Please enter your email address with which you are logged in and we will send you a password recovery link.
We will use and store the e-mail address to register on our website for the purpose of using the 1KA username and we will carefully protect it according to the regulations.
To activate your new password, please enter the data provided in e-mail you received.
If you still have problems finding our confirmation e-mail, you can contact us by e-mail email@example.com.
You won't be able to login into this webpage until you confirm your registration through e-mail!
You can set cookies, limit access and set a password for the survey questionnaire by clicking on the 'EDIT' - 'Settings' - 'Respondents access' tab.
1.) 'Cookie' is a code that is stored on the respondent’s computer by server-side (e.g. 1KA), so that the 1KA tool can authenticate a possible re-attempt of the respondent to fill out the survey. You can choose for how long the cookie will be stored. The following cookie options are available:
Choosing to have cookies stored for a longer period than just to until the end of the survey allows you to select what happens when the respondent returns to the survey:
For respondents that already completed the survey, you can provide with an option to re-edit their answers afterwards, thus changing the data and the analysis. Therefore, it is generally (but not always) better to mark the option that that respondents cannot re-edit their responses.
2.) The 1KA tool also enables recognition of respondents; however, only for registered users of 1KA. There are two options available:
The above examples are rare; the default option, of course, is that 1KA does not recognize the registered user of 1KA. Activation of this option could have serious consequences.
3.) Limitation of IP number.
To ensure that the same person does not fill out a questionnaire more than once, you have the option to block IP addresses. You can block the IP for 10, 20 or 60 minutes or for 12 or 24 hours. However, this means that if multiple users use one computer, you can prevent another user to access the survey. This option makes sense only in rare cases, for example for voting, where there is a risk that someone fulfilled the survey using a script. Of course, IP restrictions can be outsmarted and shown as that the respondents come from some fake addresses. In general, this is a risky option that does not solve the problem, it generates a risk of preventing a large number of valid users to fulfill s survey. Namely, it is often the case that a whole organization or unit with a lot of computers and potential respondents have the same IP number. More >>
4.) Access to survey with individual password.
Access to survey and identification of respondents can best be edited through passwords. To this end, each potential respondent is assigned with a password or code. Usually this code is then used in the email invitation, either automatically (in the URL of the survey) and the respondent is not required to enter it. Alternatively, you can request that the code be entered manually. Similarly, you can send them the code in a different way, for example via letter, and respondents re-type them. Using passwords is generally stronger and prevail over other settings to identify the respondents (cookie, IP number, identification of registered 1KA users), but interference can occur. Therefore, we strongly recommend that you use only one of the above mentioned methods for identifying respondents: cookie, IP number, identification of registered 1KA users or individual password.
You can create any number of passwords through which respondents will be able to access your survey. Password can be unified for all respondents, however you can send different passwords to respondents and thus separate them (e.g.by groups or organizations). A similar effect can be achieved by creating groups of respondents, where respondents are not asked for a password, because it is already implemented in the URL. In both cases, the base is, of course, uniform, but in both cases we cannot distinguish between respondents within a certain group, as we cannot connect identification data with the password.