Browse Definitions :
Definition

customer self-service (CSS)

Customer self-service is a type of electronic support that allows end users to use technology to access information and perform routine tasks without requiring the assistance of a live customer service representative.

CSS offers end users with 24-hour-a-day support and immediate access to information without having to wait for a customer representative. Ultimately, the success of a customer self-service initiative depends upon the quality and quantity of information available and the ease with which it can be accessed.

A more controversial enterprise benefit of customer self-service is the ability it affords an organization to gather personal information about the people who use it. Tracking and analysis software may be used to create a pseudonymous profile of the user for research and targeted marketing purposes.

Once the technology is set up, a self-service interaction can cost much less than a similar transaction with a live customer service representative. Customer self-service technologies include:

Web self service - the customer can access information and perform routine tasks over the Internet by searching a knowledge base or reviewing an FAQ.
Interactive voice response - the customer can interact with an automated telephony system to perform specific tasks, such as reporting a power outage.
Apps - the customer can interact with a software program on a mobile device to carry out specific tasks, such as check an account balance or transfer funds from one bank account to another.
Kiosks - the customer can perform specific tasks such as checking in at an airport by interacting with a small physical structure that houses a computer and display screen.
Self-checkout - the customer can scan, bag, and pay for purchases without human assistance.

See also: customer experience management

 

This was last updated in August 2013
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close