SIGN UP FREE
Survey Templates Surveys Sharon

Sharon

Sharon


Section A: Demographic Particulars
Please tick in appropriate box.



1. Core business of your website.


2. The website is
3. What security technologies are you currently adopting?
4. How long have you been adopted the particular security technologies?
5.The consent will be obtained users when their personal information will be use for any purposes other than those described in policy
Section B:
The questions below ask about your opinion regarding to the performance of the security technologies. Based on your perception and understanding, please select the most appropriate opinion.

(i) Perceived Trust
1.Does the cookie expire after the user logged out from the portal?



2.Is the Cross-Site Forgery Protection applied to the website
3. How well the security technologies that you have adopted help in maintaining the information quality of the customers?
(ii) Compatibility

1. The security technologies is highly compatible with the types of web browser(e.g Opera, Nescape, Mozilla, Safari)

2.The website is not contain any vulnerability.
3.You believe in strong protection for DATA POISOINING
(iii) Perceived Risk

1.Does the cookie expires while the user logged out from the portal?
2.Users are required to reperform their submission if there is no respond from the users within a certain period.
3.The cookies that is send by your website will not harm the users’ computer system.
(iv) Perceived Ease of Use

1. How satisfied are you with your current security technologies?
2. Are the security technologies easily adopted?
3. Why did you choose this particular security technologies?
4. Do you upgrade the security technologies from time to time?
(v) Perceived Needs

1. Do you think there is a need to adopt additional security technologies?
2.The security technologies has help in increase the profitability of the company.
3.There is validation procedure for data that is being uploaded
Vi) Successful of Website Security

1. How well security technologies perform in protecting their customers' personal information?
2. Any unauthorized modifications to the information can be detected by the security technologies.
3. Can any party deny having made a previous transaction?

Related templates and questionnaires