Browse Definitions :
Definition

click and collect

Contributor(s): Ivy Wigmore

Click and collect is a hybrid e-commerce model in which people purchase or select items online and pick them up in-store or at a centralized collection point. The hybrid model is designed to streamline the processes involved in making in-store purchases and payments.

Click and collect can save a significant amount of time when a customer is purchasing a lot of items. The model is becoming increasingly available -- and popular -- in supermarkets. Typically, the shopper selects the items online and specifies a convenient pick-up time slot. A personal shopper selects the items at an appropriate time and the customer picks them up curbside.

For larger or more expensive items, centralized collection points can make delivery to more locations possible by serving geographic areas at some distance from the retail facilities. It may be feasible, for example, to deliver multiple orders to a collection center serving a given area periodically when delivery to individual customers would be too expensive.

Click and collect is among the changes to the retail landscape attributed to the ongoing trend to e-commerce sometimes referred to as the Amazon effect. Another manifestation of that trend is an attempt on the part of retailers to make in-person shopping more compelling to consumers through efforts like proximity marketing.

The click and collect model will undoubtedly evolve over time. As more and more human labor is automated, it's likely that the personal shoppers will be replaced by robots. (See: robot economy) The professional services firm Deloitte predicts that by 2020, physical stores will exist only as showrooms for a retailer’s products, to help consumers with the research phase of the purchase journey.

This was last updated in June 2017

Continue Reading About click and collect

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close