We are talking about installing 1KA application on user’s own server (eg. company) which then allows the service of 1KA online surveys.
In addition, it can also be locally installed on computer or laptop, in order to support off-line questionnaires for the purpose of computer assisted personal interviewing (CAPI), where the interviewer enters the respondent’s answers in the computer, which is not discussed at this point.
In this case, the user gets – in addition to the status of 1KA administrator – additional technical administrator status, which allows him the functionalities of 1KA system administration and some other options.
Advantages in this case are especially complete control over access, both in terms of people who have access, as well as in terms of technical safety. This is potentially a weakness, since assigned and professional 1KA server may offer greater security protection. Further disadvantage can be the fact that upgrades are carried out only when 1KA creates a new installation version, and the fact that in case of interventions complications are significantly higher.
Technical details of the installation on user’s own server are here >>.
It should also be noted that in cases where the installation is not complete (statistical package R ...), some of the more advanced features do not work.
Separate installation of administrative and user interface
In case of special security needs, double installation can be performed: 1KA is installed on two computers, one on the internal and one on the external network. The database is installed on an internal network, and the external installation is configured to write to that database (it cannot read everything - it can only read urgent matters such as the structure of a questionnaire). However, the administrative interface is completely removed from the external installation.
All surveys and settings that are configured through the internal installation are visible on the outside since the same database is used. But if anyone would like to collect data, they would not be able to do it from the outside, since they don't have the right to read the data. Because the external server also has its own IP, but does not have an admin interface, the latter cannot be accessed. The assumption, of course, is that the internal server is well protected.