1 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf CITT C ENTRUM F ÜR I NFORMATIONS -T ECHNOLOGIE T RANSFER G MB H ED-BPM in the Retail Domain -

Slides:



Advertisements
Similar presentations
Confidential & Copyright - Megasoft Ltd. All rights reserved.
Advertisements

Secure Your Store Understand the measures used in securing a retail store.
Enterprise Business Solution Professional Support Group.
Control and Accounting Information Systems
Control and Accounting Information Systems
DPS 304 : Purchasing /Procurement Activities
Prepared by : Sudhir Mehrotra. Retail Shrinkage  Shrinkage is a part of the business no one likes to talk about. However, shrinkage plays a huge part.
Chapter 2 Skimming.
Retail Theft and Inventory Shrinkage Nalinrach Suksathaporn Pereya Suviwattanachai Sithiphon Suwanboriban.
Section 34.2 Handling Business Risks
Express Stores Reducing Shoplifting. The Problem What can Express #892 do to reduce shoplifting?
LOSS PREVENTION AND RETURN ON INVESTMENT Point of Sale Software and Video Integration.
Understand Merchandise Planning in Retailing. The Merchandise Plan A budgeting tool that helps retailer or buyer to meet department goals ▫Planned sales.
Operating a Retail Store Understand how to make a retail store operational.
Chapter 24 stock handling and inventory control Section 24.1
How JCPenney is Managing Corporate Risk
Register Disbursement Schemes
Chapter 16 Retail Security. Retail Establishment Crimes  Shoplifting.  Burglary.  Vandalism.  Bad checks.  Fraudulent credit cards.  Employee theft.
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
Rafrex LLC - RFID Solutions
IT Server Receiving Dock Compactor Employee Entrance Cash Office Power, Water & HVAC Controls Identity Theft Contact Hilco For An Enterprise Exposure Check-Up.
Head of IS Branch Assistant Director Business Operations Crime Input Unit Occupation Checks Unit Property & Logistics Information Governance Information.
Principles and Learning Objectives
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
Introduction to SAP R/3.
LOSS PREVENTION & RISK MANAGEMENT PROGRAM Loss Prevention Program A loss prevention program is helpful to promote the organization safe along with create.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
Developing and Applying Constructive Analytical Intelligence for Successful Loss Prevention Presented By King Rogers, CEO The King Rogers Group LLC.
Introduction to Business Organisations
Understanding Back-End Systems Chapter 9. Front-End Systems Front- end systems are those processes with which a user interfaces, and over which a customer.
Solution Overview for NIPDEC- CDAP July 15, 2005.
McGraw-Hill/Irwin Copyright © 2011 The McGraw-Hill Companies, All Rights Reserved Chapter 14 Enterprise Resource Planning Systems.
INFORMATION X INFO102: Management Information Systems CRM and SCM.
Copyright © 2012 Pearson Education
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Organized Retail Crime - Loss Prevention A major Issue in Retail Industry that’s continuously.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Retail and sales management Session 15. Learning from the session Store management/operations management Store management/operations management.
Richard Hollinger, Ph.D. Security Research Project 2005 National Retail Security Survey: Preliminary Report.
Risk Management Advanced Marketing Competencies: Develop strategies for reducing shrinkage from internal and external sources Explain importance of copyright,
Lesson 9: Security. Objectives  Calculate shrinkage based on merchandise book value and physical inventory counts  Give examples of internal and external.
Created By: Rohit SahajpalJames AasmanDamon GuardMatt HudonEric BlackMartin Matthiesen.
Section 16.1 Sales Transactions Chapter 16 using math in sales Section 16.2 Cash Registers Section 16.3 Purchasing, Invoicing, and Shipping.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Concepts in Enterprise Resource Planning Fourth Edition
Review 2 Chapters 4, 5, 6. What is the Internet? Global network, a network of networks.
Technology Supply Chain Management
Security Lesson 9. Objectives Calculate shrinkage based on merchandise book value and physical inventory counts Give examples of internal and external.
Chapter 24 Stock Handling and Inventory Control Section 24.1 The Stock Handling Process Section 24.2 Inventory Control Section 24.1 The Stock Handling.
Developing a E-Business Strategy Patterns of Entrepreneurship Chapter 10.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Marketing Essentials Chapter 16 Section 2.  After the sale is finalized, the sale is considered closed.  All cash registers provide three basic sales.
POS Integration with NVR Integration and Analytics.
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
MRI 2315 Warehousing and Distribution
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
What Is Enterprise Computing?
Discovering Computers 2010: Living in a Digital World Chapter 14
Make it Operational: Food Sales
Fashion Merchandising
andon Japanese term for a signaling system announcing problems
Concepts of Information Systems
MODULE 3 STORE MANAGEMENT.
INFORMATION SYSTEMS SECURITY and CONTROL
Demand Management, Order Management, and Customer Service
Order Fulfillment Along the Supply Chain and Other Support Services
Stallion Systems & Solution Pvt Ltd
Presentation transcript:

1 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf CITT C ENTRUM F ÜR I NFORMATIONS -T ECHNOLOGIE T RANSFER G MB H ED-BPM in the Retail Domain - Taking the Example of Fraud Management

2 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf AGENDA Definition of shrinkage Figures on global shrinkage Methods employed against shrinkage Challenges and potential for loss prevention Typical IT-landscape ED-BPM reference model

3 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN D EFINING THE T ERM ‘S HRINKAGE ’ 'Shrinkage' can be defined as loss of stock caused by one or a combination of crime administrative error, and wastage

4 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN F IGURES ON G LOBAL S HRINKAGE The Global Retail Theft Barometer 2008:  Total global shrinkage: >100 billion $  About 1.34% of the retail sales  Only ~ 50% of stock loss is considered to be „known“  Spendings for loss prevention: >1 billion $  Sectors differ greatly, loss calculation differs greatly Source:

5 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN M ETHODS E MPLOYED A GAINST S HRINKAGE PROCEDURES AND ROUTINES Annual stock loss awareness campaign Company-wide stock loss refresher training Customer returns & refund controls (operator and customer database) Damaged goods resale controls Employees exit searches Hot product identification Hot product management Hot products routine counting Security newsletter Internal key control Patrol routes for employees (red routes) Point of sale information or data checks Random till cash checks Rigorous delivery checking procedures Shelf replenishment techniques Induction training for new employees Unique till operator PIN numbers ‘Watertight’ product monitoring procedures PEOPLE AND PROCESSES Anonymous phone line Civil recovery Covert surveillance of customers or employees Employee awareness and training Employee stock loss training and education Employee incentives—discount purchase schemes Employee incentives—stock loss bonus schemes Employee integrity checks External compliance monitoring External security/loss prevention function External stock audit function Internal compliance monitoring Internal security/loss prevention function Internal stock audit function Random checks on distribution centre picking accuracy Store detectives Test purchasing (mystery shopper) Uniformed security guards EQUIPMENT AND TECHNOLOGY Automated ordering processes Cash protection tactics and equipment (both cash offices and tills) Company-wide stock loss awareness posters Dummy display cards in place of high-risk products E.A.S. hard tagging (recycled) E.A.S. soft tagging (disposable) E.A.S. source tagging (either disposable or recycled) Employee purchasing arrangements Employee panic alarms Employee uniforms without pockets Intruder alarm systems Non-active CCTV Point-of-sale camera monitoring Protector display cases applied by retail outlets R.F.I.D. intelligent tags on pallets, cases or items (radio frequency) Replenishment equipment to support techniques Secure lockers for employees Security-sealed containers/shippers Shoplifting and theft policy posters for customers and staff Specialist anti-theft display equipment DESIGN AND LAYOUT Appropriate product location strategies Designing-out blind spots Designing-out crime programme Distribution centre secure storage Employees entry/exit access control External security—fences, anti-ram raid, roll shutters Risk-based design and layouts Robust anti-theft packaging Single direction product flow Supply chain and logistics network design

6 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN C HALLENGES AND P OTENTIALS FOR L OSS P REVENTION Loss occurs on the whole supply chain Common data standards do not exist Rare cooperation between retailers and suppliers Rare use of electronic transaction data

7 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN T ECHNOLOGICAL F OUNDATION - K NOWN S IGNALING S TANDARDS Semantics ARTS NEAR (Notification Event Architecture for Retail) ARTS Video Analytics ARTS POSlog (formerly IXRetail) ARTS SOA Blueprint for Retail... Infrastructure IBM Store Integration Framework Microsoft Smarter Retailing Architecture Wincor Nixdorf Store Communication Framework WS-Eventing...

8 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN T YPICAL IT L ANDSCAPE IN THE R ETAIL D OMAIN Hard and software from different vendors Independent IT- Systems No common data standards between components and between enterprises Heterogeneous system landscape

9 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN T YPICAL IT L ANDSCAPE IN THE R ETAIL D OMAIN Sales-Data: x sales per hour y items per sale Customer-Data: Customer Counter Credit / Debit Cards Security-Data: Electronic Article Surveillance data RFID-tracking Customer position tracking Video surveillance data …... High amount of processed Data

10 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN T YPICAL IT L ANDSCAPE IN THE R ETAIL D OMAIN A variety of data pools Rare linking of the data with regard to fraud detection Post processing of particular data sources Video recordings Stock audit Till cash check ERP Data Customer Data Video StoragePOS Data Customer CounterRFID tracking De-central data pools

11 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN Conclusion:  A typical retail enterprise has: a big problem with shrinkage autonomous loss prevention systems a variety of different systems a huge amount of business data  Perfect basement for ED-BPM

12 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN T HE V ISION The Challenge and the Principle of ED-BPM – Reference Model

13 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN T HE V ISION Next steps for the workpackage:  Defining use-cases for fraud detection  Identifying business processes for loss prevention which can be managed by ED-BPM  Implementing a proof-of-concept

14 Thomas Paulus, CITT & Hendrik Scheider, Wincor Nixdorf ED-BPM IN THE R ETAIL D OMAIN T AKING THE E XAMPLE OF F RAUD M ANAGEMENT Questions / Answers?