Various factors, including tight budgets, increases in serious crime, and shrinking availability of patrols have affected police procedures and shoplifting penalties. Read More
Tag: retail loss prevention software
In my opinion, there is one trait that all true leaders possess—and that is experience. It is experience that enables our careers in loss prevention to evolve, develop, and flourish. The faster you gain experience, the more quickly you will improve your leadership. One way to accelerate gaining experience is Read More
Deep inside the data warehouses of companies across the world, billions of dollars are trapped in the subtle variations between the binary 0s and 1s that make up fraud and loss prevention data.
For Retail Industry Leaders Association (RILA) asset protection conference in 2014, JCPenney approached the University of Texas at Read More
Every so often, a simple idea catches the imagination, fervor, and engagement of a group of people and is developed into a successful practice that revolutionizes a business. Electronic article surveillance (EAS) source tagging is definitely one of those.
This story commemorates the evolution of source tagging with The Home Depot Read More
In the 2015 US Retail Fraud Survey, retailers across the country identified analytics and monitoring as the number-one area of need. With the average US retailer experiencing shrinkage at a level comprising 1.3 percent of total sales (resulting in an annual $60 billion loss industry-wide) at that time, it’s no Read More
More than ever, it seems that those in loss prevention are being faced with a plethora of new loss prevention technology solutions. In fact, at a recent loss prevention conference organized by the Retail Industry Leaders Association (RILA), over 37 different technologies were being promoted, including global positioning systems (GPS), Read More
As technology draws us deeper into a new age of business enterprise, we are continuously bombarded with challenges and opportunities involving those with malicious intentions. Data security attacks come at us from every direction as the ingenuity of criminal minds seek new and creative ways to infiltrate our information resources Read More