Skip to main content

Primary research data analysis - topic questions

Section 2 of my questionnaire focused on how people are engaged with services in general, and what are the reasons in favour or against services provided over the Internet.

 

Figure 2.1 shows most of respondents prefer to engage with a service either online or in person. 

Forms response chart. Question title: 2.1 What is your preferred way to use a service. Number of responses: 19 responses.

While the most important factor that defers potential web service customers are errors within application followed by numerous options (Fig. 2.3), there is no major factor that encourage customers to use web based service (Fig 2.2).

Forms response chart. Question title: 2.2 What is the most beneficial aspect of using web service for you?. Number of responses: 19 responses.

Forms response chart. Question title: 2.3 What is the biggest disadvantage of web services in your opinion?. Number of responses: 19 responses.

 

Question 2.4 intended to recognize variety of web services used by respondents, and at least half of respondents are using all provided options except online appointments.

Forms response chart. Question title: 2.4 What kind of services online are you using? (mark all relevant). Number of responses: 19 responses.

Section 3 focused on data privacy and how happy are respondents to provide various information to service provider.

Types of information were split into 4 groups:

  • Full name - which is considered private but not sensitive data;
  • Phone number or home address - majorly information that could not be anonymised and strongly linked with an individual;
  • Email or social media - easily anonymised information;
  • Bank card details - strictly sensitive data.

 Forms response chart. Question title: 3.1 How happy are you to give online service providers your full name?. Number of responses: 19 responses.Forms response chart. Question title: 3.2 How happy are you to give online service providers contact details like phone number or home address?. Number of responses: 19 responses.

Forms response chart. Question title: 3.3 How happy are you to give online service providers contact details like email address or social media?. Number of responses: 19 responses.

Forms response chart. Question title: 3.4 How happy are you to give online service providers bank card details for payment purposes?. Number of responses: 19 responses.

This section could be concluded by identifying respondents would like to provide their name, social media/email, phone/home address and bank details in order from most happy to most discouraged. 

Set of information has another hidden factor that could influence how happy person is to provide their data - awareness of purpose. Most often service providers gather more data that they need to provide with a service. Out of 4 categories, usually most essential is ability to contact customer back (email) and for customer - ability to pay (bank details). Within this survey, clear purpose of collected data have minor to none impact on respondents.


Final section 4 seek for factors that make customers feel safe within the web application.

Most important factor for respondents is safe, encrypted HTTPS connection with a service.

Forms response chart. Question title: 4.2 Website is using encrypted connection (HTTPS). Number of responses: 19 responses.

Second factor that makes service look trusted is ability to contact staff within application.

Forms response chart. Question title: 4.4 You can easily contact staff e.g. customer support. Number of responses: 19 responses.

Most of web services have long and difficult to understand policies or terms of use. Some of services approach customers with brief and clear statements summarising their policies and practises. Respondents find that practise as a 3rd most important factor.

Forms response chart. Question title: 4.3 Clear and short privacy policy is provided to you. Number of responses: 19 responses.

The next factor is trust to known brands, and final, least important - email signed with domain. 

Forms response chart. Question title: 4.1 You know the company or it is widely known. Number of responses: 19 responses.

Forms response chart. Question title: 4.5 Company is using email address signed with their domain e.g. support@yourshop.ex instead of your_shop_26@gmail.com. Number of responses: 18 responses.

To conclude section 4, the most and least important factors for respondents are similar. While unencrypted websites have no additional protection, service providers using external email providers usually still are using trusted services e.g. Gmail from Google, that by default are encrypted. However, beside encryption both SSL certificate for a website over HTTPS and DKIM key for domain-signed email has another purpose. Both SSL and DKIM keys are valid only if provided by recognized organisation, that is to ensure customer has received data from verified source. That observation could imply that part of respondents are neither considering nor being aware of possible phishing attack.

Comments

Popular posts from this blog

Computer Ethics

The invention of computers was undeniably significant milestone for civilisation. Creation of that extensively versatile and multipurpose device was an advancement that commenced a new age - Information Age - in a history of humankind. However with new possibilities, new threats follows: cyber crime, cyber terrorism or cyber war. Computer ethics consists of rules, practices and areas that should be taken into consideration while designing, implementing and using information and communication technologies. It was a predecessor to ICT related legislation and expands current legal obligations for every individual involved.  The first of computer ethics commandments says: "Thou shalt not use a computer to harm other people".   Often ethic codes are assigned to activities that have potential to be unethical, and within computer sciences the first thought is majorly hacking. In general, hacking refers to activities leading to acquire access to systems or data without permission...