Academia.eduAcademia.edu

Point of sales

description47 papers
group640 followers
lightbulbAbout this topic
Point of sales (POS) refers to the location and system where a retail transaction is completed, involving the process of capturing customer purchases, processing payments, and managing inventory. It encompasses both hardware and software components that facilitate sales transactions and enhance operational efficiency in retail environments.
lightbulbAbout this topic
Point of sales (POS) refers to the location and system where a retail transaction is completed, involving the process of capturing customer purchases, processing payments, and managing inventory. It encompasses both hardware and software components that facilitate sales transactions and enhance operational efficiency in retail environments.

Key research themes

1. How do point-of-sale (POS) marketing and display strategies influence consumer behavior and product sales?

This research theme investigates the specific tactics used by retailers and manufacturers at the point of sale to affect consumer purchase decisions and product visibility. Understanding these strategies is critical for optimizing sales outcomes and complying with regulatory requirements, especially in sectors with advertising restrictions.

Key finding: This study found that IQOS heat sticks (HEETS) were marketed at POS with prominent product displays positioned at higher and more noticeable placements compared to other tobacco products, often near youth-oriented... Read more
Key finding: The article demonstrated that cross-selling at POS is evolving from personal sales interactions to leveraging customer data and CRM analytics to identify timely product offers, enhancing the firm's share of customer wallet... Read more
Key finding: This work presented an automated POS system integrating facial recognition to identify customers and tailor product recommendations and sales promotions based on purchase history. This innovation illustrates how technology... Read more
Key finding: The paper developed a POS application focused on inventory management to support SMEs, linking sales transaction data with stock control to reduce stock-outs and overstocks. This integration at POS allows businesses to... Read more

2. What roles do technological innovations and integrations in POS systems play in enhancing retail efficiency and customer experience?

Research in this area explores how advances in POS technology, such as system integration, automation, and analytics, contribute to streamlining retail operations, improving inventory control, and enriching customer engagement. This theme is vital for understanding how technological progress drives both operational and experiential improvements in retail contexts.

Key finding: This article highlighted how cafe POS ecosystems with features such as customizable ordering, inventory tracking, and integration with loyalty programs improve operational efficiency and guest satisfaction. Advanced analytics... Read more
Key finding: The feasibility study concluded that web-based POS systems can significantly benefit SMEs by improving record-keeping, inventory management, and sales tracking, despite current infrastructural and technological challenges.... Read more
Key finding: By integrating facial recognition and database management at POS, this research showcased how automation can facilitate personalized customer interactions and targeted sales promotions, illustrating an advanced application of... Read more
Key finding: The study designed a Laravel-based POS solution tailored to streamline inventory and sales reporting for small and medium enterprises, improving decision-making and operational control. This technical approach demonstrates... Read more

3. How does spatial design and consumer psychology at the point of sale affect communication effectiveness and customer behavior?

This theme examines the impact of physical environment factors such as space allocation, crowding, personal space occupancy, and store layout on consumer psychological states and communication dynamics within retail settings. Insights here inform design decisions that optimize shopper comfort, engagement, and ultimately, purchase behavior at POS.

Key finding: The paper introduced a novel Personal Area Ratio (PAR) formula incorporating the number of consumers to assess crowding effects. It found that both Floor Area Ratio (FAR) and PAR significantly influence consumer perceptions... Read more
Key finding: This study revealed that in-store smartphone use creates an ethical dilemma for consumers torn between purchasing at the physical store or online. Ethical judgment factors influence this decision, affecting sales leakage in... Read more

All papers in Point of sales

In this modern-day, various sectors of business have experienced and still experiencing vast advancements in technologies. We often refer to the present age as the tech age. With the evolving technological advancements, financial... more
Artificial Intelligence (AI) is widely celebrated as a powerful security tool, but it can also become a hidden insider threat. This article explores overlooked vulnerabilities in AI systems, including data poisoning, hidden neural network... more
I still remember my first big security audit at a university network years ago. We were proud of the firewalls, the intrusion detection, and the next-gen antivirus. Everything looked solid until one night, a script we'd automated started... more
Practical cryptography represents one of the most important aspects of information security. One of the most important elements of cryptography is Secure Sockets Layer (SSL) protocol, which is the most widely deployed security protocol,... more
Critical energy infrastructure—including power generation plants, electricity transmission grids, pipelines, and refineries—has emerged as a prime target for cybercriminals, hacktivist groups, and nation-state actors. The rapid digital... more
The paper examined the impacts of financial inclusion and e-payments on economic growth in Nigeria using quarterly data from 2009Q1 to 2021Q4. The paper contributes to the ongoing debate by establishing the growth-inducing e-payment... more
We have wasted almost a century by not building a science of ZPE state / fluctuations, which appears to be the fountainhead of discovery in science. The most valuable instruments available to science at this juncture of time are human... more
Zero-day attacks remain one of the most formidable cybersecurity challenges due to their ability to exploit previously unknown vulnerabilities before developers can deploy patches. These threats can result in significant financial,... more
The IT Hardware Management System (ITHMS) is a centralized asset management platform designed to streamline IT hardware tracking, maintenance scheduling, and security enforcement within an organization. The system automates inventory... more
This paper explores the integration of artificial intelligence (AI) and cloud technologies in the hospitality industry to enhance security and privacy. It examines AI applications such as facial recognition for secure room access,... more
Penelitian ini bertujuan untuk menilai efektivitas aplikasi TukuPOS dalam mendukung pengelolaan produk, stok, dan transaksi penjualan bagi pelaku UMKM. Usability yang buruk dapat menghambat penggunaan aplikasi, terutama dalam hal... more
The title of the paper should be typed in bold letters, centered and fully capitalised. Author (s) name, designation, affiliation (s), address, mobile/landline number (s), and email/alternate email address should be given underneath the... more
Vulnerabilities and weaknesses of web applications are targeting by attackers. Therefore, penetration testing techniques are very important for building strategies which make the system is secure. This paper proposes a penetration testing... more
Sistem pemesanan menu makanan yang ada di Restoran Mesra masih menggunakan cara yang biasa, untuk melakukan pemesanan pelanggan datang lalu pelayan mengantarkan daftar menu dan pelayan masih mencatat pesanan pelanggan secara manual... more
Security software provides a comprehensive suite of features designed to protect computer systems, networks, and data from various threats.
"Background: “Cigarettes and Other Tobacco Products Act (COTPA)” has been formulated to control tobacco epidemic. This study was conducted to assess level of awareness of COTPA among vendors and compliance at point of sale. Methods: In... more
Mesin kasir portable telah mengubah cara bertransaksi bagi banyak bisnis, termasuk usaha kecil dan menengah. Kemudahan penggunaan, fleksibilitas, dan kemampuan untuk digunakan di mana saja membuat mesin kasir portable menjadi pilihan... more
Csmart Billing pioneers' innovation to revolutionize revenue management for businesses. This dynamic solution revolutionizes how businesses manage revenue complexities, boosting operational efficiency seamlessly. Integrated with essential... more
The In an age characterized by rapid technological evolution, the landscape of software tools and applications is undergoing a profound transformation, driven by the proliferation of modern user interface (UI) designs and the rise of... more
Latest technologies of voice over IP (VoIP) and mobile messaging for smartphones messengers such as WhatsApp, Viber, Skype, etc., offer free-of-charge facilities of worldwide SMS, MMS, and voice calls to their users, unlike the... more
The Internet of Things (IoT) is a platform of uniquely identifiable connected devices which is changing healthcare in a variety of ways. There is much hype and interest in using it to advance medicine, primary care, surgery, medical... more
QR codes, a form of 2D barcode, allow easy interaction between mobile devices and websites or printed material by removing the burden of manually typing a URL or contact information. QR codes are increasingly popular and are likely to be... more
Practical cryptography represents one of the most important aspects of information security. One of the most important elements of cryptography is Secure Sockets Layer (SSL) protocol, which is the most widely deployed security protocol,... more
Phishing is a fraudulent activity that includes tricking people into disclosing personal or financial information by impersonating a legitimate company or individual. The increasingly complex nature of phishing has drawn the attention of... more
Phishing is a fraudulent activity that includes tricking people into disclosing personal or financial information by impersonating a legitimate company or individual. The increasingly complex nature of phishing has drawn the attention of... more
BUMDES Masyarakat Madani Sejahtera is a business entity initiated by Desa Janti in Sidoarjo- East Java. However, recently BUMDES has an issue for not being able normally operate and provide financial statement as it used to. BUMDes has a... more
Communication at the point of sales is determined by a number of factors ranging from the layout of the furnishings to the establishment’ colors, sounds, and even smells. Nevertheless, another main aspect to consider, particularly... more
Considering the NATO and EU membership and in the context of new cyber threats, ensuring the security of information and communication systems has become a priority for both public institutions, private companies and the Romanian Army. In... more
Quick-response (hereafter QR) codes are an effective way to get information across to people, as every phone in people's pockets include QR code scanning functionality. Despite the fact we see these simple and harmless looking barcodes... more
Internet of things (IoT) is a hot topic for study in the last decades. IoT is the internet working of physical devices, vehicles and other objects which consists of an embedded system with sensors, actuators and network connectivity that... more
The availability of parking lots being unresolved problems on the campus of Trisakti University because of the many civitas akademika which carries cars and limited parking. Parking system in use today is still the conventional with the... more
The Aim and Objectives We are to shift our goal post from the manufacture of a fantastic Humanoid. Our goal is to humanize the Artificial Devices of Intelligence (ADI) keeping in focus the device in resonance with the emerging paradigm... more
This study looks at the experiences of organizations that have fallen victim to ransomware attacks. Using quantitative and qualitative data of 55 ransomware cases drawn from 50 organizations in the UK and North America, we assessed the... more
menjadi tempat penelitian penulis. Beberapa masalah yang ada antara lain, sistem reservasi meja dan pemesanan menu pada Warung Ayam Penyet Bu Ani masih menggunakan sistem manual, proses pemesanan menu yang tidak terintegrasi dengan nomor... more
In an exploratory quasi-experimental observational study, 138 participants recruited during a university orientation week were exposed to social engineering directives in the form of fake email or phishing attacks over several months in... more
Enterprises own a significant fraction of the hosts connected to the Internet and possess valuable assets, such as financial data and intellectual property, which may be targeted by attackers. They suffer attacks that exploit unpatched... more
As individuals increasingly engage with the digital landscape, they face a multitude of risks associated with their online activities and the security of their personal information. Individuals seek guidance in balancing the benefits and... more
development of the business world encourages companies to always try to improve the quality of products and services to consumers. The implementation of these business solutions is a commitment in increasing the competitive advantage of... more
Ransom ware is type of Cyber malware which is used by attacker to block the computer system until some ransom is paid by victim .It propagates by malicious email attachments, links offering free software internet downloads etc.During... more
The rise of generative artificial intelligence (AI) has ushered in a new era on the internet. With algorithms capable of generating original content across various mediums, such as text, images, and video, AI-powered chatbots like ChatGPT... more
Running a successful cafe requires more than just serving delicious food and beverages. It also involves managing various aspects of the food industry efficiently to provide a seamless guest experience. With the advent of advanced... more
Data breach has become one of the serious problems in recent years as with the increase in technology the threat of data security is increasing. This paper mainly focuses on giving information about causes of data spill and prevention... more
Healthcare Read time: < 4 minutes 4 Almost three quarters of security incidents in healthcare in 2015 involved physical theft and loss, insider and privilege misuse and miscellaneous errors. While breach data was typically compromised... more
Privacy and Security are two major challenges faced by users on social media today. These challenges are experienced in diverse ways and forms by different types of users across the web. While technological solutions are usually... more
Data breach has become one of the serious problems in recent years as with the increase in technology the threat of data security is increasing. This paper mainly focuses on giving information about causes of data spill and prevention... more
Ransom ware is type of Cyber malware which is used by attacker to block the computer system until some ransom is paid by victim .It propagates by malicious email attachments, links offering free software internet downloads etc.During... more
Download research papers for free!