ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
5
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,465
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Encyclopedia of Security and Emergency Management
Retail Shrink: Shoplifting
other
Author(s):
Lauren R. Shapiro
Publication date
(Online):
October 09 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
5
Record
: found
Abstract
: not found
Article
: not found
the devil made me do it: use of neutralizations by shoplifters
Paul F. Cromwell
,
Quint Thurman
(2003)
0
comments
Cited
45
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Consumer misbehaviour: an exploratory study of shopliftin
Michele Tonglet
(2002)
0
comments
Cited
35
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Who actually steals? A study of covertly observed shoplifters
Dean Dabney
,
Richard Hollinger
,
Laura Dugan
(2004)
0
comments
Cited
16
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
October 09 2018
Pages
: 1-7
DOI:
10.1007/978-3-319-69891-5_56-2
SO-VID:
c92298ff-0151-4ee8-8a90-7cefc00d2d44
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Criminals: Terrorist
pp. 1
Criminals: Blue-Collar Crimes
pp. 1
Emergency Management: Working with Vulnerable Populations
pp. 1
Bribery
pp. 1
Investigations: Cybercrimes
pp. 1
Federal Emergency Management Agency
pp. 1
Insider Threat
pp. 1
Fire: Evacuation (Engineer Solutions)
pp. 1
Workplace Violence: Preparing, Mitigating, Responding, and Recovering from Active Shooter/Terrorist Threats
pp. 1
Emergency Management: Incident Command System
pp. 1
Investigations: Bank Fraud
pp. 1
High-Rise Buildings: Security for Residences and Offices
pp. 1
Maritime Security: Problems of Security Versus Safety Practices
pp. 1
Airport Security: Procedures in Secured Areas for TSA and Private Security
pp. 1
Residential Security: Gated Communities
pp. 1
Investigations: Negligence
pp. 1
Workplace: Hostile Environment
pp. 1
Cybersecurity: Policy
pp. 1
Personnel Security: Selection
pp. 1
Criminals: Suggestions to Improve Security Procedures
pp. 1
Natural Hazards: Pandemic Threats by Infectious Diseases
pp. 1
Fire: Service – Best Practices and Strategies
pp. 1
Emergency Management: Preparedness and Planning
pp. 1
Workplace: Sexual Harassment
pp. 1
Executive Protection
pp. 1
Fire: Prescriptive and Performance Based Design
pp. 1
Natural Hazards: Volcanic Eruptions
pp. 1
Emergency Management: Crisis Communication
pp. 1
SCADA
pp. 1
Emergency Management: Recovery
pp. 1
Investigations: Criminal
pp. 1
Emergency Management: Infant and Young Children Feeding in Emergencies
pp. 1
Retail Shrink: Shoplifting
pp. 1
Workplace Violence: Sex-Related Crimes (e.g., Rape, Sexual Assault)
pp. 1
Physical Security: Methods and Practices
pp. 1
Security: Concepts and Definitions
pp. 1
Natural Hazards
pp. 1
Natural Hazards: Volcanic Eruptions
pp. 1
Emergency Management: International
pp. 1
Maritime Security: Problems of Security Versus Safety Practices
pp. 1
Natural Hazards: Tsunamis
pp. 1
Natural Hazards: Pandemic Threats by Infectious Diseases
pp. 1
Law: Administrative
pp. 1
Personnel Security: Recruitment
pp. 1
Department of Homeland Security (DHS)
pp. 1
Emergency Management: Spontaneous Volunteers in Response to Disaster
pp. 1
Public-Private Partnerships: Training and Coordination in Disasters
pp. 1
Investigations: Employee Theft of Employer Property
pp. 1
Rail (Train) Security
pp. 1
Natural Hazards: Tornadoes
pp. 1
Investigations: Money Laundering
pp. 1
Maritime Security: Problems of Security Versus Safety Practices
pp. 1
Data Protection
pp. 1
Critical Infrastructure: Defense Industrial Base Sector
pp. 1
Security: Contract
pp. 1
Border Security
pp. 1
Retail Shrink: Employee Theft
pp. 1
Emergency Management: Evacuations
pp. 1
Workplace Violence: Factors Contributing and/or Facilitating
pp. 1
Workplace: Hostile Environment
pp. 1
Investigations (DNA – Fingerprint)
pp. 1
Fire: Prescriptive and Performance Based Design
pp. 1
EU Private Security Regulation
pp. 1
Emergency Management: Infant and Young Children Feeding in Emergencies
pp. 1
American Society for Industrial Security (ASIS)
pp. 1
Security Management
pp. 1
Emergency Management: Pets
pp. 1
Physical Security: Video Surveillance, Equipment, and Training
pp. 1
Terrorism: International
pp. 1
Geographic Information Systems (GIS) Applications in Emergency Management
pp. 1
Robots
pp. 1
Physical Security: Interior Applications – Doors, Access Control
pp. 1
Maritime Security: Acceptable Risks
pp. 1
Terrorism: Homegrown
pp. 1
Human-Made Disasters: Toxic Waste and Residences
pp. 1
Industrial Control System
pp. 1
Interviewing Adults: Communication at the Front Line
pp. 1
Terrorism: Domestic
pp. 1
Investigations: Accidents and Reconstructions
pp. 1
Investigations: Consumer Retail Shoplifting
pp. 1
Event Security
pp. 1
Security Guards: Academic and Training Programs
pp. 1
Critical Infrastructure: Commercial Facilities Sector
pp. 1
Workplace Violence: Intimate Partner Violence
pp. 1
Critical Infrastructure: Government Facilities Sector, (GFS)
pp. 1
Interviewing Children
pp. 1
Human-Made Disasters: Electric Power and Transit Linked Outages
pp. 1
Terrorism: International
pp. 1
Biometrics
pp. 1
Criminals: Motives
pp. 1
Critical Infrastructure: Transportation Systems
pp. 1
The Internet (Deep and Dark Web)
pp. 1
Critical Infrastructure: Transportation Systems
pp. 1
Corporate Security (Structure, Roles, Duties)
pp. 1
Criminals: Active Shooters
pp. 1
Maritime Security and Piracy: Effects of Armed Guards on Board
pp. 1
Criminals: Motives
pp. 1
Residential Security: Houses and Apartments, Public and Private
pp. 1
Investigations: Money Laundering
pp. 1
Natural Hazards: Earthquakes
pp. 1
Workplace Violence: Past and Current Employees
pp. 1
Hazardous Environmental Effects
pp. 1
Cultural Institutions Security (Art, Museums, Libraries, National Monuments)
pp. 1
Retail Shrink: Shoplifting
pp. 1
Investigations: Polygraph Use
pp. 1
Drones
pp. 1
Educational Institution Safety and Security
pp. 1
Emergency Management: Best Practices
pp. 1
Intrusion Detection Systems
pp. 1
Bus Security
pp. 1
Public-Private Partnerships: Port Security
pp. 1
Security: Hybrid
pp. 1
Fire: Prevention, Protection, and Life Safety
pp. 1
Cybersecurity: Incident Response
pp. 1
Machine Learning
pp. 1
Criminals: White-Collar Crimes
pp. 1
Investigations: Environmental Pollution Dumping
pp. 1
Investigations: Fraud
pp. 1
Investigations: Employee Theft of Employer Property
pp. 1
Critical Infrastructure: Critical Manufacturing Sector
pp. 1
Influence of Risk Perception on Event Risk Management and Decision-Making
pp. 1
Private Detectives
pp. 1
Machine Learning
pp. 1
Emergency Management: Infant and Young Children Feeding in Emergencies
pp. 1
Investigations: Employee Theft of Employer Property
pp. 1
Data Protection
pp. 1
Power of Arrest: Definition, Legal Justification, and Authority
pp. 1
Investigations: Polygraph Use
pp. 1
Emergency Management: Pets
pp. 1
Rail (Train) Security
pp. 1
Investigations: OSHA
pp. 1
Human-Made Disasters: Toxic Waste and Residences
pp. 1
Personnel Security: Training
pp. 1
Investigations: Fraud
pp. 1
The Internet (Deep and Dark Web)
pp. 1
Mercenary and Private Military Police: Need for, Jobs Performed, and Locations Used
pp. 1
Investigations: Employee Theft of Employer Property
pp. 1
Criminals: Cybercriminals
pp. 1
Critical Infrastructure: Emergency Services Sector
pp. 1
Personnel Security: Retention
pp. 1
Cybersecurity: Practice
pp. 1
Insider Threat
pp. 1
Investigations: Firearms
pp. 1
Physical Security: Exterior Application
pp. 1
First Responders: Police
pp. 1
Law: Specialized (REAL ID, OBIM, SAFETY Act)
pp. 1
Emergency Management: Recent Incidents That Contributed to Changes in Emergency Management Legislation and Procedures
pp. 1
Personnel Security: Hiring
pp. 1
Investigations: Terrorism
pp. 1
Public-Private Partnerships: Security Organizations
pp. 1
Investigations: Bank Fraud
pp. 1
Maritime Security and Piracy: Effects of Armed Guards on Board
pp. 1
Airport Security: Incidents That Changed Procedures
pp. 1
Law: Specialized
pp. 1
Investigations: Burglary
pp. 1
Criminals
pp. 1
Security: Proprietary
pp. 1
HAZMAT
pp. 1
Event Security
pp. 1
Workplace Violence: Intimate Partner Violence
pp. 1
Investigations: Sexual Assault
pp. 1
Workplace Violence: Assault
pp. 1
Investigations: Polygraph Use
pp. 1
Risk Analysis: National and International Standards
pp. 1
Investigations: Domestic (Matrimonial/Divorce)
pp. 1
Critical Infrastructure Protection
pp. 1
Tort: Property
pp. 1
Investigations: Polygraph Use
pp. 1
Security Guards: Authority and Power
pp. 1
Criminals: Terrorist
pp. 1
Security: Concepts and Definitions
pp. 1
Critical Infrastructure: Water and Wastewater Systems Sector
pp. 1
Machine Learning
pp. 1
Emergency Management: Shelter In-Place
pp. 1
Natural Hazards: Floods
pp. 1
Emergency Management: Crisis Management and Response
pp. 1
Physical Security: Best Practices
pp. 1
Private Detectives
pp. 1
Critical Infrastructure: Nuclear Reactors, Materials, and Waste Sector
pp. 1
Fire: Prevention, Protection, and Life Safety
pp. 1
Rail (Train) Security
pp. 1
Personnel Security: Recruitment
pp. 1
Fraud Risk Management: Using Fraud Analytics to Combat External and Insider Threats
pp. 1
Investigations: Terrorism
pp. 1
Internet of Things
pp. 1
Retail Shrink: Shoplifting
pp. 1
Critical Infrastructure: Transportation Systems
pp. 1
Cybersecurity: Preparedness
pp. 1
Security: Private
pp. 1
Police: Public Versus Private Policing
pp. 1
Homeland Security Act of 2002
pp. 1
Natural Hazards: Hurricanes, Cyclones, and Typhoons
pp. 1
Rail (Train) Security
pp. 1
Border Security
pp. 1
Physical Security: Interior Applications – Doors, Access Control
pp. 1
Celebrity Protection
pp. 1
Emergency Management: Recovery
Similar content
1,465
An Equity Theory Explanation of Bystanders' Reactions to Shoplifting
Authors:
Fred Fedler
,
Bert Pryor
Deviance and Respectability An Observational Study of Reactions to Shoplifting
Authors:
Darrell J. Steffensmeier
,
Robert M. Terry
Deterrent and Definitional Influences on Shoplifting
Authors:
Robert Kraut
See all similar