In the 1970s the United States encountered an “oil embargo” that dramatically curtailed people from being able to purchase gasoline for their vehicles. “No Gas Today” signs were everywhere. Gas rationing was imposed by only allowing car owners to buy gas based on whether the final numbers on their license plate was odd or even. This regulation simply resulted in many stolen license plates to allow car owners to buy gas on any day. The game was afoot, and the scarcity was overcome by what drives most human behavior: The drive to getting ahead of others. Today, waiting in lines for desirable things — usually now electronics or footwear — has has simply been replaced with waiting online to purchase those items. We are rarely forced to even be in-person to acquire the most sought-after commodities. However, that doesn’t prevent that “get-ahead” behavior from rearing its ugly head when a new item is driving up demand. As scarcity and demand increase, gaining the online advantage through automation has taken hold as shopping bots invade online retailers to purchase desirable items, then resell them on the secondary market. Recently, the latest high-demand sneaker drop, PS5, Nvidia GPU cards and Xbox all saw listings on resale sites before the actual drops happened, with prices well above their MSRPs. The bot writers readied their tools, and the “cooks” formulated their plans for how they were going to buy the items to fill the orders they already had. The bots started firing…
0 0 govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2021-05-04 10:12:002021-05-04 10:12:00Why Retailers Fail to Stop Shopping Bots
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email firstname.lastname@example.org