Challenges in Implementing Scan and Go Technology in Point of Sale (POS) Systems
Keywords:
Scan and Go, POS Systems, Retail Technology, Self-CheckoutAbstract
By enabling customers to capture items with their phones or store-provided devices and complete their purchases without waiting in checkout lines, capture and Go technology is transforming the retail industry. Still, it is clearly difficult to apply it. As self-checkout systems raise the likelihood of larceny, theft, and fraud, main issues with them are related to these areas. Many big companies, for example, modified their Scan and Go offers in reaction to losses from erroneously scanned or unscanned items. Another challenge is system integration; many retailers rely on antiquated POS systems requiring costly modifications to embrace these technologies. Customer acceptability is another issue since some of them find the procedure difficult or demanding while others feel wonderful using self-checkout. Particularly in big locations without sufficient network coverage, store connectivity problems may cause scanning problems disturbing consumers. Furthermore increasing consumer confidence guarantees transaction security and payment rule compliance.For businesses looking for frictionless checkout systems with the right mix of technology and instruction for users, Scan and Go has been a positive answer. As retailers adjust their strategy to balance efficiency, security, and convenience, this technology has the power to alter customer purchasing experiences and hence affect the direction of retail.
Downloads
References
Angeles, Rebecca. "RFID technologies: Supply-chain applications and implementation issues." Information systems management 22.1 (2005).
Ellram, Lisa M., Bernard J. La Londe, and Mary Margaret Weber. "Retail logistics." International Journal of Physical Distribution & Materials Management 19.12 (1989): 29-39.
Anusha Atluri. “The Revolutionizing Employee Experience: Leveraging Oracle HCM for Self-Service HR”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 7, no. 2, Dec. 2019, pp. 77-90
Weinstein, Ron. "RFID: a technical overview and its application to the enterprise." IT professional 7.3 (2005): 27-33.
Curtin, John, Robert J. Kauffman, and Frederick J. Riggins. "Making the ‘MOST’out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID." Information Technology and Management 8 (2007): 87-110.
Arvidsson, Viktor, Jonny Holmström, and Kalle Lyytinen. "Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use." The Journal of Strategic Information Systems 23.1 (2014): 45-61.
Zhu, Xiaowei, Samar K. Mukhopadhyay, and Hisashi Kurata. "A review of RFID technology and its managerial applications in different industries." Journal of Engineering and Technology Management 29.1 (2012): 152-167.
Yasodhara Varma Rangineeni. “End-to-End MLOps: Automating Model Training, Deployment, and Monitoring”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 7, no. 2, Sept. 2019, pp. 60-76
Attaran, Mohsen. "RFID: an enabler of supply chain operations." Supply Chain Management: An International Journal 12.4 (2007): 249-257.
Prater, Edmund, Gregory V. Frazier, and Pedro M. Reyes. "Future impacts of RFID on e‐supply chains in grocery retailing." Supply Chain Management: An International Journal 10.2 (2005): 134-142.
McFarlane, Duncan, and Yossi Sheffi. "The impact of automatic identification on supply chain operations." (2003): 1-17.
Hunt, V. Daniel, Albert Puglia, and Mike Puglia. RFID: a guide to radio frequency identification. John Wiley & Sons, 2007.
Tofail, Syed AM, et al. "Additive manufacturing: scientific and technological challenges, market uptake and opportunities." Materials today 21.1 (2018): 22-37.
Anusha Atluri. “The Security Imperative: Safeguarding HR Data and Compliance in Oracle HCM”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 7, no. 1, May 2019, pp. 90–104
Delen, Dursun, Bill C. Hardgrave, and Ramesh Sharda. "RFID for better supply‐chain management through enhanced information visibility." Production and operations management 16.5 (2007): 613-624.
Schmidt, Albrecht, et al. "XMark: A benchmark for XML data management." VLDB'02: Proceedings of the 28th International Conference on Very Large Databases. Morgan Kaufmann, 2002.
Chen, Wei-Dar, et al. "Using 3G network components to enable NFC mobile transactions and authentication." 2010 ieee international conference on progress in informatics and computing. Vol. 1. IEEE, 2010.
Siyal, Asad Ali, et al. "Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives." Cryptography 3.1 (2019): 3.