Hayes | Retail Security and Loss Prevention | E-Book | sack.de
E-Book

E-Book, Englisch, 270 Seiten

Hayes Retail Security and Loss Prevention

E-Book, Englisch, 270 Seiten

ISBN: 978-1-4832-9600-5
Verlag: Elsevier Reference Monographs
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



RETAIL SECURITY AND LOSS PREVENTION is an invaluable reference for both retail and security professionals. Using step-by-step plans, this book helps the reader design and implement cost-effective loss control programs.
It details an easy-to-follow proven process.
Hayes Retail Security and Loss Prevention jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Front Cover;1
2;Retail Security and
Loss Prevention;4
3;Copyright Page;5
4;Table of Contents;8
5;Dedication;6
6;List of Figures;12
7;Foreword;14
8;Preface;16
9;Acknowledgments;18
10;Introduction;20
11;Retail Security and Loss Prevention;22
12;Part I: Retail Risks: Problems and Solutions;24
12.1;Chaper 1. Employee Theft;26
12.1.1;EMPLOYEE ERROR AND WASTE;27
12.1.2;MERCHANDISE THEFT;27
12.1.3;CASH THEFT;29
12.1.4;MISCELLANEOUS BUSINESS ABUSE;33
12.1.5;PROPRIETARY INFORMATION;36
12.1.6;INVESTIGATING EMPLOYEE THEFT;37
12.2;Chapter 2. Managing Employee Honesty;40
12.2.1;PRE-EMPLOYMENT SCREENING;42
12.2.2;ACCESS/PROCEDURAL CONTROLS AND AUDITS;43
12.2.3;STORE/COMPANY ATMOSPHERE;45
12.3;Chapter 3. Vendor Theft and Error;48
12.3.1;RISKS;48
12.4;Chapter 4. Controlling Cargo Theft;52
12.4.1;SHIPPING;52
12.4.2;STAGING;53
12.4.3;LOADING;53
12.4.4;TRANSPORTING;54
12.4.5;RECEIVING;55
12.5;Chapter 5. Shoplifting;56
12.5.1;TYPES OF SHOPLIFTERS;56
12.5.2;SHOPLIFTING METHODS;57
12.5.3;DETECTION OF SHOPLIFTERS;58
12.5.4;SHOPLIFTING PREVENTION;58
12.5.5;FIVE STEPS TO FOLLOW PRIOR TO DETAINING A SUSPECT;61
12.5.6;WHEN SHOPLIFTING IS SUSPECTED;62
12.5.7;APPREHENDING THE SHOPLIFTER;63
12.5.8;DETAINING THE SHOPLIFTER;63
12.5.9;CIVIL ACTION;67
12.6;Chapter 6. Point-of-Sale Risks;70
12.6.1;BAD CHECKS;70
12.6.2;CREDIT CARD FRAUD;72
12.6.3;COUNTERFEIT CURRENCY;74
12.6.4;CURRENCY SWITCH;75
12.6.5;CONTAINER SWITCH;75
12.6.6;PRICE SWITCH;76
12.6.7;REFUND FRAUD;76
12.6.8;QUICK-CHANGE SCHEMES;77
12.7;Chapter 7. Miscellaneous Risks;80
12.7.1;ROBBERY;80
12.7.2;BURGLARY;83
12.7.3;BOMB THREATS;86
12.7.4;COUPON FRAUD;87
12.7.5;COMPUTER CRIME AND DATA LOSS;91
12.7.6;NATURAL AND CIVIL DISASTERS;92
12.7.7;CIVIL LIABILITY AND LITIGATION;93
13;Part II: Identifying and Prioritizing Risks;98
13.1;Chapter 8. Security Surveys;100
13.1.1;HISTORICAL DATA;101
13.1.2;ASSETS TO BE PROTECTED;102
13.1.3;SUMMARY;105
13.2;Chapter 9. Data Analysis;108
13.2.1;POSSIBLE AND PROBABLE FINANCIAL LOSS;108
13.2.2;ASSIGNING FINANCIAL IMPACT RATES;110
13.2.3;PROBABILITY OF INCIDENT OCCURRENCE;110
13.2.4;EXAMINING SECURITY DATA;111
13.2.5;ASSIGNING LOSS INCIDENT PROBABILITY RATE;112
13.2.6;PRIORITIZING RISKS;112
14;Part III: Designing and Implementing Prevention Programs;114
14.1;Chapter 10. Loss Prevention Program Design;116
14.1.1;BASIC PROGRAM FOCUS;116
14.1.2;RISK CONTROL COUNTERMEASURES;119
14.1.3;PROTECTION PROGRAM DESIGNS;122
14.1.4;THE PROTECTION PLAN;124
14.2;Chapter 11. People;126
14.2.1;IN-HOUSE EMPLOYEES;126
14.2.2;OUTSIDE PERSONNEL;131
14.3;Chapter 12. Programs;136
14.3.1;LOSS CONTROL POLICIES;136
14.3.2;LOSS CONTROL PROCEDURES;137
14.3.3;PROTECTION PROGRAMS;139
14.3.4;POLICY AND PROCEDURE MANUALS;143
14.3.5;TRAINING EMPLOYEES;143
14.3.6;FOLLOW-UP;144
14.4;Chapter 13. Security Systems;146
14.4.1;ACCESS CONTROL SYSTEMS;146
14.4.2;LIGHTING;148
14.4.3;ALARMS;149
14.4.4;EAS;153
14.4.5;CCTV;155
14.4.6;OTHER LOSS PREVENTION SYSTEMS;156
14.5;Chapter 14. Selecting Protection Equipment and Services;160
14.5.1;SPECIFICATIONS;160
14.5.2;BIDS;162
14.5.3;TESTING;163
14.5.4;NEGOTIATING THE CONTRACT;163
14.6;Chapter 15. Sample Protection Program;166
14.6.1;WHERE TO BEGIN;166
14.6.2;HOW TO PREPARE A LOSS CONTROL PLAN;167
14.7;Chapter 16. Implementing the Program;182
14.7.1;JUSTIFICATION OF THE CONTROL PROGRAM;182
14.7.2;TEAMWORK;184
15;Part IV: Testing and Follow-Up of the Loss Control Programs;186
15.1;Chapter 17. Auditing and Follow-Up;188
15.1.1;INSPECTIONS;189
15.1.2;EFFECTIVENESS ANALYSIS;190
15.1.3;DATA COLLECTION;190
15.1.4;INSPECTION/AUDIT REPORTS;190
15.2;Chapter 18. Inventories;192
15.2.1;RETAIL METHOD OF INVENTORY;192
15.2.2;THE INVENTORY PROCESS;193
15.2.3;INVENTORY TIPS;194
15.3;Chapter 19. The Future;196
15.3.1;INDUSTRY TRENDS;196
15.3.2;SUMMARY;198
16;Appendix 1: Sample Conflict of Interest Policy;200
17;Appendix 2: How-To Manual for Shoplifters;202
18;Appendix 3: Civil Recovery Laws;207
19;Appendix 4: Abbreviated Retail Security Survey;211
20;Appendix 5: Sample Completed Store Audit Report;214
21;Appendix 6: Sample Consulting Proposal;225
22;Appendix 7: Recommended Control Procedures;228
23;Appendix 8: Standard Operating Procedures—Sample Employee Investigation Policy;232
24;Appendix 9: Training Program Checklist;234
25;Appendix 10: Sample Loss Control Plan;239
26;Appendix 11: Sample Loss Prevention Inspection/Audit Report;244
27;Appendix 12: Security Resources;247
28;Appendix 13: Model Civil Recovery Statute;260
29;Appendix 14: Model Retail Theft Statute;261
30;Index;264


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.