Browse Definitions :
Definition

customer self-service (CSS)

Customer self-service is a type of electronic support that allows end users to use technology to access information and perform routine tasks without requiring the assistance of a live customer service representative.

CSS offers end users with 24-hour-a-day support and immediate access to information without having to wait for a customer representative. Ultimately, the success of a customer self-service initiative depends upon the quality and quantity of information available and the ease with which it can be accessed.

A more controversial enterprise benefit of customer self-service is the ability it affords an organization to gather personal information about the people who use it. Tracking and analysis software may be used to create a pseudonymous profile of the user for research and targeted marketing purposes.

Once the technology is set up, a self-service interaction can cost much less than a similar transaction with a live customer service representative. Customer self-service technologies include:

Web self service - the customer can access information and perform routine tasks over the Internet by searching a knowledge base or reviewing an FAQ.
Interactive voice response - the customer can interact with an automated telephony system to perform specific tasks, such as reporting a power outage.
Apps - the customer can interact with a software program on a mobile device to carry out specific tasks, such as check an account balance or transfer funds from one bank account to another.
Kiosks - the customer can perform specific tasks such as checking in at an airport by interacting with a small physical structure that houses a computer and display screen.
Self-checkout
- the customer can scan, bag, and pay for purchases without human assistance.

See also: customer experience management

 

This was last updated in August 2013
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close