Implementing targeted theft-deterrent strategies depends on consistent record-keeping, organization, and pattern recognition. A data-driven incident management process is the only way to keep pace with an extremely adaptable foe.
Who shoplifts? There is no typical profile of a shoplifter. Based on our experience of interviewing offenders, shoplifters can be male or female, of any race, as young as five or well into their seventies.
Every so often, a simple idea catches the imagination, fervor, and engagement of a group of people and is developed into a successful practice that revolutionizes a business. Electronic article surveillance (EAS) source tagging is definitely one of those.
To retail customers on couches—if they were to give it a second thought—virtual shopping might seem magical. With a few mouse clicks or screen touches, they can conjure up just about anything to appear on their doorstep.
Reviewing current and historical fraud data reveals an implausible finding: despite the refinement of company fraud prevention programs and a corresponding sophistication in employee fraud schemes, the old bogus expense report is a bigger problem now than 16 years ago.
Listening to loss prevention leaders discuss their relationships with information technology (IT) departments and offer advice for strengthening them can seem a bit like eavesdropping on marriage counseling.