.e., administrative detention of the responsible persons. By eliminating no or weak enforcement and limited economic penalties in substitution for stronger criminal liabilities, a lasting system-based mechanism and legislative environment will be established to ensure that food enterprises are unable to or do not wish to commit food fraud.</p>
<p>Fourth, the market reputation mechanism should be leveraged to control food fraud by disclosing food fraud information in a widespread manner through public media.</p>
<p>Fifth, a food traceability system should be established, and the food supply chain should have due transparency. Government authorities should establish and popularize food traceability systems and ensure food enterprises maintain continuous records to create reliable information flow along the supply chain, thus allowing food production processes and destinations to be monitored, food fraud to be identified by tracking, and recall to be ordered when necessary. These measures will, in turn, encourage food enterprises to maintain compliance in business operation.</p>
<p>Sixth, although the food fraud vulnerability assessment tools are still in their infancy, its full impact remains to be seen. However, over time, food fraud vulnerability assessment tools can be used to ensure the food supply chain. Play an active role in integrity (<xref ref-type="bibr" rid="B100">100</xref>). China should also actively promote and encourage companies to implement food fraud vulnerability assessments. This is also an important part of social co-governance.</p>
</sec>
<sec>
<title>Conclusions</title>
<p>This paper adopts the DANP approach to make up for the deficiencies of existing studies that do not examine the key factors (cluster) and the interrelationships between factors (cluster) that influence food enterprises&#x00027; food fraud decisions from the perspective of social co-governance and business decision making, thus contributing to an in-depth understanding of the causes of food fraud by food enterprises and to the formulation of targeted. The study contributes to the understanding of the causes of food fraud in food companies, and to the formulation of targeted measures to change the decisions of food companies and reduce food fraud at source.</p>
<p>Theoretically and practically, a social co-governance perspective extends the scope of governance to a multiple-agent level. That is, not just the producer enterprise is the focus of fraud prevention, but all stakeholders become the ones being governed by all of other social actors. The system design thinking of a food fraud governance should be a dominant logic to cover all government needs, whether which social actor is the one who is governing or governed.</p>
<p>What needs to be explained is the government regulatory capability and penalty intensity. Government has two instruments to control food fraud: (<xref ref-type="bibr" rid="B1">1</xref>) certification and (<xref ref-type="bibr" rid="B2">2</xref>) monitoring and enforcement system (<xref ref-type="bibr" rid="B31">31</xref>). The major reason for not discussing about the certification in the scope of the present study are: First, this paper is based on China&#x00027;s information. In China, the government&#x00027;s approach to countering food fraud is mainly government supervision and punishment, not certification. Second, in China, the government still needs to continuously improve the average product quality level in the market. When the government wants to increase the average product quality in the market while combating food adulteration, strict monitoring and enforcement is more effective than increasing certification costs (<xref ref-type="bibr" rid="B31">31</xref>). Therefore, this article will not discuss certification issues for the time being.</p>
<p>Additionally, in China, both legal food producers who have obtained food production licenses and a large number of illegal food producers who have not obtained licenses (such as illegal workshops) may engage in food fraud. The enterprise in this article refers to a legal food producer who has obtained a food production license. At the same time, we believe that the research conclusions are also applicable to illegal food producers who have not obtained a license to a certain extent.</p>
</sec>
</sec>
<sec sec-type="data-availability" id="s7">
<title>Data Availability Statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s8">
<title>Author Contributions</title>
<p>All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.</p>
</sec>
<sec sec-type="funding-information" id="s9">
<title>Funding</title>
<p>This study was partially supported by the National Social Science Fund of China: Research on social co-governance of food safety risks and cross-border cooperative governance mechanism (20&#x00026;ZD117).</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s10">
<title>Publisher&#x00027;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>McElwee</surname> <given-names>G</given-names></name> <name><surname>Smith</surname> <given-names>R</given-names></name> <name><surname>Lever</surname> <given-names>J</given-names></name></person-group>. <article-title>Illegal activity in the UK halal sheep supply chain: towards greater understanding</article-title>. <source>Food Policy.</source> (<year>2017</year>) <volume>69</volume>:<fpage>166</fpage>&#x02013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2017.04.006</pub-id></citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Van der Meulen</surname> <given-names>B</given-names></name></person-group>. <article-title>Is current EU food safety law geared up for fighting food fraud?</article-title> <source>Journal f&#x000FC;r Verbraucherschutz und Lebensmittelsicherheit.</source> (<year>2015</year>) <volume>101</volume>:<fpage>19</fpage>&#x02013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1007/s00003-015-0992-2</pub-id></citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>CY</given-names></name></person-group>. <article-title>Institutional isomorphism and food fraud: a longitudinal study of the mislabeling of rice in Taiwan</article-title>. <source>J Agric Environ Ethics.</source> (<year>2016</year>) <volume>29</volume>:<fpage>607</fpage>&#x02013;<lpage>30</lpage>. <pub-id pub-id-type="doi">10.1007/s10806-016-9623-x</pub-id></citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>N&#x000F6;hle</surname> <given-names>U</given-names></name></person-group>. <article-title>Food fraud, food crime oder kalter kaffee?</article-title> <source>J Consum Protect Food Saf.</source> (<year>2017</year>) <volume>12</volume>:<fpage>197</fpage>&#x02013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1007/s00003-017-1115-z</pub-id></citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spink</surname> <given-names>J</given-names></name> <name><surname>Moyer</surname> <given-names>DC</given-names></name></person-group>. <article-title>Defining the public health threat of food fraud</article-title>. <source>J Food Sci.</source> (<year>2011</year>) <volume>76</volume>:<fpage>157</fpage>&#x02013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.1111/j.1750-3841.2011.02417.x</pub-id><pub-id pub-id-type="pmid">22416717</pub-id></citation></ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Manning</surname> <given-names>L</given-names></name> <name><surname>Soon</surname> <given-names>JM</given-names></name></person-group>. <article-title>Developing systems to control food adulteration</article-title>. <source>Food Policy.</source> (<year>2014</year>) <volume>49</volume>:<fpage>23</fpage>&#x02013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2014.06.005</pub-id></citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bouzembrak</surname> <given-names>Y</given-names></name> <name><surname>Steen</surname> <given-names>B</given-names></name> <name><surname>Neslo</surname> <given-names>R</given-names></name> <name><surname>Linge</surname> <given-names>J</given-names></name> <name><surname>Mojtahed</surname> <given-names>V</given-names></name> <name><surname>Marvin</surname> <given-names>H</given-names></name></person-group>. <article-title>Development of food fraud media monitoring system based on text mining</article-title>. <source>Food Control.</source> (<year>2018</year>) <volume>93</volume>:<fpage>283</fpage>&#x02013;<lpage>96</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2018.06.003</pub-id></citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>W</given-names></name> <name><surname>Xue</surname> <given-names>J</given-names></name></person-group>. <article-title>Economically motivated food fraud and adulteration in China: an analysis based on 1,553 media reports</article-title>. <source>Food Control.</source> (<year>2016</year>) <volume>67</volume>:<fpage>192</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2016.03.004</pub-id></citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schaefer</surname> <given-names>KA</given-names></name> <name><surname>Scheitrum</surname> <given-names>D</given-names></name> <name><surname>Nes</surname> <given-names>K</given-names></name></person-group>. <article-title>International sourcing decisions in the wake of a food scandal</article-title>. <source>Food Policy.</source> (<year>2018</year>) <volume>81</volume>:<fpage>48</fpage>&#x02013;<lpage>57</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2018.10.002</pub-id></citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rocchi</surname> <given-names>B</given-names></name> <name><surname>Romano</surname> <given-names>D</given-names></name> <name><surname>Sadiddin</surname> <given-names>A</given-names></name> <name><surname>Stefani</surname> <given-names>G</given-names></name></person-group>. <article-title>Assessing the economy-wide impact of food fraud: a SAM-based counterfactual approach</article-title>. <source>Agribusiness.</source> (<year>2020</year>) <volume>36</volume>:<fpage>167</fpage>&#x02013;<lpage>91</lpage>. <pub-id pub-id-type="doi">10.1002/agr.21633</pub-id><pub-id pub-id-type="pmid">25855820</pub-id></citation></ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Everstine</surname> <given-names>K</given-names></name> <name><surname>Spink</surname> <given-names>J</given-names></name> <name><surname>Kennedy</surname> <given-names>S</given-names></name></person-group>. <article-title>Economically motivated adulteration EMA of food: common characteristics of EMA incidents</article-title>. <source>J Food Prot.</source> (<year>2013</year>) <volume>76</volume>:<fpage>723</fpage>&#x02013;<lpage>35</lpage>. <pub-id pub-id-type="doi">10.4315/0362-028X.JFP-12-399</pub-id><pub-id pub-id-type="pmid">23575142</pub-id></citation></ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>Y</given-names></name> <name><surname>Huisman</surname> <given-names>W</given-names></name> <name><surname>Hettinga</surname> <given-names>KA</given-names></name> <name><surname>Liu</surname> <given-names>N</given-names></name> <name><surname>Heck</surname> <given-names>J</given-names></name> <name><surname>Schrijver</surname> <given-names>GH</given-names></name> <etal/></person-group>. <article-title>Fraud vulnerability in the Dutch milk supply chain: assessments of farmers, processors and retailers</article-title>. <source>Food Control.</source> (<year>2019</year>) <volume>95</volume>:<fpage>308</fpage>&#x02013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2018.08.019</pub-id></citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spink</surname> <given-names>J</given-names></name> <name><surname>Ortega</surname> <given-names>DL</given-names></name> <name><surname>Chen</surname> <given-names>C</given-names></name> <name><surname>Wu</surname> <given-names>F</given-names></name></person-group>. <article-title>Food fraud prevention shifts the food risk focus to vulnerability</article-title>. <source>Trends Food Sci Technol.</source> (<year>2017</year>) <volume>62</volume>:<fpage>215</fpage>&#x02013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1016/j.tifs.2017.02.012</pub-id></citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spink</surname> <given-names>J</given-names></name> <name><surname>Fortin</surname> <given-names>ND</given-names></name> <name><surname>Moyer</surname> <given-names>DC</given-names></name> <name><surname>Miao</surname> <given-names>H</given-names></name> <name><surname>Wu</surname> <given-names>Y</given-names></name></person-group>. <article-title>Food fraud prevention: policy, strategy, and decision-making-implementation steps for a government agency or industry</article-title>. <source>CHIMIA Int J Chem.</source> (<year>2016</year>) <volume>70</volume>:<fpage>320</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.2533/chimia.2016.320</pub-id><pub-id pub-id-type="pmid">27198808</pub-id></citation></ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>T&#x000E4;hk&#x000E4;p&#x000E4;&#x000E4;</surname> <given-names>S</given-names></name> <name><surname>Maijala</surname> <given-names>R</given-names></name> <name><surname>Korkeala</surname> <given-names>H</given-names></name> <name><surname>Nevas</surname> <given-names>M</given-names></name></person-group>. <article-title>Patterns of food frauds and adulterations reported in the EU rapid alert system for food and feed and in Finland</article-title>. <source>Food Control.</source> (<year>2015</year>) <volume>47</volume>:<fpage>175</fpage>&#x02013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2014.07.007</pub-id></citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pei</surname> <given-names>X</given-names></name> <name><surname>Tandon</surname> <given-names>A</given-names></name> <name><surname>Alldrick</surname> <given-names>A</given-names></name> <name><surname>Giorgi</surname> <given-names>L</given-names></name> <name><surname>Huang</surname> <given-names>W</given-names></name> <name><surname>Yang</surname> <given-names>R</given-names></name></person-group>. <article-title>The China melamine milk scandal and its implications for food safety regulation</article-title>. <source>Food Policy.</source> (<year>2011</year>) <volume>36</volume>:<fpage>412</fpage>&#x02013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2011.03.008</pub-id></citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>L</given-names></name> <name><surname>Chen</surname> <given-names>X</given-names></name> <name><surname>Yin</surname> <given-names>S</given-names></name></person-group>. <source>Safety of Every Bite of Food: Risk Management From Farm to Table</source>. <publisher-loc>Beijing</publisher-loc>: <publisher-name>China Agriculture Press</publisher-name> (<year>2019</year>).</citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Barnett</surname> <given-names>J</given-names></name> <name><surname>Begen</surname> <given-names>F</given-names></name> <name><surname>Howes</surname> <given-names>S</given-names></name> <name><surname>Regan</surname> <given-names>A</given-names></name> <name><surname>McConnon</surname> <given-names>A</given-names></name> <name><surname>Marcu</surname> <given-names>A</given-names></name> <etal/></person-group>. <article-title>Consumers&#x00027; confidence, reflections and response strategies following the horsemeat incident</article-title>. <source>Food Control.</source> (<year>2016</year>) <volume>59</volume>:<fpage>721</fpage>&#x02013;<lpage>30</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2015.06.021</pub-id></citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mcgrath</surname> <given-names>TF</given-names></name> <name><surname>Haughey</surname> <given-names>SA</given-names></name> <name><surname>Patterson</surname> <given-names>J</given-names></name> <name><surname>Fauhl-Hassek</surname> <given-names>C</given-names></name> <name><surname>Donarski</surname> <given-names>J</given-names></name> <name><surname>Alewijn</surname> <given-names>M</given-names></name> <etal/></person-group>. <article-title>What are the scientific challenges in moving from targeted to non-targeted methods for food fraud testing and how can they be addressed? Spectroscopy case study</article-title>. <source>Trends Food Sci Technol.</source> (<year>2018</year>) <volume>76</volume>:<fpage>38</fpage>&#x02013;<lpage>55</lpage>. <pub-id pub-id-type="doi">10.1016/j.tifs.2018.04.001</pub-id></citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>L</given-names></name> <name><surname>Zhu</surname> <given-names>D</given-names></name></person-group>. <source>Food safety in China: a comprehensive review</source>. <publisher-loc>Abingdon</publisher-loc>: <publisher-name>CRC PRESS Taylor and Francis Group</publisher-name> (<year>2014</year>).</citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>A</given-names></name> <name><surname>Shen</surname> <given-names>L</given-names></name> <name><surname>Tan</surname> <given-names>Y</given-names></name> <name><surname>Zeng</surname> <given-names>Z</given-names></name> <name><surname>Liu</surname> <given-names>Y</given-names></name> <name><surname>Li</surname> <given-names>C</given-names></name></person-group>. <article-title>Food integrity in China: insights from the national food spot check data in 2016</article-title>. <source>Food Control.</source> (<year>2018</year>) <volume>84</volume>:<fpage>403</fpage>&#x02013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2017.08.033</pub-id></citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Curll</surname> <given-names>J</given-names></name></person-group>. <article-title>The significance of food fraud in Australia</article-title>. <source>Aust Bus Law Rev.</source> (<year>2015</year>) <volume>43</volume>:<fpage>270</fpage>&#x02013;<lpage>302</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/281366422">https://www.researchgate.net/publication/281366422</ext-link></citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Van Ruth</surname> <given-names>SM</given-names></name> <name><surname>Huisman</surname> <given-names>W</given-names></name> <name><surname>Luning</surname> <given-names>PA</given-names></name></person-group>. <article-title>Food fraud vulnerability and its key factors</article-title>. <source>Trends Food Sci Technol.</source> (<year>2017</year>) <volume>67</volume>:<fpage>70</fpage>&#x02013;<lpage>5</lpage>. <pub-id pub-id-type="doi">10.1016/j.tifs.2017.06.017</pub-id><pub-id pub-id-type="pmid">33648162</pub-id></citation></ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kafetzopoulos</surname> <given-names>DP</given-names></name> <name><surname>Psomas</surname> <given-names>EL</given-names></name> <name><surname>Kafetzopoulos</surname> <given-names>PD</given-names></name></person-group>. <article-title>Measuring the effectiveness of the HACCP food safety management system</article-title>. <source>Food Control.</source> (<year>2013</year>) <volume>33</volume>:<fpage>505</fpage>&#x02013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2013.03.044</pub-id></citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Djekic</surname> <given-names>I</given-names></name> <name><surname>Kuzmanovi&#x00107;</surname> <given-names>J</given-names></name> <name><surname>Andelkovi&#x00107;</surname> <given-names>A</given-names></name> <name><surname>Sara&#x0010D;evi&#x00107;</surname> <given-names>M</given-names></name> <name><surname>Stojanovi&#x00107;</surname> <given-names>M</given-names></name> <name><surname>Toma&#x00161;evi&#x00107;</surname> <given-names>I</given-names></name></person-group>. <article-title>Effects of HACCP on process hygiene in different types of Serbian food establishments</article-title>. <source>Food Control.</source> (<year>2016</year>) <volume>60</volume>:<fpage>131</fpage>&#x02013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2015.07.028</pub-id></citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lord</surname> <given-names>N</given-names></name> <name><surname>Flores Elizondo</surname> <given-names>CJ</given-names></name> <name><surname>Spencer</surname> <given-names>J</given-names></name></person-group>. <article-title>The dynamics of food fraud: the interactions between criminal opportunity and market dys functionality in legitimate business</article-title>. <source>Criminol Crim Just.</source> (<year>2017</year>) <volume>17</volume>:<fpage>605</fpage>&#x02013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1177/1748895816684539</pub-id></citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ehmke</surname> <given-names>MD</given-names></name> <name><surname>Bonanno</surname> <given-names>A</given-names></name> <name><surname>Boys</surname> <given-names>K</given-names></name> <name><surname>Smith</surname> <given-names>TG</given-names></name></person-group>. <article-title>Food fraud: economic insights into the dark side of incentives</article-title>. <source>Aust J Agric Resource Econ.</source> (<year>2019</year>) <volume>63</volume>:<fpage>685</fpage>&#x02013;<lpage>700</lpage>. <pub-id pub-id-type="doi">10.1111/1467-8489.12346</pub-id></citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Levi</surname> <given-names>R</given-names></name> <name><surname>Singhvi</surname> <given-names>S</given-names></name> <name><surname>Zheng</surname> <given-names>Y</given-names></name></person-group>. <article-title>Economically motivated adulteration in farming supply chains</article-title>. <source>Manage Sci</source>. (<year>2020</year>) <volume>66</volume>:<fpage>209</fpage>&#x02013;<lpage>26</lpage>. <pub-id pub-id-type="doi">10.1287/mnsc.2018.3215</pub-id><pub-id pub-id-type="pmid">33320941</pub-id></citation></ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meerza</surname> <given-names>S</given-names></name> <name><surname>Giannakas</surname> <given-names>K</given-names></name> <name><surname>Yiannaka</surname> <given-names>A</given-names></name></person-group>. <article-title>Market and welfare effects of food fraud</article-title>. <source>Aust J Agric Resource Econ.</source> (<year>2019</year>) <volume>64</volume>:<fpage>759</fpage>&#x02013;<lpage>89</lpage>. <pub-id pub-id-type="doi">10.1111/1467-8489.12348</pub-id></citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meerza</surname> <given-names>S</given-names></name> <name><surname>Gustafson</surname> <given-names>CR</given-names></name></person-group>. <article-title>Consumers&#x00027; response to food fraud: evidence from experimental auctions</article-title>. <source>J Agric Resource Econ.</source> (<year>2020</year>) <volume>45</volume>:<fpage>219</fpage>&#x02013;<lpage>31</lpage>. <pub-id pub-id-type="doi">10.22004/ag.econ.302451</pub-id></citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meerza</surname> <given-names>S</given-names></name> <name><surname>Giannakas</surname> <given-names>K</given-names></name> <name><surname>Yiannaka</surname> <given-names>A</given-names></name></person-group>. <article-title>Optimal policy response to food fraud</article-title>. <source>J Agric Resource Econ.</source> (<year>2021</year>) <volume>46</volume>:<fpage>343</fpage>&#x02013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.22004/ag.econ.307459</pub-id></citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Manning</surname> <given-names>L</given-names></name> <name><surname>Smith</surname> <given-names>R</given-names></name> <name><surname>Soon</surname> <given-names>JM</given-names></name></person-group>. <article-title>Developing an organizational typology of criminals in the meat supply chain</article-title>. <source>Food Policy.</source> (<year>2016</year>) <volume>59</volume>:<fpage>44</fpage>&#x02013;<lpage>54</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2015.12.003</pub-id></citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>L</given-names></name> <name><surname>Liu</surname> <given-names>P</given-names></name> <name><surname>Lv</surname> <given-names>Y</given-names></name> <name><surname>Chen</surname> <given-names>X</given-names></name></person-group>. <article-title>Social co-governance for food safety risks</article-title>. <source>Sustainability.</source> (<year>2018</year>) <volume>10</volume>:<fpage>42</fpage>&#x02013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.3390/su10114246</pub-id></citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Martinez</surname> <given-names>MG</given-names></name> <name><surname>Fearne</surname> <given-names>A</given-names></name> <name><surname>Caswell</surname> <given-names>JA</given-names></name> <name><surname>Henson</surname> <given-names>S</given-names></name></person-group>. <article-title>Co-regulation as a possible model for food safety governance: opportunities for public-private partnerships</article-title>. <source>Food Policy.</source> (<year>2007</year>) <volume>32</volume>:<fpage>299</fpage>&#x02013;<lpage>314</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2006.07.005</pub-id></citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Russell</surname> <given-names>CA</given-names></name> <name><surname>Russell</surname> <given-names>DW</given-names></name> <name><surname>Honea</surname> <given-names>H</given-names></name></person-group>. <article-title>Corporate social responsibility failures: how do consumers respond to corporate violations of implied social contracts?</article-title> <source>J Bus Ethics.</source> (<year>2016</year>) <volume>136</volume>:<fpage>759</fpage>&#x02013;<lpage>73</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-015-2868-x</pub-id></citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname> <given-names>CN</given-names></name> <name><surname>Liou</surname> <given-names>JJ</given-names></name> <name><surname>Chuang</surname> <given-names>YC</given-names></name></person-group>. <article-title>A method for exploring the interdependencies and importance of critical infrastructures</article-title>. <source>Knowledge Based Syst.</source> (<year>2014</year>) <volume>55</volume>:<fpage>66</fpage>&#x02013;<lpage>74</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2013.10.010</pub-id></citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>L</given-names></name> <name><surname>Xu</surname> <given-names>G</given-names></name> <name><surname>Wang</surname> <given-names>X</given-names></name></person-group>. <article-title>Identifying critical factors influencing the disposal of dead pigs by farmers in China</article-title>. <source>Environ Sci Pollut Res.</source> (<year>2016</year>) <volume>23</volume>:<fpage>661</fpage>&#x02013;<lpage>72</lpage>. <pub-id pub-id-type="doi">10.1007/s11356-015-5284-y</pub-id><pub-id pub-id-type="pmid">26330314</pub-id></citation></ref>
<ref id="B38">
<label>38.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Akerlof</surname> <given-names>GA</given-names></name></person-group>. <article-title>The market for &#x02018;lemons&#x00027;: quality uncertainty and the market mechanism</article-title>. <source>Q J Econ.</source> (<year>1970</year>) <volume>843</volume>:<fpage>488</fpage>&#x02013;<lpage>500</lpage>. <pub-id pub-id-type="doi">10.2307/1879431</pub-id></citation>
</ref>
<ref id="B39">
<label>39.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Darby</surname> <given-names>MR</given-names></name> <name><surname>Karni</surname> <given-names>E</given-names></name></person-group>. <article-title>Free competition and the optimal amount of fraud</article-title>. <source>J Law Econ.</source> (<year>1973</year>) <volume>16</volume>:<fpage>67</fpage>&#x02013;<lpage>88</lpage>. <pub-id pub-id-type="doi">10.1086/466756</pub-id></citation>
</ref>
<ref id="B40">
<label>40.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rouvi&#x000E8;re</surname> <given-names>E</given-names></name> <name><surname>Caswell</surname> <given-names>JA</given-names></name></person-group>. <article-title>From punishment to prevention: a French case study of the introduction of co-regulation in enforcing food safety</article-title>. <source>Food Policy.</source> (<year>2012</year>) <volume>37</volume>:<fpage>246</fpage>&#x02013;<lpage>54</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2012.02.009</pub-id></citation>
</ref>
<ref id="B41">
<label>41.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Codron</surname> <given-names>JM</given-names></name> <name><surname>Fares</surname> <given-names>M</given-names></name> <name><surname>Rouviere</surname> <given-names>E</given-names></name></person-group>. <article-title>From public to private safety regulation? The case of negotiated agreements in the French fresh produce import industry</article-title>. <source>Int J Agric Resources Governance Ecol.</source> (<year>2007</year>) <volume>6</volume>:<fpage>415</fpage>&#x02013;<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1504/IJARGE.2007.012845</pub-id></citation>
</ref>
<ref id="B42">
<label>42.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hobbs</surname> <given-names>JE</given-names></name> <name><surname>Fearne</surname> <given-names>A</given-names></name> <name><surname>Spriggs</surname> <given-names>J</given-names></name></person-group>. <article-title>Incentive structures for food safety and quality assurance: an international comparison</article-title>. <source>Food Control.</source> (<year>2002</year>) <volume>13</volume>:<fpage>77</fpage>&#x02013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1016/S0956-7135(01)00103-7</pub-id></citation>
</ref>
<ref id="B43">
<label>43.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Starbird</surname> <given-names>SA</given-names></name></person-group>. <article-title>Designing food safety regulations: the effect of inspection policy and penalties for noncompliance on food processor behavior</article-title>. <source>J Agric Resource Econ.</source> (<year>2000</year>) <volume>25</volume>:<fpage>616</fpage>&#x02013;<lpage>35</lpage>. <pub-id pub-id-type="doi">10.22004/ag.econ.30898</pub-id></citation>
</ref>
<ref id="B44">
<label>44.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hirschauer</surname> <given-names>N</given-names></name> <name><surname>Musshoff</surname> <given-names>O</given-names></name></person-group>. <article-title>A game-theoretic approach to behavioral food risks: the case of grain producers</article-title>. <source>Food Policy.</source> (<year>2007</year>) <volume>32</volume>:<fpage>246</fpage>&#x02013;<lpage>65</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2006.07.001</pub-id></citation>
</ref>
<ref id="B45">
<label>45.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moore</surname> <given-names>JC</given-names></name> <name><surname>Spink</surname> <given-names>J</given-names></name> <name><surname>Lipp</surname> <given-names>M</given-names></name></person-group>. <article-title>Development and application of a database of food ingredient fraud and economically motivated adulteration from 1980 to 2010</article-title>. <source>J Food Sci.</source> (<year>2012</year>) <volume>77</volume>:<fpage>118</fpage>&#x02013;<lpage>26</lpage>. <pub-id pub-id-type="doi">10.1111/j.1750-3841.2012.02657.x</pub-id><pub-id pub-id-type="pmid">22486545</pub-id></citation></ref>
<ref id="B46">
<label>46.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Primrose</surname> <given-names>S</given-names></name> <name><surname>Woolfe</surname> <given-names>M</given-names></name> <name><surname>Rollinson</surname> <given-names>S</given-names></name></person-group>. <article-title>Food forensics: methods for determining the authenticity of foodstuffs</article-title>. <source>Trends Food Sci Technol.</source> (<year>2010</year>) <volume>21</volume>:<fpage>582</fpage>&#x02013;<lpage>90</lpage>. <pub-id pub-id-type="doi">10.1016/j.tifs.2010.09.006</pub-id></citation>
</ref>
<ref id="B47">
<label>47.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lord</surname> <given-names>N</given-names></name> <name><surname>Spencer</surname> <given-names>J</given-names></name> <name><surname>Albanese</surname> <given-names>J</given-names></name> <name><surname>Elizondo</surname> <given-names>CF</given-names></name></person-group>. <article-title>In pursuit of food system integrity: the situational prevention of food fraud enterprise</article-title>. <source>Eur J Crim Policy Res.</source> (<year>2017</year>) <volume>23</volume>:<fpage>483</fpage>&#x02013;<lpage>501</lpage>. <pub-id pub-id-type="doi">10.1007/s10610-017-9352-3</pub-id></citation>
</ref>
<ref id="B48">
<label>48.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Manning</surname> <given-names>L</given-names></name> <name><surname>Soon</surname> <given-names>JM</given-names></name></person-group>. <article-title>Food safety, food fraud, and food defense: a fast evolving literature</article-title>. <source>J Food Sci.</source> (<year>2016</year>) <volume>81</volume>:<fpage>823</fpage>&#x02013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1111/1750-3841.13256</pub-id><pub-id pub-id-type="pmid">26934423</pub-id></citation></ref>
<ref id="B49">
<label>49.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Silvis</surname> <given-names>ICJ</given-names></name> <name><surname>Van Ruth</surname> <given-names>SM</given-names></name> <name><surname>Van Der Fels-klerx</surname> <given-names>HJ</given-names></name> <name><surname>Luning</surname> <given-names>PA</given-names></name></person-group>. <article-title>Assessment of food fraud vulnerability in the spices chain: an explorative study</article-title>. <source>Food Control.</source> (<year>2017</year>) <volume>81</volume>:<fpage>80</fpage>&#x02013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2017.05.019</pub-id></citation>
</ref>
<ref id="B50">
<label>50.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>Y</given-names></name> <name><surname>Huisman</surname> <given-names>W</given-names></name> <name><surname>Hettinga</surname> <given-names>KA</given-names></name> <name><surname>Zhang</surname> <given-names>L</given-names></name> <name><surname>van Ruth</surname> <given-names>S</given-names></name></person-group>. <article-title>The Chinese milk supply chain: a fraud perspective</article-title>. <source>Food Control.</source> (<year>2020</year>) <volume>113</volume>:<fpage>107211</fpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2020.107211</pub-id></citation>
</ref>
<ref id="B51">
<label>51.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rouviere</surname> <given-names>E</given-names></name> <name><surname>Royer</surname> <given-names>A</given-names></name></person-group>. <article-title>Public private partnerships in food industries: a road to success?</article-title> <source>Food Policy.</source> (<year>2017</year>) <volume>69</volume>:<fpage>135</fpage>&#x02013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2017.04.003</pub-id></citation>
</ref>
<ref id="B52">
<label>52.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mutshewa</surname> <given-names>A</given-names></name></person-group>. <article-title>The use of information by environmental planners: a qualitative study using grounded theory methodology</article-title>. <source>Inform Process Manage.</source> (<year>2010</year>) <volume>46</volume>:<fpage>212</fpage>&#x02013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1016/j.ipm.2009.09.006</pub-id></citation>
</ref>
<ref id="B53">
<label>53.</label>
<citation citation-type="book"><person-group person-group-type="author"><collab>Commission on Global Governance</collab></person-group>. <source>Our Global Neighbourhood: The Report of the Commission on Global Governance</source>. <publisher-loc>London</publisher-loc>: <publisher-name>Oxford University Press</publisher-name> (<year>1995</year>).</citation>
</ref>
<ref id="B54">
<label>54.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kendall</surname> <given-names>H</given-names></name> <name><surname>Kuznesof</surname> <given-names>S</given-names></name> <name><surname>Dean</surname> <given-names>M</given-names></name> <name><surname>Chan</surname> <given-names>MY</given-names></name> <name><surname>Clark</surname> <given-names>B</given-names></name> <name><surname>Home</surname> <given-names>R</given-names></name> <etal/></person-group>. <article-title>Chinese consumer&#x00027;s attitudes, perceptions and behavioural responses towards food fraud</article-title>. <source>Food Control.</source> (<year>2019</year>) <volume>95</volume>:<fpage>339</fpage>&#x02013;<lpage>51</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2018.08.006</pub-id></citation>
</ref>
<ref id="B55">
<label>55.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>L</given-names></name> <name><surname>Zhang</surname> <given-names>Q</given-names></name> <name><surname>Shan</surname> <given-names>L</given-names></name> <name><surname>Chen</surname> <given-names>Z</given-names></name></person-group>. <article-title>Identifying critical factors influencing the use of additives by food enterprises in China</article-title>. <source>Food Control.</source> (<year>2013</year>) <volume>31</volume>:<fpage>425</fpage>&#x02013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2012.10.028</pub-id></citation>
</ref>
<ref id="B56">
<label>56.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Enderle</surname> <given-names>G</given-names></name></person-group>. <article-title>How can business ethics strengthen the social cohesion of a society?</article-title> <source>J Bus Ethics.</source> (<year>2018</year>) <volume>150</volume>:<fpage>619</fpage>&#x02013;<lpage>29</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-016-3196-5</pub-id></citation>
</ref>
<ref id="B57">
<label>57.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>El Darra</surname> <given-names>N</given-names></name> <name><surname>Rajha</surname> <given-names>HN</given-names></name> <name><surname>Saleh</surname> <given-names>F</given-names></name> <name><surname>Al-Oweini</surname> <given-names>R</given-names></name> <name><surname>Maroun</surname> <given-names>RG</given-names></name> <name><surname>Louka</surname> <given-names>N</given-names></name></person-group>. <article-title>Food fraud detection in commercial pomegranate molasses syrups by UV-VIS spectroscopy, ATR-FTIR spectroscopy and HPLC methods</article-title>. <source>Food Control.</source> (<year>2017</year>) <volume>78</volume>:<fpage>132</fpage>&#x02013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2017.02.043</pub-id></citation>
</ref>
<ref id="B58">
<label>58.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cohen</surname> <given-names>J</given-names></name> <name><surname>Ding</surname> <given-names>Y</given-names></name> <name><surname>Lesage</surname> <given-names>C</given-names></name> <name><surname>Stolowy</surname> <given-names>H</given-names></name></person-group>. <article-title>Corporate fraud and managers&#x00027; behavior: evidence from the press</article-title>. <source>J Bus Ethics.</source> (<year>2010</year>) <volume>95</volume>:<fpage>271</fpage>&#x02013;<lpage>315</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-011-0857-2</pub-id></citation>
</ref>
<ref id="B59">
<label>59.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Collins</surname> <given-names>EJ</given-names></name></person-group>. <article-title>Food adulteration and food safety in Britain in the 19th and early 20th centuries</article-title>. <source>Food Policy.</source> (<year>1993</year>) <volume>18</volume>:<fpage>95</fpage>&#x02013;<lpage>109</lpage>. <pub-id pub-id-type="doi">10.1016/0306-9192(93)90018-7</pub-id></citation>
</ref>
<ref id="B60">
<label>60.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Murphy</surname> <given-names>PR</given-names></name> <name><surname>Dacin</surname> <given-names>MT</given-names></name></person-group>. <article-title>Psychological pathways to fraud: understanding and preventing fraud in organizations</article-title>. <source>J Bus Ethics.</source> (<year>2011</year>) <volume>101</volume>:<fpage>601</fpage>&#x02013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-011-0741-0</pub-id></citation>
</ref>
<ref id="B61">
<label>61.</label>
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Dani</surname> <given-names>S</given-names></name> <name><surname>Fassam</surname> <given-names>L</given-names></name></person-group>. <article-title>The convergence of ethics and fraud: challenges facing procurement functions in food supply chains</article-title>. In: <source>Proceedings of 21st Logistics Research Network LRN Annual Conference 2016</source>. <publisher-loc>Hull</publisher-loc>: <publisher-name>University of Hull</publisher-name>, (<year>2016</year>).</citation>
</ref>
<ref id="B62">
<label>62.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Freeman</surname> <given-names>I</given-names></name> <name><surname>Hasnaoui</surname> <given-names>A</given-names></name></person-group>. <article-title>The meaning of corporate social responsibility: the vision of four nations</article-title>. <source>J Bus Ethics.</source> (<year>2011</year>) <volume>100</volume>:<fpage>419</fpage>&#x02013;<lpage>43</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-010-0688-6</pub-id></citation>
</ref>
<ref id="B63">
<label>63.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Miller</surname> <given-names>S</given-names></name> <name><surname>Tait</surname> <given-names>P</given-names></name> <name><surname>Saunders</surname> <given-names>C</given-names></name> <name><surname>Dalziel</surname> <given-names>P</given-names></name> <name><surname>Rutherford</surname> <given-names>P</given-names></name> <name><surname>Abell</surname> <given-names>W</given-names></name></person-group>. <article-title>Estimation of consumer willingness-to-pay for social responsibility in fruit and vegetable products: a cross-country comparison using a choice experiment</article-title>. <source>J Consum Behav.</source> (<year>2017</year>) <volume>16</volume>:<fpage>13</fpage>&#x02013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.1002/cb.1650</pub-id></citation>
</ref>
<ref id="B64">
<label>64.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Leon</surname> <given-names>KS</given-names></name> <name><surname>Ken</surname> <given-names>I</given-names></name></person-group>. <article-title>Food fraud and the partnership for a &#x02018;healthier&#x00027; America: a case study in state-corporate crime</article-title>. <source>Crit Criminol.</source> (<year>2017</year>) <volume>25</volume>:<fpage>1</fpage>&#x02013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1007/s10612-017-9363-x</pub-id></citation>
</ref>
<ref id="B65">
<label>65.</label>
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Donaldson</surname> <given-names>J</given-names></name> <name><surname>Fafaliou</surname> <given-names>I</given-names></name></person-group>. <article-title>Business ethics, corporate social responsibility and corporate governance: a review and summary critique</article-title>. <source>Eur Res Stud.</source> (<year>2003</year>) <volume>6</volume>:<fpage>90</fpage>&#x02013;<lpage>110</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.um.edu.mt/library.oar//handle/123456789/30879">https://www.um.edu.mt/library.oar//handle/123456789/30879</ext-link></citation>
</ref>
<ref id="B66">
<label>66.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>D</given-names></name> <name><surname>Gao</surname> <given-names>Y</given-names></name> <name><surname>Morse</surname> <given-names>S</given-names></name></person-group>. <article-title>Corporate social responsibility and food risk management in China: a management perspective</article-title>. <source>Food Control.</source> (<year>2015</year>) <volume>49</volume>:<fpage>2</fpage>&#x02013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2013.01.030</pub-id></citation>
</ref>
<ref id="B67">
<label>67.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moyer</surname> <given-names>DC</given-names></name> <name><surname>DeVries</surname> <given-names>JW</given-names></name> <name><surname>Spink</surname> <given-names>J</given-names></name></person-group>. <article-title>The economics of a food fraud incident: case studies and examples including Melamine in Wheat Gluten</article-title>. <source>Food Control.</source> (<year>2017</year>) <volume>71</volume>:<fpage>358</fpage>&#x02013;<lpage>64</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2016.07.015</pub-id></citation>
</ref>
<ref id="B68">
<label>68.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Charlebois</surname> <given-names>S</given-names></name> <name><surname>Schwab</surname> <given-names>A</given-names></name> <name><surname>Henn</surname> <given-names>R</given-names></name> <name><surname>Huck</surname> <given-names>CW</given-names></name></person-group>. <article-title>Food fraud: An exploratory study for measuring consumer perception towards mislabeled food products and influence on self-authentication intentions</article-title>. <source>Trends Food Sci Technol.</source> (<year>2016</year>) <volume>50</volume>:<fpage>211</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1016/j.tifs.2016.02.003</pub-id></citation>
</ref>
<ref id="B69">
<label>69.</label>
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Zhao</surname> <given-names>P</given-names></name> <name><surname>Zhang</surname> <given-names>L</given-names></name> <name><surname>Hu</surname> <given-names>S</given-names></name></person-group>. <article-title>Study on the behavior of counterfeiter and regulators based on Evolutionary Game</article-title>. <source>Econ Manage.</source> (<year>2018</year>) <volume>32</volume>:<fpage>76</fpage>&#x02013;<lpage>82</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://en.cnki.com.cn/Article_en/CJFDTotal-JJGL201804014.htm">en.cnki.com.cn/Article_en/CJFDTotal-JJGL201804014.htm</ext-link></citation>
</ref>
<ref id="B70">
<label>70.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bitzios</surname> <given-names>M</given-names></name> <name><surname>Lisa</surname> <given-names>J</given-names></name> <name><surname>Krzyzaniak</surname> <given-names>SA</given-names></name> <name><surname>Mark</surname> <given-names>XU</given-names></name></person-group>. <article-title>Country-of-origin labelling, food traceability drivers and food fraud: lessons from consumers&#x00027; preferences and perceptions</article-title>. <source>Eur J Risk Regul.</source> (<year>2017</year>) <volume>8</volume>:<fpage>541</fpage>&#x02013;<lpage>58</lpage>. <pub-id pub-id-type="doi">10.1017/err.2017.27</pub-id><pub-id pub-id-type="pmid">30886898</pub-id></citation></ref>
<ref id="B71">
<label>71.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spink</surname> <given-names>J</given-names></name></person-group>. <article-title>Safety of food and beverages: risks of food adulteration</article-title>. <source>Encyc Food Saf.</source> (<year>2014</year>) <volume>3</volume>:<fpage>413</fpage>&#x02013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1016/B978-0-12-378612-8.00300-0</pub-id></citation>
</ref>
<ref id="B72">
<label>72.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>&#x000C1;lvarez</surname> <given-names>BM</given-names></name> <name><surname>Pascual-Alonso</surname> <given-names>M</given-names></name> <name><surname>Rusu</surname> <given-names>A</given-names></name> <name><surname>Bogason</surname> <given-names>SG</given-names></name></person-group>. <article-title>A review on existing databases relevant for food fraud and authenticity</article-title>. <source>Archivos de zootecnia.</source> (<year>2013</year>) <volume>62</volume>:<fpage>73</fpage>&#x02013;<lpage>91</lpage>. <pub-id pub-id-type="doi">10.21071/az.v62iREV.1958</pub-id></citation>
</ref>
<ref id="B73">
<label>73.</label>
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Anita</surname> <given-names>S</given-names></name> <name><surname>Bhatt</surname> <given-names>SR</given-names></name> <name><surname>Bhatt</surname> <given-names>SM</given-names></name></person-group>. <article-title>Food adulteration and practices in urban area of Varanasi</article-title>. <source>Food Sci Res J.</source> (<year>2010</year>) <volume>1</volume>:<fpage>183</fpage>&#x02013;<lpage>95</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.researchgate.net/publication/230688059">www.researchgate.net/publication/230688059</ext-link></citation>
</ref>
<ref id="B74">
<label>74.</label>
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Jack</surname> <given-names>L</given-names></name></person-group>. <source>Risk Modelling of Food Fraud Motivation: &#x0201C;NSF Fraud Protection Model&#x0201D; Intelligent Risk Model Scoping Project FS 246004. NSF Safety and Quality UK Ltd</source>. (<year>2015</year>). Available online at: <ext-link ext-link-type="uri" xlink:href="https://core.ac.uk/download/pdf/29588958.pdf">https://core.ac.uk/download/pdf/29588958.pdf</ext-link></citation>
</ref>
<ref id="B75">
<label>75.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>D</given-names></name> <name><surname>Zang</surname> <given-names>M</given-names></name> <name><surname>Li</surname> <given-names>X</given-names></name> <name><surname>Zhang</surname> <given-names>K</given-names></name> <name><surname>Wang</surname> <given-names>S</given-names></name></person-group>. <article-title>A study on the food fraud of national food safety and sample inspection of China</article-title>. <source>Food Control.</source> (<year>2020</year>) <volume>116</volume>:<fpage>107306</fpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2020.107306</pub-id></citation>
</ref>
<ref id="B76">
<label>76.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>Y</given-names></name> <name><surname>Cai</surname> <given-names>H</given-names></name></person-group>. <article-title>Fraud propagations and containments: a study based on evolutionary game simulation model</article-title>. <source>Wuhan Univ J Phil Soc Sci.</source> (<year>2014</year>) <volume>67</volume>:<fpage>112</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.14086/j.cnki.wujss.2014.0</pub-id></citation>
</ref>
<ref id="B77">
<label>77.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Peng</surname> <given-names>Y</given-names></name> <name><surname>Li</surname> <given-names>J</given-names></name> <name><surname>Xia</surname> <given-names>H</given-names></name> <name><surname>Qi</surname> <given-names>S</given-names></name> <name><surname>Li</surname> <given-names>J</given-names></name></person-group>. <article-title>The effects of food safety issues released by we media on consumers&#x00027; awareness and purchasing behavior: a case study in China</article-title>. <source>Food Policy.</source> (<year>2015</year>) <volume>51</volume>:<fpage>44</fpage>&#x02013;<lpage>52</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2014.12.010</pub-id></citation>
</ref>
<ref id="B78">
<label>78.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Scott</surname> <given-names>S</given-names></name> <name><surname>Si</surname> <given-names>Z</given-names></name> <name><surname>Schumilas</surname> <given-names>T</given-names></name> <name><surname>Chen</surname> <given-names>A</given-names></name></person-group>. <article-title>Contradictions in state-and civil society-driven developments in China&#x00027;s ecological agriculture sector</article-title>. <source>Food Policy.</source> (<year>2014</year>) <volume>45</volume>:<fpage>158</fpage>&#x02013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodpol.2013.08.002</pub-id></citation>
</ref>
<ref id="B79">
<label>79.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>G</given-names></name> <name><surname>Fargher</surname> <given-names>N</given-names></name></person-group>. <article-title>Companies&#x00027; use of whistle-blowing to detect fraud: an examination of corporate whistle-blowing policies</article-title>. <source>J Bus Ethics.</source> (<year>2013</year>) <volume>114</volume>:<fpage>283</fpage>&#x02013;<lpage>95</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-012-1348-9</pub-id></citation>
</ref>
<ref id="B80">
<label>80.</label>
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Waterhouse</surname> <given-names>AL</given-names></name> <name><surname>Sacks</surname> <given-names>GL</given-names></name> <name><surname>Jeffery</surname> <given-names>DW</given-names></name></person-group>. <source>Understanding Wine Chemistry</source>. <publisher-loc>Chichester</publisher-loc>: <publisher-name>John Wiley and Sons</publisher-name> (<year>2016</year>).</citation>
</ref>
<ref id="B81">
<label>81.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>Y</given-names></name> <name><surname>Wu</surname> <given-names>L</given-names></name> <name><surname>Pu</surname> <given-names>X</given-names></name> <name><surname>Lin</surname> <given-names>M</given-names></name></person-group>. <article-title>Main factors affecting social organizations&#x00027;capabilities of involving in food safety risk management in food industry</article-title>. <source>China Populat Resources Environ.</source> (<year>2016</year>) <volume>26</volume>:<fpage>167</fpage>&#x02013;<lpage>76</lpage>. <pub-id pub-id-type="doi">10.3969/j.issn.1002-2014.2016.08.022</pub-id></citation>
</ref>
<ref id="B82">
<label>82.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Esslinger</surname> <given-names>S</given-names></name> <name><surname>Riedl</surname> <given-names>J</given-names></name> <name><surname>Fauhl-Hassek</surname> <given-names>C</given-names></name></person-group>. <article-title>Potential and limitations of non-targeted fingerprinting for authentication of food in official control</article-title>. <source>Food Res Int.</source> (<year>2014</year>) <volume>60</volume>:<fpage>189</fpage>&#x02013;<lpage>204</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodres.2013.10.015</pub-id></citation>
</ref>
<ref id="B83">
<label>83.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ryan</surname> <given-names>J</given-names></name> <name><surname>Casidy</surname> <given-names>R</given-names></name></person-group>. <article-title>The role of brand reputation in organic food consumption: a behavioral reasoning perspective</article-title>. <source>J Retail Consum Serv.</source> (<year>2018</year>) <volume>41</volume>:<fpage>239</fpage>&#x02013;<lpage>47</lpage>. <pub-id pub-id-type="doi">10.1016/j.jretconser.2018.01.002</pub-id></citation>
</ref>
<ref id="B84">
<label>84.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname> <given-names>X</given-names></name> <name><surname>Feng</surname> <given-names>Z</given-names></name></person-group>. <article-title>Study on the relationship between repulation effects and the level of food safety: evidence from China famous trademarks</article-title>. <source>Res Econ Manage.</source> (<year>2014</year>) <volume>6</volume>:<fpage>111</fpage>&#x02013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.13502/j.cnki.issn10000-7636.2014.06.014</pub-id></citation>
</ref>
<ref id="B85">
<label>85.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wilkes</surname> <given-names>E</given-names></name> <name><surname>Day</surname> <given-names>M</given-names></name> <name><surname>Herderich</surname> <given-names>M</given-names></name> <name><surname>Johnson</surname> <given-names>D</given-names></name></person-group>. <article-title>AWRI reports: <italic>in vivo</italic> veritas-investigating technologies to fight wine fraud</article-title>. <source>Wine Viticulture J.</source> (<year>2016</year>) <volume>31</volume>:<fpage>36</fpage>&#x02013;<lpage>8</lpage>.</citation>
</ref>
<ref id="B86">
<label>86.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meerza</surname> <given-names>S</given-names></name> <name><surname>Gustafson</surname> <given-names>CR</given-names></name></person-group>. <article-title>Does prior knowledge of food fraud affect consumer behavior? Evidence from an incentivized economic experiment</article-title>. <source>PLoS ONE.</source> (<year>2019</year>) <volume>14</volume>:<fpage>e0225113</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0225113</pub-id><pub-id pub-id-type="pmid">31794556</pub-id></citation></ref>
<ref id="B87">
<label>87.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Soon</surname> <given-names>JM</given-names></name> <name><surname>Liu</surname> <given-names>X</given-names></name></person-group>. <article-title>Chinese consumers&#x00027; risk mitigating strategies against food fraud</article-title>. <source>Food Control.</source> (<year>2020</year>) <volume>115</volume>:<fpage>107298</fpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2020.107298</pub-id></citation>
</ref>
<ref id="B88">
<label>88.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Babich</surname> <given-names>V</given-names></name> <name><surname>Tang</surname> <given-names>CS</given-names></name></person-group>. <article-title>Managing opportunistic supplier product adulteration: deferred payments, inspection, and combined mechanisms</article-title>. <source>Manufact Serv Operat Manage.</source> (<year>2012</year>) <volume>14</volume>:<fpage>301</fpage>&#x02013;<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1287/msom.1110.0366</pub-id></citation>
</ref>
<ref id="B89">
<label>89.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cao</surname> <given-names>Y</given-names></name> <name><surname>Hu</surname> <given-names>H</given-names></name> <name><surname>Wan</surname> <given-names>G</given-names></name></person-group>. <article-title>Game analysis and mechanism choices of supplier product adulteration behavior</article-title>. <source>Operat Res Manage Sci.</source> (<year>2017</year>) <volume>7</volume>:<fpage>54</fpage>&#x02013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.12005/orms.2017.0162</pub-id></citation>
</ref>
<ref id="B90">
<label>90.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Beulens</surname> <given-names>AJ</given-names></name> <name><surname>Broens</surname> <given-names>DF</given-names></name> <name><surname>Folstar</surname> <given-names>P</given-names></name> <name><surname>Hofstede</surname> <given-names>GJ</given-names></name></person-group>. <article-title>Food safety and transparency in food chains and networks relationships and challenges</article-title>. <source>Food Control.</source> (<year>2005</year>) <volume>16</volume>:<fpage>481</fpage>&#x02013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2003.10.010</pub-id></citation>
</ref>
<ref id="B91">
<label>91.</label>
<citation citation-type="web"><person-group person-group-type="author"><collab>Safe Supply of Affordable Food Everywhere (2016)</collab></person-group>. <source>Food Fraud Vulnerability Assessment Tool</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.ssafe-food.org/our-projects">http://www.ssafe-food.org/our-projects</ext-link></citation>
</ref>
<ref id="B92">
<label>92.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hsu</surname> <given-names>CH</given-names></name> <name><surname>Wang</surname> <given-names>FK</given-names></name> <name><surname>Tzeng</surname> <given-names>GH</given-names></name></person-group>. <article-title>The best vendor selection for conducting the recycled material based on a hybrid MCDM model combining DANP with VIKOR</article-title>. <source>Resources Conserv Recycling.</source> (<year>2012</year>) <volume>66</volume>:<fpage>95</fpage>&#x02013;<lpage>111</lpage>. <pub-id pub-id-type="doi">10.1016/j.resconrec.2012.02.009</pub-id></citation>
</ref>
<ref id="B93">
<label>93.</label>
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Denzin</surname> <given-names>NK</given-names></name> <name><surname>Lincoln</surname> <given-names>YS</given-names></name></person-group>. <source>The Landscape of Qualitative Research: Theories and Issues</source>. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>Sage Publications</publisher-name> (<year>1998</year>). <pub-id pub-id-type="pmid">28718743</pub-id></citation></ref>
<ref id="B94">
<label>94.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chiu</surname> <given-names>WY</given-names></name> <name><surname>Tzeng</surname> <given-names>GH</given-names></name> <name><surname>Li</surname> <given-names>HL</given-names></name></person-group>. <article-title>A new hybrid mcdm model combining danp with vikor to improve e-store business</article-title>. <source>Knowledge Based Syst.</source> (<year>2013</year>) <volume>37</volume>:<fpage>48</fpage>&#x02013;<lpage>61</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2012.06.017</pub-id></citation>
</ref>
<ref id="B95">
<label>95.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shen</surname> <given-names>KY</given-names></name> <name><surname>Tzeng</surname> <given-names>GH</given-names></name></person-group>. <article-title>Combining DRSA decision-rules with FCA-based DANP evaluation for financial performance improvements</article-title>. <source>Technol Econ Dev Econ</source>. (<year>2016</year>) <volume>22</volume>:<fpage>685</fpage>&#x02013;<lpage>714</lpage>. <pub-id pub-id-type="doi">10.3846/20294913.2015.1071295</pub-id></citation>
</ref>
<ref id="B96">
<label>96.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chuang</surname> <given-names>HM</given-names></name> <name><surname>Chen</surname> <given-names>YS</given-names></name></person-group>. <article-title>Identifying the value co-creation behavior of virtual customer environments using a hybrid expert-based DANP model in the bicycle industry</article-title>. <source>Human Centric Comput Inform Sci.</source> (<year>2015</year>) <volume>5</volume>:<fpage>11</fpage>. <pub-id pub-id-type="doi">10.1186/s13673-015-0028-z</pub-id></citation>
</ref>
<ref id="B97">
<label>97.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>JL</given-names></name> <name><surname>Tzeng</surname> <given-names>GH</given-names></name></person-group>. <article-title>An integrated MCDM technique combined with DEMATEL for a novel cluster-weighted with ANP method</article-title>. <source>Expert Syst Appl.</source> (<year>2011</year>) <volume>38</volume>:<fpage>1417</fpage>&#x02013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2010.07.048</pub-id></citation>
</ref>
<ref id="B98">
<label>98.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Burkhardt</surname> <given-names>J</given-names></name></person-group>. <article-title>Agribusiness ethics: specifying the terms of the contract</article-title>. <source>J Bus Ethics.</source> (<year>1986</year>) <volume>54</volume>:<fpage>333</fpage>&#x02013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.1007/BF00383101</pub-id></citation>
</ref>
<ref id="B99">
<label>99.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kim</surname> <given-names>Y</given-names></name></person-group>. <article-title>Consumer responses to the food industry&#x00027;s proactive and passive environmental CSR, factoring in price as CSR tradeoff</article-title>. <source>J Bus Ethics.</source> (<year>2017</year>) <volume>140</volume>:<fpage>307</fpage>&#x02013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-015-2671-8</pub-id></citation>
</ref>
<ref id="B100">
<label>100.</label>
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Soon</surname> <given-names>JM</given-names></name> <name><surname>Krzyzaniak</surname> <given-names>SC</given-names></name> <name><surname>Shuttlewood</surname> <given-names>Z</given-names></name> <name><surname>Smith</surname> <given-names>M</given-names></name> <name><surname>Jack</surname> <given-names>L</given-names></name></person-group>. <article-title>Food fraud vulnerability assessment tools used in food industry-ScienceDirect</article-title>. <source>Food Control.</source> (<year>2019</year>) <volume>101</volume>:<fpage>225</fpage>&#x02013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1016/j.foodcont.2019.03.002</pub-id></citation>
</ref>
</ref-list>
</back>
</article>