Table 2. The summary of the results of the survey.

No. Results
1 Over half of the students (38 out of 53 students) already knew the term: customized services. 38 out of 53 students responded, “Yes” to the question.
2 75.5% of the students responded that they were currently using customized services. YouTube is a customized service respondent most often use (29 out of 40 students), followed by various OTT services, Instagram, online clothing stores, and delivery services.
3 Although the recommendations and algorithms are convenient and useful, they cause concerns about personal information exposure.
4 64.2% of the respondents answered that customized services are “only needed for some services.”
5 On a scale of 1 to 5, 1 is customized services and 5 is privacy. 22.6% chose 1 and 2, 41.5% chose 4 and 5, and 35.8% stayed neutral (the two values are equally important). Twice as many people claimed that their privacy was more important than the service.
6 26.4% answered unfair while 24.5% answered fair. 49.1% selected neutral, meaning they think it is partially fair yet unfair at the same time. Majority of users are not as unwilling to share their information with the companies.
7 Over half of the participants (56.6%) responded that they had already felt that their personal information had been leaked. It proves the anxiety and instability the services induce.
8 Over 90% of the respondents answered that they do not read the terms and conditions agreement (TOS) before using the service. The reason for this: “it was too long”, “knew they would eventually use the service regardless of the terms”.
9 Only 39.6% responded that they were familiar with the collection of data performed by metaverse platforms.
10 60.3% responded that they were unwilling to the platforms to take their physical data, while only 13.2% responded willingly. No one answered that they were ‘absolutely’ willing to offer physical body information.
11 44 respondents stated, “Other third parties freely using my information,” followed by “data leaking,” “vulnerability under hackers,” “imposters,” and “stalking.”