• No results found

VU Research Portal

N/A
N/A
Protected

Academic year: 2021

Share "VU Research Portal"

Copied!
7
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

VU Research Portal

Finding food fraud

Gussow, K.E.

2020

document version

Publisher's PDF, also known as Version of record

Link to publication in VU Research Portal

citation for published version (APA)

Gussow, K. E. (2020). Finding food fraud: Explaining the detection of food fraud in the Netherlands.

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain

• You may freely distribute the URL identifying the publication in the public portal ? Take down policy

If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

E-mail address:

vuresearchportal.ub@vu.nl

(2)

Contents

List of tables

_________________________________________

X

_______________________________________

XII

Summary

__________________________________________

XIII

1 Introduction

_______________________________________

2

____________________3 ___________________________________________________8 1.3 Research method_____________________________________________________9 1.4 Relevance ___________________________________________________________11 ________________________________________13

2 The detection of food fraud by enforcement agencies

_______

16

________________________________________16 2.2 Corporate crime and corporate violence ____________________________18

__________________________________________________________21 2.4 Detection of corporate crime _______________________________________28

_________________________31

________________________________36

__________________________________40

__49

3 Setting the scene: detecting corporate crime in the Netherlands

54

_54 3.2 Police powers and the Special Investigation Services Act ___________60

______________67

_75

4 Research method

__________________________________

78

4.1 Basic research design choices _______________________________________78 4.2 Case selection criteria _______________________________________________80 4.3 The development of the data collection plan _______________________87

_______________________________________________89

(3)

5 The nature of food fraud

____________________________

98

______________________________98 ______________________________101 ____113 _______________________________118 ______________________________124 _________________________________132 _____________________________137

6 The detection process and detection methods

_____________

144

_____________________144 ____________________________________152 __________________154 _______168 _________169 _174 __________186 _____188

7 The agency ability to detect

__________________________

194

________________________________194 7.2 Patterns in relation to the crime ___________________________________199

__________________________________204

______________________________________208

____________214

________________________216

8 The agency willingness to detect

_______________________

220

____________________________________________________________220 8.2 _221 __________________________________________227 ____________________________________________230 __________________________________________246 _______253

9 Integrated analysis: pathways to detection

_______________

258

___________________258

_________________________________264

______________________________________________267

_________________________________________________________269

10 The detection of food fraud

__________________________

274

______________________________________274

(4)

11 Discussion

_______________________________________

288

___________________________________288 ____________________293 ____________________________________________301 ______________________________________303 ___________________________________306 11.6 Practical implications and recommendations ______________________309

References

_________________________________________

316

(5)

List of tables

Table 1

27

Table 2

58

Table 3

85

Table 4

90

Table 5

92

Table 6

100

Table 7

102

Table 8

104

Table 9

105

Table 10

120

Table 11

121

Table 12

126

Table 13

130

Table 14

133

Table 15

134

Table 16

135

Table 17

135

Table 18

140

Table 19

Five categories of detection methods, three actors 149

Table 20

151

Table 21

152

Table 22

153

Table 23

155

Table 24

157

Table 25

157

Table 26

158

Table 27

168

Table 28

169

Table 29

170

Table 30

171

Table 31

175

Table 32

176

Table 33

179

Table 34

182

Table 35

189

Table 36

195

Table 37

197

Table 38

200

Table 39

201 X Lists X

(6)

Table 40

202

Table 41

202

Table 42

203

Table 43

205

Table 44

207

Table 45

209

Table 46

211

Table 47

230

Table 48

231

Table 49

241

Table 50

247

Table 51

248

Table 52

259

Table 53

262

Table 54

264

Table 55

266

Table 56

266

Table 57

268

Table 58

281

Table A1

Respondent characteristics of “detection interviews” 334

Table B1

336

Table F1

342

Table G1

346

Table H1

348

Table I1

349

Table J1

351

Table J2

352 XI Lists XI

(7)

Figure 1

51

Figure 2

65

Figure 3

99

Figure 4

111

Figure 5

117

Figure 6

136

Figure 7

145

Figure 8

Spread of ignorance phase 147

Figure 9

147

Figure 10

Spread of evidence phase 148

Figure 11

177

Figure 12

199

Figure 13

229

Figure 14

253

Figure G1

345 XII Lists XII

Referenties

GERELATEERDE DOCUMENTEN

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of