Hello guest
Your basket is empty
We provide two pathways to the content. Thematic (chapters that address certain themes, e.g. cultivation, regardless of crop or animal type) and Product (chapters that relate to a specific type of crop or animal). Choose the most applicable route to find the right collection for you. 
 
Can’t find what you are looking for? Contact us and let us help you build a custom-made collection. 
You are in: All categories > A-Z Chapters > K
Use the Contact form to discuss the best purchasing method for you... Start building your collection today!

Key challenges and developments in non-targeted methods or systems to identify food adulteration

Code: 9781801463430
Sara Erasmus and Saskia van Ruth, Wageningen University & Research, The Netherlands

Chapter synopsis: Food fraud is an ongoing global challenge that is amplified by the complexity of supply chain networks and fraudsters becoming more innovative in the way they commit fraud. There is a great need for rapid analytical tools that offer broad product screening. Non-targeted methods provide an approach by which a food matrix can be analysed and screened for adulterations. While various developments exist for rapid non-targeted approaches, there are still multiple challenges to overcome. More work is required to validate, harmonise and standardise non-targeted methods and the associated data interpretations. Promising advances include novel technological developments with devices becoming smaller and portable with increased sensitivity. It is undoubtedly that fingerprinting approaches generate huge datasets that need to be stored and utilised as effectively as possible; creating new opportunities for Big data analysis and the Internet of Things – both addressing the need to convert data into insights to act upon.

DOI: 10.19103/AS.2021.0097.19
£25.00
Table of contents 1 Introduction 2 Terminology for non-targeted food authentication 3 Developments in non-targeted methods to identify unknown adulterations 4 Challenges in non-targeted methods to identify unknown adulterants 5 How the key challenges are being addressed 6 Future trends for non-targeted methods 7 Where to look for further information 8 References

Also in K

Our site uses cookies. For more information, see our cookie policy. Accept cookies and close
Reject cookies Manage settings