The retail industry is on the cusp of a transformation in its use of data to protect profits and to identify and overcome sales barriers. We’ve been here before.
Benefit denial, which has a long history as an effective loss prevention strategy, is now taking an even more central role in stopping retail theft.
At any given time, even the most casual Google search for “retail robberies” will return pages and pages of recent news items—some recounting thieves’ success; others, their failure.
Companies are promising to leverage artificial intelligence (AI) to eliminate cyber threats and diagnose cancer. Other companies describe how it will be used to predict customer behavior and execute marketing campaigns. Post sponsored by Appriss Retail.
After establishing a new standard for electronic article surveillance (EAS) technology for its North American stores, Under Armour does have one lingering regret. Post Sponsored by Nedap.
Many characteristics comprise a retailer—products, price, customer service, store design, and more. Nothing, however, has a more profound impact on potential customers than how they feel about a retailer.
All loss prevention departments have an existing system to handle shoplifting incidents. And with everything new on LP’s plate—technology, threats, retail strategies, and the like—there is a good chance that it’s been a while since you’ve taken a critical look at your current approach.
Sponsored by American Public UniversityRetailers’ crisis management programs have matured over the last decade. Nonetheless, wishful thinking continues to plague their disaster planning, according...
Since last June’s National Retail Federation (NRF) loss prevention conference, there have been a lot of changes—and not all of them have been good. Attendees to this year’s NRF PROTECT conference, June 27 - 28 in Washington DC, will be learning how to navigate in retail and loss prevention environments that are more complicated, dangerous, and mission critical than at any time in recent years.
Attitudes toward the cyber risk posed by network devices can vary substantially. Some organizations don’t give it much thought.