27 minute read

INTERVIEWING

It’s All about Context: Part 4

The non-confrontational monologue delivered by the investigator has an evolving context between the guilty party and the investigator. The context changes significantly from sharing the opening biographical information to the discussion of how investigations are conducted. As the guilty subject listens to the investigator’s monologue, he or she is incrementally moved through reducing resistance to making an admission. This is all done in a collaborative non-confrontational way that allows the subject to preserve their self-image even in light of their participation in criminal acts.

The key in the introductory statement is developing a context where the individual can come to their own conclusion about whether or not their guilt is known. In addition, if the same words are said to an innocent person these words have no effect because they have done nothing wrong.

Essentially, the context provided by the first three parts of the introductory statement creates a collaborative environment where the guilty can come to their own conclusion whether or not their dishonesty has been discovered. In allowing the guilty party to come to their own conclusion, it prevents them from seeing the investigator as an opponent and someone to be challenged. This sets the stage for the next part of the non-confrontational interview where the investigator shows understanding for the subject’s plight and offers reasons and excuses that reframe the seriousness of the incident and preserve the subject’s self-image.

Showing Understanding

As the interviewer enters the showing-understanding portion of the non-confrontational interview, there is another shift in the context of the conversation. In most cases the subject has come to the conclusion that he or she been caught but has not been forced to take a position that must be protected. As the interviewer moves into showing understanding, the subject is generally uncertain what to do and is evaluating what the interviewer is saying. There is also likely some confusion as the subject searches for a way out of the situation.

The interviewer uses stories as a metaphor, which helps the subject formulate a direction and potential strategy to handle the situation. The stories used by the interviewer involve social proof establishing how others handle certain difficult situations. While most people like to think of themselves as independent free spirits paving their own road, it is actually quite the opposite. When most people are uncertain as to what they should do in a situation, they actually seek validation of their decision in the acts of others. How are other people handling a difficult situation?

by David E. Zulawski, CFI, CFE and Shane G. Sturman, CFI, CPP

Zulawski and Sturman are executives in the investigative and training firm of Wicklander-Zulawski & Associates (w-z.com). Zulawski is a senior partner, and Sturman is president. Sturman is also a member of ASIS International’s Retail Loss Prevention Council. They can be reached at 800-222-7789 or via email at dzulawski@w-z.com and ssturman@w-z.com.

© 2015 Wicklander-Zulawski & Associates, Inc.

In essence, the human creature is a herd animal following the group when there is uncertainty. We watch the same movies. We dress in the same fashions. We go to the same restaurants. Effectively, we follow the crowd.

The presentation of showing understanding to the subject reinforces the feeling that the interviewer is not an opponent but simply trying to understand the reasons why something has happened.

The presentation of showing understanding to the subject reinforces the feeling that the interviewer is not an opponent but simply trying to understand the reasons why something has happened.

The opening of showing understanding involves a presentation of a number of basic rationalizations by the interviewer that fit the background of the subject and plausibly could have been the reason the individual made the decision to commit a crime. These very basic rationalizations allow the interviewer to open the subject’s mind to the world of possible justifications for his or her actions and to test their applicability. The context at this point is a subject looking for direction that can be taken of one’s own free will without being told what to do. Certainly, the subject is also still suspicious of the interviewer’s motives and is carefully evaluating everything that is said.

The choice of the first rationalization provides a continuation of the rapport building while offering the subject a way to potentially shield their self-image. The subject, recognizing that he or she has been caught, is now looking for a way to salvage an untenable situation. If he were to confess prior to the showing-understanding portion, he must admit that he was involved in the incident and is a bad person. The process of showing understanding provides

continued on page 14

In any conversation, in or outside of an interview room, there may be an underlying change in the context between the individuals speaking as the conversation evolves.

continued from page 12 a context whereby the subject can put a positive spin on his circumstances to make him look and feel better.

The first rationalization is selected based on the background of the individual and clearly could be the likely reason the subject became involved in the incident. The interviewer presents a story revolving around a rationalization that is the reason or likely reason the person made the error in judgment. While the story has little appeal to an innocent party, the guilty evaluate it in an entirely different context since they are searching for a way to relieve their guilt and/or make themselves look better.

As later rationalizations are presented, the stories begin to align with the subject’s background more closely. For example, if a young male had just gotten his first apartment, the initial story could revolve around the financial implications of starting one’s first home. Everything has to be purchased new. There’s no salt or pepper, plastic bags, or food in the refrigerator. There’s no broom or wastebasket. Here the interviewer recognizes the financial burden of starting a new home and the financial pressure that puts on people. The story mimics the situation that the subject finds himself in, but that alone does not provide the full context of why he made the decision to commit the crime.

The next rationalization brings the situation full-circle by changing the story to revolve around peer pressure. The young man who has just rented his first apartment and is for the first time fully realizing the financial implications is approached by someone else who can alleviate the subject’s money problems.

The subject’s view of the preceding conversation fits neatly with his need to find a way out that reasonably explains his becoming involved in the crime. His financial needs coupled with the peer pressure of the other person who could provide the additional money that was necessary to get him out of his shortfall.

The context has now changed again. The subject came to the conclusion that his guilt was known and now he has found a plausible explanation why he did what he did. Now the subject reevaluates the interviewer and re-examines the initial suspicions that he had of the interviewer.

To handle this, the interviewer must now address the subject’s suspicions and remaining fear of consequences and create an urgency to make a decision. These lingering questions in the mind of the subject must be handled, or they will reinitiate a resistance against making an admission.

Probably the strongest question remaining unanswered is why the investigator has not presented the evidence linking the subject to the incident. If this is unanswered, the subject’s context reverts to suspicion, which will foster resistance. The interviewer must handle this suspicion by changing the context of the conversation of evidence to one that would put the individual into a bad light. Effectively, the interviewer argues that giving up the investigation’s evidence would jeopardize how the subject was viewed by others.

Once these final unspoken questions have been resolved in the subject’s mind, the context again changes to resignation of his situation. The interviewer tests for submission with a statement such as, “The problem is we don’t know what difficulties you face in your life.” Generally, the subject at this point in the interview responds with a nonverbal cue like a nod of the head to offer tacit agreement that both he and the interviewer are in agreement to talk about the situation. Since there is agreement between the parties, it is appropriate for the interviewer to use an assumptive question to begin the conversation. Because the subject has not denied anything up to this point and has tacitly communicated his agreement, the assumptive question provides an excellent starting point for the conversation to develop the admission.

The development component of the interview takes on the context of collaboration as the interviewer and subject work together to develop the totality of the subject’s involvement in the incident(s) under investigation. This is not to say the subject might not use some measure of concealment to protect incidents he believes may not have been discovered as yet.

In any conversation, in or outside of an interview room, there may be an underlying change in the context between the individuals speaking as the conversation evolves. The prudent interviewer tries to establish what that context is so that the words and physical behavior may have more meaning and give greater breath to the conversation.

RETAIL INNOVATION MANAGING THE FRONTIERS OF

UNDERSTANDING THE POTENTIAL IMPACT OF MOBILE SCAN AND PAY TECHNOLOGIES ON RETAIL LOSSES

Rapid developments in mobile technologies now mean that some retailers are offering customers the opportunity to use their own devices to scan and pay for products in their stores, frequently with little or no staff interaction. For some this represents the natural next step in the seemingly relentless move toward giving consumers yet more choice and control over their shopping experience. For others it represents a significant and profound change in the extent to which retailers are able to control the problem of shop theft and non-malicious stock loss.

This article presents the findings from a twelve-month study funded by the UK government’s Economic and Social Research Council (ESRC), undertaken by academics from the University of Leicester’s Department of Criminology, to understand how retailers are beginning to use mobile scan and pay technologies (MSP), what the risks of using it might be, how they are currently being managed, and how these risks might be mitigated in the future.

The study is based upon extensive interviews with staff involved in the development and implementation of MSP systems across four retailers in the UK, two in the US, one in Belgium, and one in Holland. In addition, loss prevention practitioners were interviewed, analysis of shrinkage data from one retail partner was undertaken, and researchers also carried out on-site observation and testing in three of the retailers taking part.

All retailers in the study were at different stages in the development of MSP, with one UK retailer piloting MSP across several stores, another was in the process of conducting a trial within one store, one had piloted a system though the company had (for the time being) shelved roll-out plans, and another had not got past the planning stage of a pilot project. All four international retailers taking part had rolled out MSP to varying degrees, with three currently running versions across a number of their stores, while one had recently withdrawn the option from a group of trial stores.

Across the majority of the retailers taking part, MSP was currently focused upon only offering customers the opportunity to use their own mobile The development of fixed self-scan technologies required a considerable leap of faith in the integrity and honesty of the shopper, who needed to be trusted to scan and pay for all items they wished to purchase. With the introduction of mobile self-scanning and payment, then arguably this leap of faith becomes even greater as the potential opportunities for risk-free noncompliance grow yet further.

device to scan items, rather than developing a payment wallet. Only one retailer in the study was currently trialing both a scan and payment wallet with its MSP system.

Innovation and Retailing

The cornerstone of modern retailing is the necessity to innovate and change. As competition increases and consumers become more and more demanding, the pressure to offer new and exciting products in dynamic and enthralling retail spaces, some of which now reside in cyberspace, continues to grow. This has driven a number of developments in the customer experience in recent times, moving from a time when most products were primarily held behind a counter to one where the consumer now has much greater engagement with, and responsibility for, the selection and purchase of goods.

This is best exemplified by moves toward open display and, more recently, the use of fixed self-scan checkouts where customers not only have to find and select items themselves, but also are expected to take responsibility for payment as well at dedicated self-scan checkouts. Alongside this has been a rapid growth in mobile commerce and online shopping, allowing customers to search and pay for products online via their own computers, tablets, or mobile devices. Most recently, and the focus of this article, is the development of systems that allow the customer to use their own mobile device “in-store” to not only scan items they wish to purchase, but

also in some circumstances pay for them using the same device through the use of downloadable smartphone apps, anywhere in the store.

All of this can be seen as part of long-term changes in the retail industry where increased customer autonomy and self-service is being introduced at the expense of formalized staff-customer interactions. These changes have generated impressive rewards for some retailers—fewer staff need to be employed, and store designs can be radically changed to maximize the display of goods, both of which have led to significant increases in sales and retail profits.

However, there is a price to pay. More open and less-controlled retail spaces make it not only significantly easier for motivated offenders to steal products, but also reduces perceptions of risk for customers, encouraging more to think about taking advantage of the new opportunities for deviancy presented to them. For instance, the development of fixed self-scan technologies required a considerable leap of faith in the integrity and honesty of the shopper, who needed to be trusted to scan and pay for all items they wished to purchase. With the introduction of mobile self-scanning and payment, then arguably this leap of faith becomes even greater as the potential opportunities for risk-free noncompliance grow yet further. Many of the risk amplifiers introduced to provide a modicum of control at fixed self-scan checkouts, such as weight control and employee oversight, are stripped away leaving relatively few options available.

Perceived Benefits of Mobile Scan Technologies

Although the pace at which MSP systems were being developed and implemented across the retailers included in this study was slow—and in many cases not without difficulties—respondents highlighted several potential benefits. These included consumer convenience and the streamlining of the purchase process. As one respondent stated, “Customers don’t have to empty their trolley [basket] and reload it all again at the end, which ultimately speeds up the process.”

It was also positively perceived to enable customers to know exactly what they have spent at all points of the shopper journey and pay within the aisle rather than at a payment bank at the end of the shopping journey. Indeed, the potential for the “personalization of shopping” was thought beneficial as it allowed the customer to keep a closer track on their purchase history and any loyalty points accrued.

Another benefit for customers was thought to be the ability to utilize geolocation data and real-time messaging with integrated webpage or store hubs. Geolocation data could allow stores to identify where customers are in-store, which could then be linked to store maps and directions to specific products. Integrated webpage/store hubs would allow customers to browse goods via the retailer webpage, while also being sent information about where the products are located in-store, if they are available, and at what price. There is also the potential to relate items purchased to other commonly purchased items, such as shaving gel to

WHAT’S YOUR NEW YEAR’S

REVOLUTION?

If you’re ready to revolutionize your strategy for 2016 with the newest innovations in EAS, RFID deployment, source tagging, intelligent high-theft solutions and more, come to the source.

Scan to nd out the top 10 ways to revolutionize 2016!

razors, tonic to gin, or children’s shoes to children’s clothes, and to send the customer real-time push notifications about offers on other related products.

Benefits were also identified for retailers as well. While much has been made of the potential savings that might be made on staff costs as a benefit of customer self-checkouts, this was also cited as a key potential benefit of MSP. For some retailers the use of this technology would offer two staffing-related opportunities—to enable more staff to be utilized away from checkouts and on to more customer-focused services such as in-aisle assistance, and a reduction in the overall staff hours allocated to stores.

An add-on effect would be savings on the purchase costs of physical checkout equipment as less would be needed, as well as the associated maintenance and cash-handling costs. In addition, less physical checkout equipment would free up more space for product displays.

Other key benefits related to customer retention and the marketing of products. As eluded to above, forms of loyalty bonuses and product offers could be offered to MSP customers. Ultimately, registering customers as MSP users would also allow retailers to hold even more information about them that could yield shopping pattern data,

Technological and Process Challenges of MSP

CHALLENGES DESCRIPTION

Phone types

Slow app downloads Registration and getting started WiFi access/passwords in store

At present systems tend to support Apple devices, not those using Android or Windows operating systems even though Apple accounts for only about 20 percent of the smartphone market. Registering and downloading the app can be slow and frustrating. In most of the trial companies, getting started in store was challenging. Available lea ets were often unclear, with the steps to be taken often proving to be confusing and opaque.

Accessing in-store WiFi was sometimes dif cult and confusing.

Problems scanning barcodes

Scanning barcodes using a mobile phone can be dif cult. There was often glare from store lights depending upon angle and type of product packaging. However, persistence usually led to a successful scan, although all were much slower than infrared systems. There was considerable difference in barcode identi cation rates between retailers. Some were signi cantly faster than others, and this had a major impact on the shopping experience. Multi-buys When buying the same item several times, the in-app process could be laborious in some of the MSPs as there was no facility to enter quantity. Three hands syndrome Holding the phone, selecting items from the shelves, and pushing a trolley or holding a basket is dif cult to manage. It also increases the likelihood of dropping the mobile device.

Phone battery life

Some apps required a large amount of battery power, which could be problematic on extended shopping visits.

WiFi dead spots

On several visits to one retailer, the WiFi connection consistently cut out in a particular part of the store.

Voiding purchases

Age restrictions

This sometimes requires a product re-scan, but this did not always cancel the purchase. In most of the trial stores, the researchers were able to easily crash the app through multiple voiding of products. Purchase of age-restricted products always required staff intervention at the payment stage. Only some of the apps made the consumer aware of this requirement.

Product protection: safer cases/EAS hard tags Product protection: EAS soft/source tags

Payment QR codes

Purchase of items with hard product protection devices attached required staff intervention to remove the device. Only some of the apps alerted the consumer to the need for tag removal. In the one retailer using this technology, there was no facility to deactivate soft EAS tags. The exit alarm would always be activated when MSP customers left who had purchased a soft-tagged protected product. Payment QR codes did not always work, and veri cation bar codes proved highly unreliable. It was also found that not all commercially available QR readers would read the displayed codes. In one store, the researchers had to download two QR apps before being able to continue.

Non-country registered users

In some countries, the UK-based researchers could not use the MSP systems because either the app was not made available in the country app store or the app required a local address or loyalty card number. Payment wallets Many systems still rely on payment at xed payment terminals through cash or card, rather than through a payment wallet. Paying and security audits Payment process was often slow, and audit checks were sometimes frustrating. Shopper distraction It is easy to forget to scan items before placing in bag/basket/trolley, particularly when searching for other items or chatting to friends and family. Ineligibility for vouchers In the company with a payment wallet option, those consumers making use of this facility could not receive the voucher options available to non-MSP customers.

Non-scannable barcodes

While overall scan accuracy was high, on two occasions products would not scan, which meant the shopping trip could not be completed. One was a faulty barcode, while the other was a system product setup issue. A single point of failure can add signi cantly to customer inconvenience to the point the MSP shop had to be abandoned and conventional shopping journey taken instead.

enabling opportunities for yet further personalization of the shopping experience.

Despite these perceived benefits, the research revealed a considerable number of problems associated with using this type of technology, which are summarized in the table below.

Potential Impact on Theft and Loss

The study found that MSP systems were likely to impact upon crime and loss in at least four ways: Theft through malicious non-scanning of goods. Non-malicious loss through non-scan or scanning errors. Physical and verbal abuse against staff generated via audit checks. Transaction frauds or fraudulent use of payment wallets.

Respondents to the study were particularly concerned about the increased risk of theft, but not necessarily from what might be regarded as professional thieves. As one respondent put it, “Moving toward the ultimate in self-service [MSP] not only might send out the wrong physical cues to potential offenders, but also those shoppers who might not necessarily plan to steal may start to take opportunities to exploit weaknesses in systems.” Thus, retailers using MSP might actually begin to encourage shoppers who fully intend to scan and pay for products to engage in criminal activity. Another respondent said, “What you might see is people who traditionally don’t intend to steal, but realize when I buy twenty, I can get five for free. Maybe I’ll continue to do that.” There are a number of factors that might begin to explain why this could happen.

Ease of Effort and Access to Products. Whereas traditional counter shopping limits access to goods, the rationale for MSP is that customers have open access to products and take responsibility for payment with limited or no staff involvement. As one respondent observed, “It’s the ultimate in trust.” Another said, “They call it ‘Scan and Rob.’” Thus, MSP potentially promotes ease of effort for theft by removing any human contact throughout the shopping process and in some cases—possibly most importantly—at the final payment stage.

Increased Rewards for Offenders and Non-scanners. The MSP environment might generate long-term rewards for offenders and non-scanners. Indeed, several respondents suggested that non-scanning behavior could become part of the routine behaviors of some shoppers, and they may begin to target stores where this shopping option is offered.

Reduction in Risk Perception. A number of studies have shown the important role staff presence can play in reducing the risk of theft occurring, typically by making any would-be offender feel there is a greater risk of being caught. Within the MSP environment the potential for staff to interact with consumers is markedly reduced—sometimes to the point where no contact whatsoever is necessary. This could act to significantly reduce the perceived risk of non-scanning items.

Likely Excuses. Self-scan technologies present the user with ready-made excuses as to why products may not have been

scanned properly—what the authors have termed the “self-scan defense.” Giving customers the freedom to self-scan gives them the opportunity to blame faulty technology or problems with the product barcodes, or to claim that they are not technically proficient as reasons for non-scan. Indeed, proving intent can be tricky—“I scan twenty items, and I don’t scan five; am I a thief or just someone who’s not very competent?”

While some retailers had made efforts to tackle this problem, such as in-app prompts requesting confirmation that all items had been scanned and sharing non-scanning behavior between retailers, analysis of audit data and interviews with staff suggest that virtually all identified non-scan transgressions were typically condoned by the retailers, leading to no formal sanctions whatsoever. As things stand, the self-scan defense is potentially a powerful tool for diluting any risk of being found not to have scanned certain items when utilizing MSP.

Likely Provocations. At present, there are a number of points in the MSP shopper journey that could trigger disputes with staff. Store visits identified frustration points when products would not scan, when staff had to intervene to remove EAS devices or do age verifications, and when payment wallets would not work. In addition, audit checks (random checks carried out at the point of payment) could also cause grievances especially if particular customers felt as though they were being targeted.

Impact on the Rate of Shrinkage

While a number of retailers have been operating versions of MSP for the last few years, no data has been published to date analyzing the impact these systems have on rates of store shrinkage. One of the retailers taking part in this study did agree to share data although to protect their anonymity, we will not disclose the currency of the numbers being presented. The retailer is a multi-billion [dollar/ euro] business with many hundreds of stores providing a wide range of products. As part of their MSP process they carried out random audit checks on those utilizing the technology. They also provided the consumer with a retailer scan gun to perform the same function as their mobile device. Over a twelve-month period, covering 12 million shopping trips encompassing just over 1 billion in sales, they undertook just over 1 million audits that involved checking 6 million items (staff were limited to checking on average six items per basket). Staff found products with a value of 850,000 had not been scanned out of a total audit value of 21 million. This generated a shrinkage rate of 3.97 percent (calculated as a percentage of retail turnover).

The overall company average for shrinkage was 1.47 percent. Therefore, the mobile scan rate was 170 percent higher. This is a profound difference, and with retailer profit margins being continually squeezed, it would appear to make this form of shopping at best borderline profitable for some businesses. The study was not able to ascertain what if any savings the retailer had made from introducing the technology, such as

continued on page 22

Pre-visit Store Entry

Behavior Control through Risk Ampli cation

The Shopper Journey

In-Store Store Exit Post-visit

Risk Ampli cation Opportunities

Identity Awareness & Veri cation Virtual Visibility & Communication Deviancy Noti cation Deviancy Response Checkout & Exit Control

Post Visit Con rmation

Scheme sign up

Pre-visit messaging

Mobile device registration

Log in on arrival

Identity con rmation

Some Current Capacity

Little or No Current Capacity Main Current Capacity Little Current Capacity

In-store location mapping

Product-proximity tracking

Product-related messaging

Discount messaging Scan accuracy prompts Product-driven guardianship

Non-scan noti cation

Product-related messaging

Location awareness Geo-fencing alerts

App locking

Employee noti cations

Employee interventions

CCTV tracking Payment control

Audit risk

Exit control

Detagging point

Age-related check point E-receipts

Future shopping vouchers

continued from page 20

reduced staffing and equipment costs, which may have mitigated these losses, nor was it able to shed light on what proportion of the non-scan events were malicious or non-malicious in nature. That is, were customers trying to steal, or had they genuinely forgotten to scan the items due to difficulties with the technology, distraction, or absentmindedness?

This is a critically important question in determining how to generate risk amplification with this form of shopping. If it is predominantly malicious, then this points to the importance of risk amplification through approaches such as audits to act as a credible deterrent; while if it is largely non-malicious, then it points toward the need to improve consumer communication and awareness training.

Amplifying Risk for the Mobile Shopper

As things currently stand, the retailers taking part in this study had only two points in the mobile shopping journey when they had an opportunity to amplify the risk—at the point of store entry when users must register or sign in to use the system and at the point of payment when a user could be subject to an audit check. The first opportunity generates some risk by reducing the degree of anonymity as the store lets the user know that they have arrived, while the second increases the risk of non-scanned items being identified in a shopper’s basket, although proving intent to purposely non-scan remains problematic.

For the rest of the shopping journey, there is little or no capacity to amplify risk. Traditional forms of security such as guards, CCTV, and product security tags offer little in the way of a viable concern to the mobile shopper. They can simply move through the store placing products in their basket or shopping bag without any real opportunities to verify whether they have been scanned or not.

Detailed in the chart on page 20 are some of the ways in which risk could be amplified across the entire shopping journey for the mobile shopper of the future. While there is not sufficient space to discuss them in detail at this time, the key is to develop ways in which the The study found that mobile scan and payment systems were likely to impact upon crime and loss in at least four ways—theft through malicious non-scanning of goods, non-malicious loss through non-scan or scanning errors, physical and verbal abuse against staff generated via audit checks, and transaction frauds or fraudulent use of payment wallets.

mobile shopper perceives that they are operating within a controlled space—that non-scan activity in particular will generate a response and that they will be easily associated with that activity.

Some of this can be achieved through better registration and user monitoring systems, but the majority of the risk amplification could be done by the products themselves—essentially they could become their own guardians and amplifiers of risk. This could be done through direct communication with the shopper—“Excuse me; I think you forgot to scan me”—or through communication with store staff—“Customer X has not scanned me; you may want to offer assistance.”

For this solution to become a reality, technology providers need to develop the next generation of product tagging—moving beyond the well-known limitations of radio frequency to utilize new ways in which objects can communicate with each other. This may then begin to deliver the much vaunted, but ultimately flawed businesses cases developed as part of the RFID bubble. MSP may be the trigger to generate the technological innovation that finally begins to deliver true product transparency across the retail supply chain.

The Industry Challenge

Without doubt innovation in the consumer shopping experience will continue at a rapid pace. Whether consumers using their own mobile devices to scan and pay for items will become mainstream is certainly open to debate at the moment. This research found that it was not terribly easy to use, relatively few consumers had taken up the opportunity to utilize it thus far, and a number of technological barriers remained.

However, research on current usage does shed some important light on how consumers may use and abuse such systems and how increasing customer autonomy in the retail space, particularly when perceptions of risk are reduced and sanctions are difficult to apply, can lead to very adverse outcomes for a retailer’s bottom line.

Amplifying risk across the shopping journey is critical, but it needs to move beyond the current foci and requires the industry to develop new ways in which products themselves can be tasked to become their own guardians. If not, then there is a real danger that the mobile shopper of the future will routinely rely upon the self-scan defense to generate their own discounts.

PROFESSOR ADRIAN BECK and MATT HOPKINS, PhD, work in the Department of Criminology at the University of Leicester, UK. For a free copy of the research report Developments in Retail Mobile Scanning Technologies: Understanding the Potential Impact on Shrinkage and Loss Prevention, please email Professor Beck at bna@le.ac.uk.

This article is from: