Visitor survey (exit survey)

Service content

Survey for customers who made purchases

Investigators conducted a questionnaire interview survey for visited customers. We can improve the problems and revitalize our store by quantifying data lifestyle, shopping actual situation, purpose of use, visit reasons, satisfaction level, usage situation of other shops, and so on.

----- Provided output (example) -----

● Survey data aggregation < br > ● Input and tabulation of contents that are constantly collected at stores and the Internet
● Keyword detection of free comments from planning questionnaire items
● Various data processing such as cross tabulation

Discuss the survey method according to the purpose

The survey items can be customized according to the survey purpose and needs of the company or store you requested.

As a valuable material for management decisions

The data collected and analyzed by customers who make purchases can be used as an important input factor for management decisions.

Professional group of mask investigation. Trusted AJIS Research


Recommended service

"Handling of personal information"
(1) Name or name of the business operator
AJIS Co., Ltd.
(2) Personal information protection manager
Managing Director Hiroyuki Yamane, General Manager of Administration Division
(3) Purpose of use
To answer your inquiry.
(4) About provision to a third party
The acquired personal information will not be provided to a third party except as required by law.
(5) About outsourcing of handling
We will not outsource all or part of the handling of the acquired personal information.
(6) Disclosure of personal information subject to disclosure and contact point for inquiries
At the request of the person himself / herself, notification / disclosure / correction / addition / deletion / suspension / deletion of the purpose of use of the personal information subject to disclosure and suspension of provision to a third party (“disclosure, etc.” It is called). The contact point for disclosure, etc. will be the department inquired.
(7) Acquisition of personal information by a method that the person cannot easily recognize
We automatically collect access information obtained using cookie and web beacon technology.