Skip to main content

Help us improve the Digital Marketplace - send your feedback

IF

Research user needs, risks and opportunities

User needs are important, and we think beyond individual users to consider who else might be impacted like colleagues or communities.

We use design research to inform our thinking and inspire new ideas. It’s never just about validating an approach, but about researching what could be.

Features

  • Introductory and advanced workshops and learning exercises
  • Map stakeholders and service journeys
  • Identify, prioritise and test assumptions and hypotheses
  • Design, ethnographic and quantitative research
  • Research trends in emerging technologies and business models
  • Prototyping to inform research
  • User needs and actionable insights
  • Identify and prioritise risks and opportunities

Benefits

  • Inputs from global leaders in trustworthy service design
  • Increased alignment across team and with senior stakeholders
  • Capability building within teams
  • Validated approach with user and stakeholder testing
  • Insights from a diversity of different users
  • Prioritised recommendations for next steps
  • Ways to measure progress aligned with product and organisational metrics
  • 8+ years experience working with leaders on data, digital, AI
  • Experience with public, private and third sectors

Pricing

£600 to £2,500 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sarah@projectsbyif.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 5 7 8 2 9 1 2 4 8 6 1 6 0 1

Contact

IF Sarah Gold
Telephone: 07853813684
Email: sarah@projectsbyif.com

Planning

Planning service
Yes
How the planning service works
At the kickoff of any project we agree what project success, and failure, looks like for that specific engagement. We use our expertise, our Responsible Technology by Design methodology, and horizon scanning to help understand and prioritise potential trust issues and 'watch outs' we should consider in the work.

We develop our plans, work, research and outputs with you. Prioritising collaboration, working as one team, and delivering meaningful value.

We jointly agree ways of working with clients. We set up regular project check-ins and escalation points at multiple levels and provide ongoing visibility of the work to reduce the chance of issues derailing the project.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
IF works with our clients to ensure all prototypes, products, services, and systems are properly handed over. We research and understand the user needs for our outputs, just as we do for other parts of our work. As part of our handover process at project end we provide full documentation, handover sessions with key stakeholders, and can help in creating a ‘Hello World!’ document for the project with frequently asked questions.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
Our delivery teams ensure all areas of Quality Assurance are met when delivering projects whether they be learning workshops, prototype services or implemented code.

We jointly agree ways of working with clients. We set up regular project check-ins and escalation points at multiple levels and provide ongoing visibility of the work to reduce the chance of issues derailing the project.

We use a number of agile project/code management tools and can adapt to any client specific tools. We work with you to ensure your project passes any necessary Service Assessments at each stage of the project (Discovery, Alpha, Beta).

Security testing

Security services
Yes
Security services type
Other
Other security services
  • System design consultancy including privacy preserving techniques; planning for failure
  • Threat modelling, including individual, organisational and societal risks and harms
  • Machine learning that is responsible-by-design, eg understandable, transparent, accountable
  • Verifiable data implementation including continuous auditing and monitoring
  • Synthetic data for use in research, development and testing
  • Certified security testers

Ongoing support

Ongoing support service
Yes
Types of service supported
Hosting or software provided by your organisation
How the support service works
All projects have agreed ways of working that include client management and escalation paths for support issues.

Only emergency support issues can be addressed outside of business hours. Our hours of business are 1000-1800 Monday to Thursday, excluding public holidays. Services will be provided remote-first.

Service scope

Service constraints
No

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are dependent on priority level and agreed with the client as part of project kickoff and ways of working. Typically high priority questions will be addressed same-day.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
We provide all projects with a dedicated Project Lead to triage support. Levels of support for services depend on the services being used, the requirements of the client/project and are collaboratively agreed with each engagement. Please enquire for further details using the clarifications process.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
We have been certified by Google, Meta, TikTok

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

IF is, and always has been, a woman, ethnic-minority owned and led business. We are proud that 50% of our workforce, and the majority of our management team, are women. We have diversity built into the core of our business offering and operations.

We know that more diversity in our team means better work and outcomes for our clients and, ultimately, their users. That’s why we make sure that we have policies and behaviours within the organisation that support people from minority backgrounds to help set them up for success. This includes diversity, equity and inclusion policies, equal opportunities, grievance procedures, bias checked recruitment and workplace adjustments.

During projects we make sure that Project Leads have the support they need to manage healthy and inclusive team practices, with clear escalation should psychological safety be in jeopardy.

Our work and research exposes the needs and gaps in DEI within research and current technology. IF looks to bridge these gaps so that technology is trusted by everyone, especially historically unheard groups.

Pricing

Price
£600 to £2,500 a unit a day
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sarah@projectsbyif.com. Tell them what format you need. It will help if you say what assistive technology you use.