Browse Definitions :
Definition

mass customization

Mass customization is the use of computer-aided manufacturing to enable custom, individualized output for the production of goods and services. Advances in manufacturing make it possible to enable customization at the same low cost per unit found in mass production.

Mass customization is most common in electronics but is offered increasingly in merchandise like clothing, shoes, furniture and other products.

There are four types of mass customization:

  • Collaborative customization - the needs of the customer are understood and followed as part of the manufacturing process.
  • Adaptive customization - a basic product is made for customers who then customize it to their needs.
  • Transparent customization - customers are provided with unique offerings without being told they are customized.
  • Cosmetic customization - products are offered in different formats to entice different customers.

Generally, customization of products occurs directly after the customer orders and adds their desired specifications. Differentiation of products produced in mass customization is pushed as far back in the manufacturing process as possible. Delaying differentiation until the end increases efficiency and allows for part of the process of manufacturing to be completed prior to ordering.

Mass customization can be seen as a form of collaborative engineering between manufacturers and customers. In this collaboration, the manufacturer seeks to offer its capacity for custom manufacture as a solution to customers while gaining the customers who might otherwise not have a product suited to their needs.

As a concept, mass customization is credited to Stan Davis, who coined the term in his 1987 book Future Perfect.

This was last updated in September 2017

Continue Reading About mass customization

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close