Global RFID pp 135-158 | Cite as

Retailing: Theft Prevention

Keywords

Supply Chain Enterprise Resource Planning System Electronic Product Code Entire Supply Chain Deterrence Measure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Chapter 11 — Retailing: Theft Prevention

  1. 1.
    Earle, Julie (2002), “Inside Track: Retailers turn on the enemy within: Theft,” The Financial Times, April 3.Google Scholar
  2. 3.
    Dow Jones Newswires (2003), “Wal-Mart Pressures Web Site With Bargain Bar Codes,” Dow Jones & Company, April 18.Google Scholar
  3. 4.
    Ibid, ref. 3.Google Scholar
  4. 5.
    Ibid, ref. 3.Google Scholar
  5. 6.
    Ibid, ref. 2.Google Scholar
  6. 7.
    Albrecht, W. Steve and David I. Searcy (2001),”Top 10 Reasons why Fraud is Increasing in the U.S.,” Strategic Finance 82:11, p. 58.Google Scholar
  7. 8.
    Alexander, Keith, Tig Gilliam, Kathy Gramling, Chris Grubelic, Herb Kleinberger, Stephen Leng, Dhaval Moogimane, Chris Sheedy (2002), “Applying RFID to Reduce Losses Associated with Shrink,” Cambridge, MA: MIT Auto-ID Center, p. 13.Google Scholar
  8. 9.
    Ibid, ref. 2.Google Scholar
  9. 10.
    Levin, Amanda (2000), “How RMs Can Curb Cargo Crime,” National Underwriter (Property & Casualty Risk & Benefits Management Edition) 104:32, p. 3.Google Scholar
  10. 11.
    Wright, Christopher M. (2004), “Somebody Call Security,” APICS — The Performance Advantage, June.Google Scholar
  11. 12.
    Raman, Ananth, Nicole DeHoratius, and Zeynep Ton (2001), “The Achilles Heel of Supply Chain Management,” Harvard Business Review 79:5, p. 25.Google Scholar
  12. 13.
    Zinn, Walter and Peter C. Liu (2001), “Consumer Response to Retail Stockouts,” Journal of Business Logistics 22:1, p. 59.ADSGoogle Scholar
  13. 14.
    Lam, Nhat-So (2002), “A Study of the Impact of RFID on Shrinkage Within the Fast Moving Consumer Goods Supply Chain,” Unpublished Thesis (Master of Engineering), Cambridge, MA: Massachusetts Institute of Technology.Google Scholar
  14. 15.
    Cameron, Mary O. (1964), The Booster and the Snitch: Department Store Shoplifting, London: The Free Press of Glencoe, p. 40.Google Scholar
  15. 16.
    Moore, Richard H. (1984), “Shoplifting in Middle America: Patterns and Motivational Correlates,” International Journal of Offenders Therapy and Comparative Criminology 28:1, pp. 53–64.CrossRefGoogle Scholar
  16. 17.
    Post, Richard, ed. (1972), Combating Crime Against Small Business, Springfield, Illinois: Charles C. Thomas Publishing, pp. 56–57.Google Scholar
  17. 18.
    Ibid, p. 119.Google Scholar
  18. 19.
    Hayes, Read (1999), “Tailoring Security to Fit the Criminal,” Security Management, 43:7, pp. 110–116.Google Scholar
  19. 20.
    Sutherland, Edwin Hardin (1937), The ‘Professional’ Thief — By a Professional Thief. Chicago, IL: The University of Chicago Press, pp. 3–40.Google Scholar
  20. 21.
    Meier, Robert F., ed. (1985), Theoretical Methods in Criminology, Beverly Hills: Sage Publishing, pp. 151–76.Google Scholar
  21. 22.
    Peacock, Colin, personal correspondence from April 1, 2003.Google Scholar
  22. 23.
    Cox, Anthony D., Dena Cox, Ronald D. Anderson, George P. Moschis (1993), “Social Influences on Adolescent Shoplifting — Theory, Evidence, and Implications for the Retail Industry,” Journal of Retailing 69:2, pp. 234–246.CrossRefGoogle Scholar
  23. 24.
    Dawson, Scott (1993), “Consumer Response to Electronic Article Surveillance Alarms,” Journal of Retailing 69:3, pp. 353–363.CrossRefGoogle Scholar
  24. 24.
  25. 25.
    Koh, Robin, Edmund W. Schuster, Nhat-So Lam, and Mark Dinning (2003), “Prediction, Detection and Proof: An Integrated Auto-ID Solution to Retail Theft,” Cambridge, MA: The MIT Auto-ID Center.Google Scholar
  26. 26.
  27. 27.
    Baumer, Terry L., and Dennis P. Rosenbaum (1984), Combating Retail Theft: Programs and Strategies, Stoneham, Massachusetts: Butterworth Publishers, p. 22.Google Scholar
  28. 28.
    French, Jay T. (1979), Apprehending and Prosecuting Shoplifters and Dishonest Employees, New York, NY: National Retail Merchants Association.Google Scholar
  29. 29.
    Beck, A., C. Bilby, P. Chapman, and A. Harrison (2001), Shrinkage: Introducing a Collaborative Approach to Reducing Stock Loss in the Supply Chain, Brussels: ECR Europe.Google Scholar
  30. 30.
    Caime, Gabreil and Gabriel Ghone (1996), S(h)elf Help Guide, Toronto, Ontario: Trix Publishing.Google Scholar
  31. 31.
    Ibid, ref. 28.Google Scholar
  32. 32.
    Klein, Gerald (1991), “The Hidden Benefits of EAS,” Security Management 35:6, p. 56.Google Scholar
  33. 33.
    Ibid, ref. 27.Google Scholar
  34. 34.
    Mullen, Fred (1999), “Six Steps to Stopping Internal Theft,” Discount Store News 38:2, p. 12.Google Scholar
  35. 35.
    Ibid, ref. 19.Google Scholar
  36. 36.
    Hollinger, R., and R. Hayes (2001), “National Retail Security Survey,” Gainesville, FL: University of Florida.Google Scholar
  37. 37.
    Ibid, ref. 8.Google Scholar
  38. 38.
    Guffey Jr., Hugh J., James R. Harris and J. Ford Laumer Jr. (1979), “Shopper Attitudes Toward Shoplifting and Shoplifting Prevention Devices,” Journal of Retailing 55:3, p. 75.Google Scholar
  39. 39.
    Ibid, ref. 24.Google Scholar
  40. 40.
    Ibid, ref. 38.Google Scholar
  41. 41.
  42. 42.
  43. 43.
    Roberti, Mark (2005), “Retailers Say RFID Will Take Time,” RFID Journal, January 17.Google Scholar
  44. 44.
    Ibid, ref. 43.Google Scholar
  45. 45.
    Ibid, ref. 43.Google Scholar
  46. 46.
  47. 47.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Personalised recommendations