<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0186-1042</journal-id>
<journal-title><![CDATA[Contaduría y administración]]></journal-title>
<abbrev-journal-title><![CDATA[Contad. Adm]]></abbrev-journal-title>
<issn>0186-1042</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Facultad de Contaduría y Administración]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0186-10422018000100006</article-id>
<article-id pub-id-type="doi">10.22201/fca.24488410e.2018.960</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Food defense KPI in the business processes of the food supply chain]]></article-title>
<article-title xml:lang="es"><![CDATA[KPI de defensa alimentaria en procesos de negocio de la cadena de suministros alimenticia]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Navarrete Reynoso]]></surname>
<given-names><![CDATA[Ramón]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Guanajuato  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2018</year>
</pub-date>
<volume>63</volume>
<numero>1</numero>
<fpage>0</fpage>
<lpage>0</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0186-10422018000100006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0186-10422018000100006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0186-10422018000100006&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Given that globalization is constantly spreading, supply chains are becoming more complex and vulnerable. Managing the security of supply chains is becoming a regular part of business management practices. Threats to supply chains include theft, terrorism, and patent violations. Food and water supply sources are an attractive target for terrorist attacks, which makes Food Defense for the protection of food supply chains a huge priority. Although a business process approach is widely adopted in the Food Supply Chain (FSC) context it is not very well developed in the literature about Food Defense. The development of alternatives to build a Key Performance Indicator (KPI) to measure Food Defense in business processes has not been part of the studies that follow this approach. This article proposes a procedure to build a Food Defense KPI to establish how efficient business processes are in preventing food terrorism. The practical validation of the proposed procedure was done in a food company in El Bajío, Mexico. The results support the possibility of the successful application of the Food Defense KPI.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Dado que la globalización está en constante aumento, las cadenas de suministro cada vez son más complejas y vulnerables, y gestionar su seguridad se está convirtiendo en una parte natural de la gestión empresarial. Las amenazas, incluyen aspectos como el robo, el terrorismo y la piratería. Las fuentes de agua y alimentos son un blanco atractivo para ataques terroristas, por lo que la Defensa Alimentaria para la protección de la cadena de suministro alimenticia es algo primordial. Sin embargo, la literatura acerca de este tema, bajo una visión de procesos de negocio ha sido poco desarrollada, pese a la enorme importancia actual de esta orientación en el contexto de la Cadena de Suministro Alimenticia (CSA). Uno de los aspectos no considerados se encuentra en el desarrollo de alternativas para la elaboración de un indicador de desempeño clave (Key Performance Indicator: KPI) para medir la mejora de la Defensa Alimentaria en los procesos de negocio. Este artículo propone un procedimiento para elaborar dicho KPI para conocer qué tan buenos son los procesos de negocio para prevenir el terrorismo alimentario. En virtud del desarrollo de este procedimiento propuesto, su validación práctica necesaria se realizó en una empresa alimenticia de la zona del Bajío en México. Los resultados avalan la posibilidad de aplicación del KPI de Defensa Alimentaria en forma exitosa.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Food Defense]]></kwd>
<kwd lng="en"><![CDATA[Supply Chain Security]]></kwd>
<kwd lng="en"><![CDATA[Risk Analysis]]></kwd>
<kwd lng="en"><![CDATA[Key Performance Indicator]]></kwd>
<kwd lng="es"><![CDATA[Defensa Alimentaria]]></kwd>
<kwd lng="es"><![CDATA[Seguridad de la Cadena de Suministros]]></kwd>
<kwd lng="es"><![CDATA[Análisis de Riesgo]]></kwd>
<kwd lng="es"><![CDATA[Indicador de Desempeño Clave]]></kwd>
<kwd lng="en"><![CDATA[L23]]></kwd>
<kwd lng="en"><![CDATA[L66]]></kwd>
<kwd lng="en"><![CDATA[M11]]></kwd>
<kwd lng="es"><![CDATA[L23]]></kwd>
<kwd lng="es"><![CDATA[L66]]></kwd>
<kwd lng="es"><![CDATA[M11]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar-Savén]]></surname>
<given-names><![CDATA[R.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Business process modeling: review and framework]]></article-title>
<source><![CDATA[International Journal of Production Economics]]></source>
<year>2004</year>
<volume>90</volume>
<page-range>129-49</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alpas]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Cirakoglu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[food chain security]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Dordrecht, The Netherlands ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alvarez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[de Maggio]]></surname>
<given-names><![CDATA[M.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Oses]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Trombetta]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Setola]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Protecting the Food Supply Chain from Terrorist Attack., in Critical Infrastructure Protection IV]]></article-title>
<source><![CDATA[IFIP Advances in Information and Communication Technology]]></source>
<year>2010</year>
<volume>342</volume>
<page-range>157-67</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arvanitoyannis]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Varzakas]]></surname>
<given-names><![CDATA[T.H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Application of ISO 22000 and comparison with HACCP on industrial processing of common octopus]]></article-title>
<source><![CDATA[International Journal of Food Science and Technology]]></source>
<year>2009</year>
<volume>44</volume>
<page-range>58-78</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barras]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Greub]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[History of biological warfare and bioterrorism]]></article-title>
<source><![CDATA[Clinical Microbiology and Infection]]></source>
<year>2014</year>
<volume>20</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>497-502</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Belland]]></surname>
<given-names><![CDATA[K.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Olsen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lawry]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Carrier air wing reduction using a human factors classification system and risk management]]></article-title>
<source><![CDATA[Aviation Space and Environmental Medicine]]></source>
<year>2010</year>
<volume>81</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1028-32</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bowersox]]></surname>
<given-names><![CDATA[D.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Closs]]></surname>
<given-names><![CDATA[D.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cooper]]></surname>
<given-names><![CDATA[M.B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Supply Chain Logistics Management]]></source>
<year>2007</year>
<edition>2</edition>
<publisher-name><![CDATA[McGraw-Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brummer]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Food Biosecurity]]></article-title>
<source><![CDATA[Journal of the American Dietetic Association]]></source>
<year>2003</year>
<volume>103</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>697-1</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>British Standards Institution</collab>
<source><![CDATA[PAS 96:2014. Guide to protecting and defending food and drink from deliberate attack]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cagno]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Caron]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Mancini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk Analysis in plant commissioning: the multilevel HAZOP]]></article-title>
<source><![CDATA[Reliability Engineering &amp; System Safety]]></source>
<year>2002</year>
<volume>77</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>309-23</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Closs]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mcgarrell]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Enhancing Security Throughout the Supply Chain]]></source>
<year>2004</year>
<publisher-name><![CDATA[IBM Center for The Business of Government]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<collab>Customs-Trade Partnership Against Terrorism</collab>
<source><![CDATA[C-TPAT program benefits. Reference guide]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crutchley]]></surname>
<given-names><![CDATA[T.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodgers]]></surname>
<given-names><![CDATA[J.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Whiteside]]></surname>
<given-names><![CDATA[H.P.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vanier]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Terndrup]]></surname>
<given-names><![CDATA[T.E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Agroterrorism: Where Are We in the Ongoing War on Terrorism]]></article-title>
<source><![CDATA[Journal of food protection]]></source>
<year>2007</year>
<volume>70</volume>
<page-range>791-804</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dalziel]]></surname>
<given-names><![CDATA[G.R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Food Defense Incidents 1950-2008: a Chronology and analysis of Incidents involving the malicious Contamination of the Food Supply Chain. Centre of Excellence for National Security (CENS) of the S]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Singapore ]]></publisher-loc>
<publisher-name><![CDATA[Rajaratnam School of International Studies (RSIS) at Nanyang technological University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Damij]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Damij]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Grand]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jelenc]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Methodology for Business Process Improvement and IS Development]]></article-title>
<source><![CDATA[Information and Software Technology]]></source>
<year>2008</year>
<volume>50</volume>
<page-range>1127-41</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Degeneffe]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kinsey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Stinson]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghosh]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Segmenting consumers for food defense communication strategies]]></article-title>
<source><![CDATA[International Journal of Physical Distribution &amp; Logistics Management]]></source>
<year>2009</year>
<volume>39</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>365-403</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<collab>Department of Defense</collab>
<source><![CDATA[Standard Practice for System Safety, United Estates of America Department of Defense (MIL-STD-882D)]]></source>
<year>2000</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>Department of Health and Human Services</collab>
<source><![CDATA[Food safety and security: operational risk management approach, US Food and Drug Administration, Center for Food Safety and Applied Nutrition, United States]]></source>
<year>2001</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>Department of Health and Human Services</collab>
<source><![CDATA[Terrorism and Food Supply. Terrorism and other Public Health Emergencies: a reference guide, US Food and Drug Administration, Center for Food Safety and Applied Nutrition, United States]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eggers]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Verrill]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Bryant]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Developing consumer-focused risk communication strategies related to food terrorism]]></article-title>
<source><![CDATA[International Journal Food Safety, Nutrition and Public Health]]></source>
<year>2011</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>45-62</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>Federal Aviation Administration</collab>
<source><![CDATA[Operational Risk Management (ORM), in System Safety Handbook: Practices and Guidelines for Conducting System Safety Engineering and Management]]></source>
<year>2000</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>Food and Drug Administration</collab>
<source><![CDATA[Vulnerability Assessments of Food Systems. Final Summary Report. United States]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<collab>Food and Drug Administration</collab>
<source><![CDATA[Full Text of the Food Safety Modernization Act (FSMA)]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gaitanides]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Prozessorganisation-Entwicklung, Ansätze und Programme des Managements von Geschäftsprozessen]]></source>
<year></year>
<edition>2</edition>
<publisher-loc><![CDATA[Munich ]]></publisher-loc>
<publisher-name><![CDATA[Vahlen]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hartnett]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Paoli]]></surname>
<given-names><![CDATA[G.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Schaffner]]></surname>
<given-names><![CDATA[D. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling the public health system response to a terrorist event in the food supply]]></article-title>
<source><![CDATA[Journal of risk Analysis]]></source>
<year>2009</year>
<volume>29</volume>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hintsa]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gutiérrez]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Hameri]]></surname>
<given-names><![CDATA[A.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wieser]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Supply Chain Security Management: an overview]]></article-title>
<source><![CDATA[International Journal of Logistics Systems and Management]]></source>
<year>2009</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<collab>International Organization for Standardization</collab>
<source><![CDATA[ISO/TS 22002-1:2009]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kettinger]]></surname>
<given-names><![CDATA[W.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Teng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Guha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Business process change: a study of methodologies, techniques and tools]]></article-title>
<source><![CDATA[Journal of Management Information Systems]]></source>
<year>1997</year>
<volume>14</volume>
<page-range>119-54</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kleindorfer]]></surname>
<given-names><![CDATA[P.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Saad]]></surname>
<given-names><![CDATA[G.H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Managing disruption risks in supply chains]]></article-title>
<source><![CDATA[Production and Operations Management]]></source>
<year>2005</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>53-68</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kleindorfer]]></surname>
<given-names><![CDATA[P.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Van Wassenhove]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk management in global supply chains]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gatignon]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kimberly]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Alliance on Globalization]]></source>
<year>2004</year>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kleter]]></surname>
<given-names><![CDATA[G.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Marvin]]></surname>
<given-names><![CDATA[H.J.P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Indicators of emerging hazards and risk to food safety]]></article-title>
<source><![CDATA[Food and Chemical Toxicology]]></source>
<year>2009</year>
<numero>47</numero>
<issue>47</issue>
<page-range>1022-39</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McEntire]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Boateng]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Industry challenge to best practice risk communication]]></article-title>
<source><![CDATA[Journal of Food Science]]></source>
<year>2012</year>
<volume>77</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>111-7</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mitenius]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Kennedy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Busta]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Food Defense]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Motarjemi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lelieveld]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Food safety Management. A practical guide for the food industry]]></source>
<year>2014</year>
<page-range>937-58</page-range><publisher-name><![CDATA[Academic Press Inc.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monke]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Agroterrorism: Threats and Preparedness. Congressional Research Service, CRS Report for Congress]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarrete]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lario]]></surname>
<given-names><![CDATA[F.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Propuesta de una Metodología para el Modelado AS IS y TO BE de Procesos de Negocio de Bioseguridad (Terrorismo Alimentario), dentro del Contexto de la Cadena de Suministro. Aplicación en la Industria Mexicana Alimentaria]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Donostia-San Sebastian, España ]]></publisher-loc>
<publisher-name><![CDATA[XIV Congreso de Ingeniería de Organización]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neiger]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Churilov]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[A notion of a useful process model revisited: a process design perspective, International Conference on Business Process Management]]></source>
<year>2005</year>
<edition>III</edition>
<publisher-loc><![CDATA[Nancy ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Onyango]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Turvey]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Hallman]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Public Attitudes and Perceptions of the Vulnerability of the U.S. Food Chain to Agroterrorism]]></source>
<year>2005</year>
<page-range>24-7</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parker]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[U.S. food defense since 9/11: Public sector initiatives and programs]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Burnette]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Biosecurity: Understanding, assessing and preventing the threat]]></source>
<year>2013</year>
<publisher-name><![CDATA[John Wiley &amp; Sons, Inc.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rasco]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Bledsoe]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Short summary on Food Defense]]></article-title>
<source><![CDATA[International Union of Food Science &amp; Technology, Canada]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rasco]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Bledsoe]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Food Defense in an Aquaculture Setting]]></article-title>
<source><![CDATA[Journal of the World Aquaculture Society]]></source>
<year>2010</year>
<volume>41</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldsby]]></surname>
<given-names><![CDATA[T.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Supply Chain Risks: a Review and Typology]]></article-title>
<source><![CDATA[International Journal of Logistics Management]]></source>
<year>2009</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>97-123</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rogge-Solti]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Weske]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prediction of business process durations using non-Markovian stochastic Petri nets]]></article-title>
<source><![CDATA[Information Systems]]></source>
<year>2015</year>
<volume>54</volume>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ruiz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Costal]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[España]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Franch]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pastor]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[GoBIS: An integrated framework to analyse the goal and business process perspectives in information systems]]></article-title>
<source><![CDATA[Information Systems]]></source>
<year>2015</year>
<volume>53</volume>
<page-range>330-45</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sanchis]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Poler]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortiz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Técnicas para el modelado de procesos de negocio en cadenas de suministro]]></article-title>
<source><![CDATA[Información. Tecnológica]]></source>
<year>2009</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Setola]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[de Maggio]]></surname>
<given-names><![CDATA[M.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Security of the Food Supply Chain]]></source>
<year>2009</year>
<publisher-loc><![CDATA[United States ]]></publisher-loc>
<publisher-name><![CDATA[IEEE EMBS]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="">
<collab>Safe Quality Food Institute</collab>
<source><![CDATA[SQF Code. Edition 7.2. A HACCP-Based Supplier Assurance Code for the Food Industry]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Skrinjar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Trkman]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Increasing process orientation with business process management: Critical practices]]></article-title>
<source><![CDATA[International Journal of Information Management]]></source>
<year>2013</year>
<volume>33</volume>
<page-range>48-60</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stinson]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghosh]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kinsey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Degeneffe]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Do household attitudes about food defense and food safety change following highly visible national food recalls?]]></article-title>
<source><![CDATA[American Journal of Agricultural Economics]]></source>
<year>2008</year>
<volume>90</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1272-8</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Swanson]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An information-processing model of maintenance management]]></article-title>
<source><![CDATA[International Journal of Production Economics]]></source>
<year>2003</year>
<volume>83</volume>
<page-range>45-64</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vanderhaeghen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Fettke]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Loos]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Organizational and Technological Options for Business Process Management from the Perspective of Web 2.0]]></article-title>
<source><![CDATA[Business &amp; Information Systems Engineering]]></source>
<year>2010</year>
<numero>1</numero>
<issue>1</issue>
<page-range>15-28</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Veiga]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Food defence and security: A new reality]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Alpas]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Berkowicz]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ermakova]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Environmental Security and Ecoterrorism]]></source>
<year>2011</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wein]]></surname>
<given-names><![CDATA[L.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analyzing a Bioterrorism Attack on the Food Supply: The Case of Botulinum Toxin in Milk]]></article-title>
<source><![CDATA[Proceedings of the National Academy of Sciences]]></source>
<year>2005</year>
<volume>102</volume>
<numero>99</numero>
<issue>99</issue>
<page-range>84-9</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="">
<collab>World Health Organization</collab>
<source><![CDATA[Terrorist Threats to Food: Guidance for Establishing and Strengthening Prevention and Response Systems, Department of Food Safety, Zoonoses and Foodborne]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Leveraging e-business process for business value: A layered structure perspective]]></article-title>
<source><![CDATA[Information &amp; Management]]></source>
<year>2015</year>
<volume>52</volume>
<page-range>679-91</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
