Skip to main content
Log in

Reducing shoplifting by investment in security

  • General Paper
  • Published:
Journal of the Operational Research Society

Abstract

We consider a single retailer with a given potential revenue, who sells a product that is subject to shoplifting. In order to decrease losses due to shoplifting and to maximize his profit, the retailer can invest in security measures. In particular, we assume that the retailer purchases security services from a single security supplier. The security supplier decides which price to charge the retailer for these services, with the purpose of maximizing his own profit, and the retailer decides on the quantity of security services to purchase. We address this problem using a game theoretic approach, where the retailer competes with the supplier—the leader—who specifies first the service price. The retailer responds by deciding how much to invest in security. We study the conditions under which both players are profitable and the extent to which double marginalization affects the supply chain performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12

Similar content being viewed by others

References

  • Babin BJ and Babin LA (1996). Effects of moral cognitions and consumer emotions on shoplifting intentions. Psychology & Marketing 13 (8): 785–802.

    Article  Google Scholar 

  • Bullard PD and Resnick AJ (1983). Too many hands in the corporate cookie jar. Sloan Management Review 25 (1): 51–56.

    Google Scholar 

  • Cole C (1989). Research note: Deterrence and consumer fraud. Journal of Retailing 69 (2): 107–120.

    Google Scholar 

  • Dawson S (1993). Consumer responses to electronic article surveillance alarms. Journal of Retailing 69 (3): 353–362.

    Article  Google Scholar 

  • De Kok AG and Graves SC 2003. Supply Chain Management: Design, Coordination & Operations. Elsevier: Amsterdam.

    Google Scholar 

  • Farrington DP, Bowen S, Buckle A, Burns-Howell T, Burrows J and Speed M (1993). An experiment on the prevention of shoplifting. In: Clarke RV (ed). Crime Prevention Studies. Vol. 1. Criminal Justice Press: Monsey, NY.

    Google Scholar 

  • Gideon Y (2009). Shoplifting, monitoring and price determination. The Journal of Socio-Economics 38 (4): 608–610.

    Article  Google Scholar 

  • Gopal RD and Sanders GL (2000). Global software piracy: You can’t get blood out of a turnip. Communications of the ACM 43 (9): 82–89.

    Article  Google Scholar 

  • Hollinger RC and Davis JL (2002). National retail security survey final report. University of Florida. Center for Studies in Criminology and Law: Gainesville, FL.

    Google Scholar 

  • Khouja M and Smith MA (2007). Optimal pricing for information goods with piracy and saturation effect. European Journal of Operational Research 176 (1): 482–497.

    Article  Google Scholar 

  • Krasnovsky T and Lane R (1998). Shoplifting: A review of the literature. Aggression and Violent Behavior 3 (3): 219–235.

    Article  Google Scholar 

  • Lantz B (2009). The double marginalization problem of transfer pricing: Theory and experiment. European Journal of Operational Research 196 (2): 434–439.

    Article  Google Scholar 

  • Lindblom A and Kajalo S (2011). The use and effectiveness of formal and informal surveillance in reducing shoplifting: A survey in Sweden, Norway and Finland. International Review of Retail, Distribution and Consumer Research 21 (2): 111–128.

    Article  Google Scholar 

  • Mishra BK and Prasad A (2006). Minimizing retail shrinkage due to employee theft. International Journal of Retail and Distribution Management 34 (11): 817–832.

    Article  Google Scholar 

  • Radner R (1985). Repeated principal-agent games with discounting. Econometrica 53 (5): 73–98.

    Article  Google Scholar 

  • Rekik Y, Sahin E and Dallery Y (2009). Inventory inaccuracy in retail stores due to theft: An analysis of the benefits of RFID. International Journal of Production Economics 118 (1): 189–198.

    Article  Google Scholar 

  • Wang CX (2002). A general framework of supply chain contract models. Supply Chain Management: An International Journal 7 (5): 302–310.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Appendix

Appendix

Given Equation (9), there are three values of u that satisfy the first-order condition of the supplier's optimality:

where Since two of the solutions are complex expressions (Equations (A.2) and (A.3)), only the remaining solution is feasible (Equation (A.1)).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Perlman, Y., Ozinci, Y. Reducing shoplifting by investment in security. J Oper Res Soc 65, 685–693 (2014). https://doi.org/10.1057/jors.2013.37

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jors.2013.37

Keywords

Navigation