Keywords
Supply Chain Enterprise Resource Planning System Electronic Product Code Entire Supply Chain Deterrence Measure
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
Chapter 11 — Retailing: Theft Prevention
- 1.Earle, Julie (2002), “Inside Track: Retailers turn on the enemy within: Theft,” The Financial Times, April 3.Google Scholar
- 3.Dow Jones Newswires (2003), “Wal-Mart Pressures Web Site With Bargain Bar Codes,” Dow Jones & Company, April 18.Google Scholar
- 4.Ibid, ref. 3.Google Scholar
- 5.Ibid, ref. 3.Google Scholar
- 6.Ibid, ref. 2.Google Scholar
- 7.Albrecht, W. Steve and David I. Searcy (2001),”Top 10 Reasons why Fraud is Increasing in the U.S.,” Strategic Finance 82:11, p. 58.Google Scholar
- 8.Alexander, Keith, Tig Gilliam, Kathy Gramling, Chris Grubelic, Herb Kleinberger, Stephen Leng, Dhaval Moogimane, Chris Sheedy (2002), “Applying RFID to Reduce Losses Associated with Shrink,” Cambridge, MA: MIT Auto-ID Center, p. 13.Google Scholar
- 9.Ibid, ref. 2.Google Scholar
- 10.Levin, Amanda (2000), “How RMs Can Curb Cargo Crime,” National Underwriter (Property & Casualty Risk & Benefits Management Edition) 104:32, p. 3.Google Scholar
- 11.Wright, Christopher M. (2004), “Somebody Call Security,” APICS — The Performance Advantage, June.Google Scholar
- 12.Raman, Ananth, Nicole DeHoratius, and Zeynep Ton (2001), “The Achilles Heel of Supply Chain Management,” Harvard Business Review 79:5, p. 25.Google Scholar
- 13.Zinn, Walter and Peter C. Liu (2001), “Consumer Response to Retail Stockouts,” Journal of Business Logistics 22:1, p. 59.ADSGoogle Scholar
- 14.Lam, Nhat-So (2002), “A Study of the Impact of RFID on Shrinkage Within the Fast Moving Consumer Goods Supply Chain,” Unpublished Thesis (Master of Engineering), Cambridge, MA: Massachusetts Institute of Technology.Google Scholar
- 15.Cameron, Mary O. (1964), The Booster and the Snitch: Department Store Shoplifting, London: The Free Press of Glencoe, p. 40.Google Scholar
- 16.Moore, Richard H. (1984), “Shoplifting in Middle America: Patterns and Motivational Correlates,” International Journal of Offenders Therapy and Comparative Criminology 28:1, pp. 53–64.CrossRefGoogle Scholar
- 17.Post, Richard, ed. (1972), Combating Crime Against Small Business, Springfield, Illinois: Charles C. Thomas Publishing, pp. 56–57.Google Scholar
- 18.Ibid, p. 119.Google Scholar
- 19.Hayes, Read (1999), “Tailoring Security to Fit the Criminal,” Security Management, 43:7, pp. 110–116.Google Scholar
- 20.Sutherland, Edwin Hardin (1937), The ‘Professional’ Thief — By a Professional Thief. Chicago, IL: The University of Chicago Press, pp. 3–40.Google Scholar
- 21.Meier, Robert F., ed. (1985), Theoretical Methods in Criminology, Beverly Hills: Sage Publishing, pp. 151–76.Google Scholar
- 22.Peacock, Colin, personal correspondence from April 1, 2003.Google Scholar
- 23.Cox, Anthony D., Dena Cox, Ronald D. Anderson, George P. Moschis (1993), “Social Influences on Adolescent Shoplifting — Theory, Evidence, and Implications for the Retail Industry,” Journal of Retailing 69:2, pp. 234–246.CrossRefGoogle Scholar
- 24.Dawson, Scott (1993), “Consumer Response to Electronic Article Surveillance Alarms,” Journal of Retailing 69:3, pp. 353–363.CrossRefGoogle Scholar
- 24.Ibid, ref. 22.CrossRefGoogle Scholar
- 25.Koh, Robin, Edmund W. Schuster, Nhat-So Lam, and Mark Dinning (2003), “Prediction, Detection and Proof: An Integrated Auto-ID Solution to Retail Theft,” Cambridge, MA: The MIT Auto-ID Center.Google Scholar
- 26.Ibid, ref. 22.CrossRefGoogle Scholar
- 27.Baumer, Terry L., and Dennis P. Rosenbaum (1984), Combating Retail Theft: Programs and Strategies, Stoneham, Massachusetts: Butterworth Publishers, p. 22.Google Scholar
- 28.French, Jay T. (1979), Apprehending and Prosecuting Shoplifters and Dishonest Employees, New York, NY: National Retail Merchants Association.Google Scholar
- 29.Beck, A., C. Bilby, P. Chapman, and A. Harrison (2001), Shrinkage: Introducing a Collaborative Approach to Reducing Stock Loss in the Supply Chain, Brussels: ECR Europe.Google Scholar
- 30.Caime, Gabreil and Gabriel Ghone (1996), S(h)elf Help Guide, Toronto, Ontario: Trix Publishing.Google Scholar
- 31.Ibid, ref. 28.Google Scholar
- 32.Klein, Gerald (1991), “The Hidden Benefits of EAS,” Security Management 35:6, p. 56.Google Scholar
- 33.Ibid, ref. 27.Google Scholar
- 34.Mullen, Fred (1999), “Six Steps to Stopping Internal Theft,” Discount Store News 38:2, p. 12.Google Scholar
- 35.Ibid, ref. 19.Google Scholar
- 36.Hollinger, R., and R. Hayes (2001), “National Retail Security Survey,” Gainesville, FL: University of Florida.Google Scholar
- 37.Ibid, ref. 8.Google Scholar
- 38.Guffey Jr., Hugh J., James R. Harris and J. Ford Laumer Jr. (1979), “Shopper Attitudes Toward Shoplifting and Shoplifting Prevention Devices,” Journal of Retailing 55:3, p. 75.Google Scholar
- 39.Ibid, ref. 24.Google Scholar
- 40.Ibid, ref. 38.Google Scholar
- 41.Ibid, ref. 22.CrossRefGoogle Scholar
- 42.Ibid, ref. 22.CrossRefGoogle Scholar
- 43.Roberti, Mark (2005), “Retailers Say RFID Will Take Time,” RFID Journal, January 17.Google Scholar
- 44.Ibid, ref. 43.Google Scholar
- 45.Ibid, ref. 43.Google Scholar
- 46.Ibid, ref. 22.CrossRefGoogle Scholar
- 47.Ibid, ref. 22.CrossRefGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2007