scholarly journals Country-of-Origin Labelling, Food Traceability Drivers and Food Fraud: Lessons from Consumers’ Preferences and Perceptions

2017 ◽  
Vol 8 (3) ◽  
pp. 541-558 ◽  
Author(s):  
Michail BITZIOS ◽  
Lisa JACK ◽  
Sally-Ann KRZYZANIAK ◽  
Mark XU

AbstractMany factors influence consumers’ perceptions and purchasing decisions, with product labelling forming the primary means of communication. The extent to which labels should contain information about traceability is debated. Whilst traceability is an important tool used by food business organisations and regulators in assuring food safety, other drivers for information about traceability are less well understood. This paper reviews the issues related to drivers for traceability from a consumer perspective, and evaluates country-of-origin labelling (COOL), enabling technologies and food fraud as potentially significant drivers in consumer requirements for information. The implications for risk assessment, systems implementation and communications about traceability are also considered.

2019 ◽  
pp. 351-372
Author(s):  
Shangzhu Jin ◽  
Jike Ge ◽  
Jun Peng

Terrorist attacks launched by extremist groups or individuals have caused catastrophic consequences worldwide. Terrorism risk assessment therefore plays a crucial role in national and international security. Fuzzy reasoning based terrorism risk assessment systems offer a significant potential of providing decision support in combating terrorism, where highly complex situations may be involved. Nevertheless, little has been done in developing and applying an integrated hierarchical bidirectional (forward/backward) fuzzy rule interpolation mechanism that is tailored to suit decision support for terrorism risk assessment. This paper presents such an integrated approach that is capable of dealing with dynamic and insufficient information in the risk assessing process. In particular, the hierarchical system implementing the proposed techniques can predict the likelihood of terrorism attacks on different segments of focused attention. The results of an experimental investigation of this implemented system are represented, demonstrating the potential and efficacy of the proposed approach.


2015 ◽  
Vol 54 (3) ◽  
pp. 624-642 ◽  
Author(s):  
T. Loridan ◽  
S. Khare ◽  
E. Scherer ◽  
M. Dixon ◽  
E. Bellone

AbstractProbabilistic risk assessment systems for tropical cyclone hazards rely on large ensembles of model simulations to characterize cyclones tracks, intensities, and the extent of the associated damaging winds. Given the computational costs, the wind field is often modeled using parametric formulations that make assumptions that are based on observations of tropical systems (e.g., satellite, or aircraft reconnaissance). In particular, for the Northern Hemisphere, most of the damaging contribution is assumed to be from the right of the moving cyclone, with the left-hand-side winds being much weaker because of the direction of storm motion. Recent studies have highlighted that this asymmetry assumption does not hold for cyclones undergoing extratropical transitions around Japan. Transitioning systems can exhibit damaging winds on both sides of the moving cyclone, with wind fields often characterized as resembling a horseshoe. This study develops a new parametric formulation of the extratropical transition phase for application in risk assessment systems. A compromise is sought between the need to characterize the horseshoe shape while keeping the formulation simple to allow for implementation within a risk assessment framework. For that purpose the tropical wind model developed by Willoughby et al. is selected as a starting point and parametric bias correction fields are applied to build the target shape. Model calibration is performed against a set of 37 extratropical transition cases simulated using the Weather Research and Forecasting Model. This newly developed parametric model of the extratropical transition phase shows an ability to reproduce wind field features observed in the western North Pacific Ocean while using only a restricted number of input parameters.


2020 ◽  
Vol Publish Ahead of Print ◽  
Author(s):  
Yinji Jin ◽  
Heejeong Kim ◽  
Taixian Jin ◽  
Sun-Mi Lee

2014 ◽  
Vol 53 (2) ◽  
pp. 421-428 ◽  
Author(s):  
T. Loridan ◽  
E. Scherer ◽  
M. Dixon ◽  
E. Bellone ◽  
S. Khare

AbstractRisk-assessment systems for wind hazards (e.g., hurricanes or typhoons) often rely on simple parametric wind field formulations. They are built using extensive observations of tropical cyclones and make assumptions about wind field asymmetry. In this framework, maximum winds are always simulated to the right of the cyclone, but analysis of the Climate Forecast System Reanalysis database for the western North Pacific Ocean suggests that wind fields from cyclones undergoing extratropical transition around Japan often present features that cannot be adequately simulated under these assumptions. These “left-hand-side contribution” (LHSC) wind fields exhibit strong winds on both sides of the moving cyclone with the maximum magnitude often located to the left. Classification of cyclones in terms of their most frequent patterns reveals that 67% of cases that make a transition around Japan are dominantly LHSC. They are more likely in autumn and have more intense maximum winds. The results from this study show the need for a new approach to the modeling of transitioning wind fields in the context of risk-assessment systems.


2010 ◽  
Vol 108-111 ◽  
pp. 948-953 ◽  
Author(s):  
Hao Yuan

Based on the research of domestic and foreign vulnerability assessment systems, in this paper, we propose an improved network security assessment method based on Immunity algorithm. It integrates the advantages of both host based and network based scan system. Our goal is to explore the known security vulnerabilities, and to check hosts’ security effectively as well. It has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.


Sign in / Sign up

Export Citation Format

Share Document