Background: Internet is becoming an increasingly common tool for survey research, particularly among “hidden” or vulnerable populations, such as men who have sex with men (MSM). Web-based research has many advantages for participants and researchers, but fraud can present a significant threat to data integrity.
Objective: The purpose of this analysis was to evaluate fraud detection strategies in a Web-based survey of young MSM and describe new protocols to improve fraud detection in Web-based survey research.
Methods: This study involved a cross-sectional Web-based survey that examined individual- and network-level risk factors for HIV transmission and substance use among young MSM residing in 15 counties in Central Kentucky. Each survey entry, which was at least 50% complete, was evaluated by the study staff for fraud using an algorithm involving 8 criteria based on a combination of geolocation data, survey data, and personal information. Entries were classified as fraudulent, potentially fraudulent, or valid. Descriptive analyses were performed to describe each fraud detection criterion among entries.
Results: Of the 414 survey entries, the final categorization resulted in 119 (28.7%) entries identified as fraud, 42 (10.1%) as potential fraud, and 253 (61.1%) as valid. Geolocation outside of the study area (164/414, 39.6%) was the most frequently violated criterion. However, 33.3% (82/246) of the entries that had ineligible geolocations belonged to participants who were in eligible locations (as verified by their request to mail payment to an address within the study area or participation at a local event). The second most frequently violated criterion was an invalid phone number (94/414, 22.7%), followed by mismatching names within an entry (43/414, 10.4%) and unusual email addresses (37/414, 8.9%). Less than 5% (18/414) of the entries had some combination of personal information items matching that of a previous entry.
Conclusions: This study suggests that researchers conducting Web-based surveys of MSM should be vigilant about the potential for fraud. Researchers should have a fraud detection algorithm in place prior to data collection and should not rely on the Internet Protocol (IP) address or geolocation alone, but should rather use a combination of indicators.
The internet is becoming an increasingly common tool for survey research [- ]. Online instruments present opportunities to recruit “hidden” or vulnerable populations that have previously been difficult to reach, including men who have sex with men (MSM), people who use drugs, and transgender people [ , - ]. Internet-based research allows for anonymity and decreases barriers for participants. The confidentiality and distance from the researcher provided with Web-based data collection creates a space for participants, especially those who are part of a stigmatized population, to provide information honestly and with less apprehension [ , , , , ]. Furthermore, Web-based methods may be more appropriate and effective in reaching communities that are highly active on the Web, such as MSM who use social and sexual networking websites and dating and sexual mobile phone apps [ ]. Internet as a data collection tool also allows researchers to reach geographically dispersed populations [ , ] and minimizes cost to researchers, providing an effective, cost-efficient method to recruit and collect data from hard-to-reach populations [ , , , , - ].
However, the anonymity of internet-based research that serves as an advantage for data collection also poses challenges that portend data quality and validity. Surveying participants in person allows investigators to better enforce inclusion criteria and prevent duplicate enrollment [, , , , , , ], while the process of avoiding fraudulent enrollment in Web-based research is more difficult. Previous research has focused on 2 different types of invalid entries as follows: (1) ineligible participants who misrepresent themselves to fit eligibility criteria to profit from compensation (ie, misrepresentation fraud) and (2) eligible participants who participate more than once without malefic intent or to receive additional compensation (ie, duplicate fraud) [ , , , , - ]. The confidentiality and anonymity of Web-based research make it difficult to prevent such entries, posing a threat to data integrity if appropriate data quality protocols are not in place [ , , - , - ]. Bots and smart software that have the capability to produce human-like data with unique Internet Protocol (IP) addresses can also lead to invalid or fraudulent data [ ]. Computer program (ie, bots) and human fraud must both, therefore, be considered in fraud identification strategies. As others have noted [ , ], increasing use of Web-based methodology warrants the development of standards and expectations for Web-based research to ensure data validity and accurate result reporting.
Previous research has focused on the use of a handful of characteristics that can be used to identify fraud (eg, IP address; personal information such as name, address, and email address; response patterns; and timestamps) [, , , , - , , , , ]. However, technology is rapidly advancing, as is the savviness of its users, and approaches previously used to prevent and detect fraud may now lack utility or need to be supplemented with other techniques [ ]. For example, the development and increasing use of network devices and smartphones have made it more difficult to utilize IP addresses as they can be masked both intentionally and unintentionally by users [ - ]. The purpose of this analysis was to evaluate fraud detection strategies in a Web-based survey of young MSM and describe new protocols to improve fraud detection in Web-based survey research.
The Men’s Health Study was a cross-sectional survey that examined individual- and network-level risk factors for HIV transmission and substance use among young MSM residing in 15 counties in Central Kentucky (total population size, 743,119) . The eligibility criteria included being aged 18-34 years, being biologically male, having engaged in anal sex with another man during the past 6 months, and residing in Central Kentucky. Qualtrics [ ], a Web-based survey service, was used to create a Web-based eligibility screening assessment, consent form, and behavioral and demographic survey. A link to the Qualtrics survey was posted on the study website hosted by WordPress [ ], which also described the monetary incentive, the process for completing the screening assessment, consent form, and survey, and provided community resources and contact information for the research staff. Based on pilot-testing among the staff, the screening, consent, and survey were anticipated to require a maximum of 45 minutes to complete, and the survey was anticipated to take between 5 and 30 minutes to complete depending on responses and subsequent skip patterns.
Participants were recruited from February to July 2018 utilizing flyers containing the Web address and a quick response code for the study’s website. The flyers were posted in local lesbian, gay, bisexual, transgender, and queer (LGBTQ) venues (eg, bars, adult entertainment stores, and health clinics) and on social media via a study-specific page and young adult LGBTQ groups. Staff also set up booths at 2 local LGBTQ events to disseminate flyers; at one event, the booth allowed space for participants to take the survey and be reimbursed on site. Recruitment also involved peer referral. During the survey and informed consent form, participants were informed that they were allowed to refer up to 3 peers to the study and receive US $10 per eligible referral who completed the survey. Upon completion of the survey, participants received a message from the staff that contained the survey URL and a referral code number and reminded them that they could earn up to US $30 for peer referrals; the former allowed the staff to link participants to people they refer. Participants could choose to receive this message from the staff via a short message service (SMS) text message or email, and provided their phone number or email address accordingly.
Participants who completed the survey had the option of declining an incentive or receiving a US $25 e-gift card or mailed payment and provided details either on their email address or mailing address. Participants were informed that the same method of delivery chosen for their US $25 survey incentive would be used for their peer referral incentives. Those who were recruited at local LGBTQ events were also given the option to receive their US $25 incentive in-person as payment and, then, were asked if they would like to receive their peer referral incentives as an e-gift card or mailed payment. All procedures were approved by the University of Kentucky’s Institutional Review Board.
Fraud Prevention Strategies
Prior to launching the Web-based survey, 4 strategies were implemented to prevent fraud. First, the informed consent form stated that participants should not take the survey more than once, and if this occurred, incentives would not be received more than once. Second, participants could not enter their email or mailing address to receive compensation until the very end of the survey, making the process to receive incentives more time-consuming in an effort to deter fraud. Third, to prevent participants from taking the survey more than once, either as a duplicate entry or to try to determine the eligibility criteria and subsequently misrepresent themselves to meet those criteria, the “prevent ballot box stuffing” option in Qualtrics was activated. This option places a cookie on the browser when a response is submitted so that if the survey link is clicked on again from the same device and browser, Qualtrics would detect the cookie and prevent the person from entering the survey . Fourth, an option was also activated in Qualtrics to prevent indexing, which blocks search engines from finding the survey and presenting it in search results [ ], thereby reducing the likelihood of fraudulent or inapposite participation. Of note, validation using GeoIP location, an estimate of a person’s location based on the IP address, was not used to block survey access because GeoIP location is not always accurate. Smartphones, remote access tools (eg, virtual private network), and network address translators (NATs) used by organizations or companies that assign public addresses to a computer inside a private network for security purposes can result in less accurate or concealed GeoIP estimates [ - ]. In addition, the survey did not use a tool like a Completely Automated Public Turing Test to tell Computers and Humans Apart, which could have reduced fraud by requiring respondents to verify that they were not robots [ ]. However, previous research has demonstrated that Completely Automated Public Turing Test to tell Computers and Humans Apart tool verification is not failproof and can be passed despite an entry being invalid or fraud [ ].
Fraud Criteria and Detection Strategies
Each survey that was at least 50% complete was manually checked by the study staff utilizing an extensive protocol () to detect fraud based on 8 criteria (described below). A point system was used with each criterion having an assigned point value of 1 or 2, and the total was used to classify surveys as fraudulent, potentially fraudulent, or valid. Data characteristics that were considered to possibly indicate fraud but could also have a reasonable justification were assigned 1 point so that they could be flagged as suspicious and confirmed through correspondence with participants. Data characteristics that were considered to be strongly and independently indicative of fraud were assigned 2 points. A 2-point threshold was, therefore, used for classification as fraud. The measures listed below were used in the fraud detection algorithm.
The survey software logged approximate latitude and longitude locations for participants by comparing IP addresses to a location database [, , ]. These data are typically accurate to the city level within the United States. Outside of the United States, data are only accurate at the country level [ ].
Geolocation outside of the study area was valuable for assisting with fraud detection but could not be used as a stand-alone fraud detection mechanism because only an external IP address is displayed when a device is connected to a virtual private network or NAT. This causes all devices to have identical IP addresses and geolocation [, ]. Additionally, research staff found that surveys they knew to be local and valid (ie, those completed at local LGBTQ events) would frequently have geolocations outside of the study area, sometimes even outside of the state of Kentucky. Surveys at LGBTQ events were completed on smartphones, which can display different IP addresses within minutes because of network proxies within the carrier’s network. This results in inaccurate geolocation based on IP addresses [ ].
Geolocation based on IP addresses was, therefore, not used in isolation as a fraud detection mechanism but was considered in the context of other indicators of location. In-person recruitment events and mailing address for those who requested payment incentives allowed the study staff to verify the location of participants. If the survey was completed at an in-person event or if the incentive was requested to be mailed to an address in the study area, the IP address geolocation outside of the study area was not used as an indicator of fraud. However, if the IP address geolocation was outside of the study area, the incentive requested was an e-gift card, and the survey was not completed in-person at a recruitment event, then the survey received 1 point toward the fraud detection point total.
Participants were asked to provide telephone numbers if they consented to be contacted for future research and as a method to receive a referral code. The staff searched phone numbers on the Web using Whitepages.org to identify instances in which the numbers were invalid or corresponded with local businesses or organizations, in which case, the survey received 1 point . Phone numbers were kept separate from all survey data to ensure participants’ privacy and anonymity.
When the survey was initially launched, participants were asked to give their name only if they consented to be contacted for future research or they requested payment through the mail for their incentive. To be able to investigate fraudulent behavior among e-gift card recipients, researchers began requesting participants name when e-gift cards were selected as an incentive. In addition, names were sometimes contained in or associated with email addresses (eg, firstname.lastname@example.org) entered to receive e-gift card incentive, referral code, or community resources. Therefore, names were given up to 3 times—for incentive delivery, through names linked to or contained in email addresses, and in the consent to future research section. This allowed researchers to cross-reference names up to 3 times. If names did not match within a survey, participants were assigned 1 point toward fraud.
Email addresses were examined to detect potential fraud. As done in a previous study , addresses with alternating letters and numbers (eg, email@example.com) were suspected by researchers to be fake email accounts (ie, created by a Bot program or by a human trying to misrepresent themselves). Surveys associated with such email addresses received 1 point toward fraud.
Personal information, including name, phone number, date of birth, email address, and mailing address, was compared across surveys to detect fraud. If 2 personal information items (ie, phone number, email address, and mailing address) matched a previously completed survey, the survey received 1 point toward their fraud total. Those with matching information but different names and date of birth could represent phone sharing and cohabitation, so surveys that contained contact information that had been entered previously but different names and dates of birth were contacted by the study staff to verify their identity as a unique participant (further described in Fraud Categorization below). Those with 1 or more matching personal information items and the same first and last name as a previous survey received 2 points as this was seen as a definite sign fraud. Additionally, surveys with, at least, one matching personal information item and the same date of birth as a previous survey received 2 points.
Qualtrics collected timestamps for the screening, consent form, and survey sections. For each section, Qualtrics recorded the time each section began and ended. Of note, there was no option to save survey progress, preventing completion across multiple sessions. If the survey was completed in <5 minutes, the entry received 1 point.
displays data on survey entries and fraud categorization. Surveys were classified as fraudulent if the total entry point value added to ≥2. Depending on what contact information was provided, fraudulent surveys received a phone call, SMS text message, or email stating, “You recently completed a survey for a health study online. However, we detected that your survey entry was fraudulent. If you think this is a mistake, please contact us”, with the intent of deterring further fraudulent behavior. If participants did not respond, their survey was considered invalid and they did not receive compensation. No responses were received from those categorized as fraudulent.
Surveys were classified as potential fraud if the total point value added to 1. Potentially fraudulent participants received a phone call, SMS text message, or an email stating, “Thank you for completing the UK Health Study online survey. We have been experiencing fraud in the study and your survey entry has been flagged as suspicious. We sincerely apologize for the inconvenience if this was an error. Please contact us by calling xxx-xxx-xxxx to confirm that you did indeed complete a survey and we will send your $25 incentive.” This message was meant to deter those who were indeed fraudulent but also provide an opportunity for valid submissions to verify legitimacy. They were asked to confirm personal information such as date of birth, mailing address, or email address to validate their survey. If a participant responded and was unable to provide verification, the survey was categorized as fraudulent. If a participant did not respond, the survey remained as potentially fraudulent.
Surveys were classified as valid if they met none of the fraud detection criteria or if they were originally classified as potentially fraudulent but contacted study staff to confirm the validity of their survey entry.
Descriptive analyses were performed using SAS software, version 9.4 (SAS Institute; Cary, NC, USA) to describe the number and percentage who violated each fraud detection criterion among those that were classified as fraud, potential fraud, and valid.
Overall, 62.3% (490/787) of the completed screening questionnaires were eligible. Of 490 who were eligible, 437 (89.2%) completed the consent and 408 (51.2%) completed the survey with an average survey duration of 19 minutes and 41 seconds. In addition, there were 26 partial surveys, of which 18 were missing several measures used for fraud detection and a majority of survey responses and, therefore, were not included in analyses presented below or in the final set of valid responses. Six partial surveys were >50% complete and were included in analyses, making 414 the final number of surveys in need of evaluation for fraud.
Of 414 surveys, 117 (28.3%) were initially categorized as fraud, 72 (17.4%) were categorized as potential fraud, and 225 (54.3%) were considered valid. Of 72 surveys originally classified as potential fraud, 2 participants responded and admitted to living outside of the study area, 42 did not respond, and 28 were able to verify their survey and were reclassified as valid (see). Therefore, of the 414 surveys, the final categorization resulted in 119 (28.7%) surveys identified as fraud, 42 (10.1%) as potential fraud, and 253 (61.1%) as valid for the final sample and analyses (see ). Of the 164 who had geolocation outside of the study area and were not mailed payment or recruited at a local event, 23 (14.0%) had locations outside of the United States, 118 (72.0%) in states other than Kentucky, and 23 (14.0%) within Kentucky but outside of the 15-county study area ( ).
|Fraud detection measure||Total (n=414), n (%)||Missing, n (%)||Fraud, (n=119)a, n (%)||Potential fraud, (n=42)a, n (%)||Valid (n=253)a, n (%)|
|Geolocation outside of study area based on IPb address and unable to be confirmed through mailing address or participating at a local event||164 (39.6)||0 (0.0)||109 (91.6)||34 (81)||21 (8)|
|Phone number was a local business or organization phone number||94 (22.7)||93 (22.5)c||94 (79.0)||0 (0.0)||0 (0.0)|
|Mismatching names within entry||43 (10.4)||71 (17.1)c||37 (31.1)||2 (4.8)||4 (1.6)|
|Unusual email address||37 (8.9)||98 (23.7)c||34 (28.6)||1 (2.4)||2 (0.8)|
|First and last name AND one or more other personal items match other previous entry||13 (3.1)||16 (3.9)c||13 (10.9)||0 (0.0)||0 (0.0)|
|Two or more personal items match other previous entry||6 (1.4)||67 (16.2)c||3 (2.5)||3 (7.1)||0 (0.0)|
|Date of birth AND one or more other personal items match other previous entry||5 (1.2)||5 (1.2)c||5 (4.2)||0 (0.0)||0 (0.0)|
|Survey duration <5 minutes||3 (0.7)||0 (0.0)||0 (0.0)||2 (4.8)||1 (0.4)|
aSample size represents final categorizations (ie, reclassification of some that were initially classified as potential fraud as valid or fraudulent based on the verification with participants).
bIP: interenet protocol.
cParticipants were not required to give personal information (ie, phone number, name, email address) if they did not want to be contacted about future research opportunities, declined their incentive, or if they did not complete the section of the survey describing the referral process. If a personal item was missing needed for a measure, the variable was considered missing.
lists each of the 8 fraud detection criterion used with the assigned point value and the number of surveys that fit that criterion. Surveys had the potential to violate 8 criteria that created a point scale from 0 to 10 points. The actually observed score range was 0-5 points. Data showed that 59.4% (246/414) of all entries had geolocation outside of the study area. However, 33.3% (82/246) of the surveys that had ineligible geolocations belonged to participants who were in eligible locations (as verified by their request to mail payment to an address within the study area or participation at a local event). The second most frequently violated criterion was an invalid phone number (94/414, 22.7%), followed by mismatching names within a survey (43/414, 10.4%) and unusual email addresses (37/414, 8.9%). Less than 5% (18/414) had some combination of personal information items matching that of a previous survey (ie, criteria e, f, and g in ). Of the 414 surveys, 3 were below the minimum time threshold established by the study staff, completing it in <5 minutes.
Of note, many surveys violated more than one criterion. Of the 164 entries that violated the geolocation criterion, 94 (57.3%) also had invalid phone numbers, 35 (21.3%) had mismatching names within the survey, and 34 (20.7%) had unusual email addresses. Of the 94 surveys with invalid phone numbers, 29 (30.9%) had mismatching names within the survey and 28 (29.7%) had unusual email addresses. In total, 42.3% (175/414) of surveys violated some combination of the geolocation, phone number, mismatching names, or the email address criteria. The detection measure of matching name and personal identifier data were not independently useful in detecting fraud. A total of 10.9% (13/119) surveys had first and last names and, at least, one other personal items that matched that of previous entries, but all of these also violated some other fraud criteria. Similarly, all surveys that had a date of birth (5/119) that matched a previous survey’s date of birth also violated some other fraud criteria.
Of 119 surveys classified as fraudulent, 109 (91.6%) had geolocations outside the study area, 94 (79.0%) provided business or organization phone numbers rather than personal phone numbers, 37 (31.1%) provided mismatching names within the surveys, and 34 (28.6%) had unusual email addresses. In total, 93.3% (111/119) of fraudulent surveys violated at least one of the following criteria: geolocation, phone number, mismatching names, or the email address; 86.6% (103/119) violated at least 2 of those 4 criteria.
IP addresses were not used in the fraud detection algorithm because analyses demonstrated that they would have limited utility. Overall, 23.0% (95/414) of the surveys had an IP address identically matching that of at least one other survey entry; however, 13.7% (13/95) of those with matching IP addresses were surveys completed at in-person local events and were observed by the staff as being unique individuals. Of the remaining 82 surveys, 47 (57.3%) were classified as valid surveys, 12 (14.6%) were potential fraud, and 23 (28.1%) were fraudulent.
In this Web-based study of young MSM, a robust fraud detection algorithm involving geolocation, phone number, email address, name, and other personal data revealed that 28.7% (119/414) of all eligible survey entries were fraudulent. The majority of fraudulent surveys involved participants whose IP address had geolocation outside of the study area, invalid phone numbers (ie, local business phone numbers), mismatching names within the survey, and unusual email addresses (ie, firstname.lastname@example.org). These findings are consistent with prior studies’ conclusions that fraud can be pervasive in Web-based research [, , , - ], but extends previous studies by outlining a step-by-step fraud detection strategy that does not rely on IP address and geolocation, which were identified in this study to have substantial limitations.
Previous studies have used IP address to detect duplicate entries [, , - , , ] but this was not used in this study because (1) Qualtrics’ ballot box stuffing prevention feature was used to prevent multiple entries from the same IP addresses and (2) matching IP addresses may not necessarily indicate fraud but occur in instances where >1 eligible participant lives in the same household, shares devices, or is accessing the survey from a communal space (eg, library or other venues with public Wi-Fi access). Furthermore, IP address to identify duplicate entries was not found to be appropriate based on the increasing use of smartphones, remote access tools, and NATs [ - ]. Remote access tools and NATs present the same IP address across users [ ] and present challenges to researchers in differentiating between users. On the other hand, smartphones can present different IP addresses within minutes based on the mobile tower the signal is being routed through [ ]; this allows individuals to intentionally or unintentionally obscure their IP address and geolocation, therein limiting the usefulness of the measure. In addition, the increasing threat of bots and smart software that produce human-like data with unique IP addresses further limit this measure as a tool to detect fraud [ ]. In this study, the majority of repeat IP addresses were valid entries, suggesting that IP address should be used with caution as a measure for fraud detection.
Geolocation linked to IP address to assist in assessing geographic eligibility (ie, residence in the 15-county study area) was used, but in combination with other indicators of fraud because of the inaccuracy of geolocation data that can be introduced by smartphones, remote access tools, NATs, bots, and smart software [, - ]. One out of 3 surveys that had ineligible geolocations based on the IP address belonged to participants who were in eligible locations, as verified by their request to mail payment to an address within the study area or by the staff observing their participation at a local event. Thus, like IP address, geolocation used for fraud detection should not be used in isolation.
Other measures that were found to be useful in fraud detection were invalid phone numbers, mismatching names within a survey, and unusual email addresses. Invalid phone numbers included a variety of local businesses and organizations, including manufacturing companies, health care organizations, professional associations, and university offices. Surprisingly, names at different parts of the survey (ie, consent form, contact information, and survey incentive information) were entered inconsistently. Distinct email address patterns that emerged among fraudulent surveys included addresses that began with a numeric value, switched between numbers and letters throughout the address, at least, 3 times, and did not appear to include initials or a name. Unexpectedly, the detection measure of matching name and personal identifier data across surveys, which would indicate duplicate entries, was not useful in detecting unique cases of fraud; surveys that violated these criteria also violated other criteria. These findings, however, may only be representative of this sample and a holistic approach should be considered for monitoring and detecting fraud.
Respondents were contacted to verify entries that were suspicious but not blatantly fraudulent and utilized messages tailored to fraud category when recontacting respondents. Similar to previous research among MSM , none of the individuals who received the message tailored to fraudulent cases responded, possibly indicating that these were, indeed, fraud. Of those who received the message tailored to potentially fraudulent cases, 38.9% (28/72) responded with reasonable explanations such as using a partner’s phone number or email address or providing a physical address verifying geographic eligibility and were reclassified as valid. Interestingly, 2 of the potentially fraudulent cases that were contacted verified their fraud, explaining that they were indeed outside of the study area and were confused about geographic eligibility criteria. In addition, real-time monitoring of fraud was helpful in deterring subsequent fraud. A majority of fraudulent entries were submitted within the first month of data collection, but the frequency dramatically decreased after staff began calling, SMS text messaging, and emailing targeted messages. Communicating directly with fraudulent participants may help deter continued invalid entries from being submitted. Future studies should consider monitoring fraud in real time and verifying suspicious surveys with respondents if possible.
While the fraud detection algorithm used in the study was robust, there were limitations. For example, participants’ name and phone numbers could be left blank and were left blank by 3.9% (16/414) and 22.5% (93/414) of surveys, respectively. Other data were available to assist in fraud detection in these cases (ie, geolocation, email address, physical address, date of birth, or survey duration); however, those who did not provide name and phone information had a greater likelihood of not being detected as fraudulent. In addition, virtual phone systems that allow for the quick creation of phone numbers may limit the ability to use phone numbers as a fraud detection algorithm, as respondents can create local numbers and enter them in the survey. Furthermore, certain email address providers display names associated with email addresses when messages are sent while others do not; those that display names allowed the staff to better detect name inconsistency within surveys and fraud.
This study suggests that researchers conducting Web-based surveys of MSM should be vigilant about the potential for fraud. Researchers should have a fraud detection algorithm in place prior to data collection to ensure that (1) data needed for fraud detection are being collected; (2) the informed consent document can describe that surveys will be evaluated for fraud and what the consequences are for incentives; and (3) fraud can be monitored in real time. The latter allows the staff to send messages to those flagged as fraudulent and potentially fraudulent and deter subsequent fraud and avoid misclassification. Importantly, in research involving populations engaged in stigmatized or illegal behavior, researchers should take extra precautions to ensure that messages sent to respondents do not disclose the focus of the study or eligibility criteria in case the message is intercepted by an unintended recipient. In addition, as discussed by Sullivan et al , researchers should be mindful that rapid evolutions in technology could impact the utility and relevance of previously published protocols and methodologies. Therefore, continued innovation in fraud prevention and detection for Web-based research will be necessary, as will the development of automated or semiautomated algorithms for detecting and mitigating fraud [ , , ]. The latter is especially important given that manual approaches, such as the one used in this study, can be labor- and time-intensive and may be difficult to implement in studies with large samples sizes. Of note, manual approaches may continue to be important for small Web-based studies on novel topics [ ].
In research involving geographic eligibility criteria (ie, residence in a certain area), automatic algorithms embedded in Web-based survey tools that exclude people based on the geolocation should be used with caution, as geolocations are often inaccurate. Furthermore, in studies with geographic inclusion criteria, the entry of a phone number with a local area code should not be assumed to be a local person, as the entry of local business or organization numbers can be common. Providing the option of receiving an incentive through mailed payment rather than only by e-gift card proved to be a useful tool in fraud detection, not only for the evaluation of whether the mailing address was within the study area for those who opted for mailed payments but also because the staff could deter fraud by contacting respondents who violated multiple fraud criteria and ask for a mailing address for the incentive rather than automatically sending an e-gift card. In addition, the collection of name data in multiple places throughout the survey, as well as email address, phone number, mailing address, and geolocation based on the IP address were, in combination, useful in assisting with fraud detection.
Future research should consider similar algorithms and should publish algorithms used for fraud detection to improve replicability and to benefit the field of online research.
This research was supported by the National Institute on Drug Abuse (NIH NIDA R03 DA039740). The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health.
Conflicts of Interest
- Eysenbach G. Improving the quality of Web surveys: the Checklist for Reporting Results of Internet E-Surveys (CHERRIES). J Med Internet Res 2004 Dec 29;6(3):e34 [FREE Full text] [CrossRef] [Medline]
- Sullivan PS, Grey JA, Simon Rosser BR. Emerging technologies for HIV prevention for MSM: what we have learned, and ways forward. J Acquir Immune Defic Syndr 2013 Jun 01;63 Suppl 1:S102-S107 [FREE Full text] [CrossRef] [Medline]
- Eysenbach G, Wyatt J. Using the Internet for surveys and health research. J Med Internet Res 2002;4(2):E13 [FREE Full text] [CrossRef] [Medline]
- Mustanski BS. Getting wired: Exploiting the internet for the collection of valid sexuality data. Journal of Sex Research 2001 Nov;38(4):292-301. [CrossRef]
- Pequegnat W, Rosser BRS, Bowen AM, Bull SS, DiClemente RJ, Bockting WO, et al. Conducting Internet-based HIV/STD prevention survey research: considerations in design and evaluation. AIDS Behav 2007 Jul;11(4):505-521. [CrossRef] [Medline]
- van Gelder MMHJ, Bretveld RW, Roeleveld N. Web-based questionnaires: the future in epidemiology? Am J Epidemiol 2010 Dec 01;172(11):1292-1298. [CrossRef] [Medline]
- Choi SH, Mitchell J, Lipkus I. Lessons Learned From an Online Study with Dual-smoker Couples. Am J Hlth Behav 2017 Jan 01;41(1):61-66. [CrossRef]
- Ekman A, Litton J. New times, new needs; e-epidemiology. Eur J Epidemiol 2007;22(5):285-292. [CrossRef] [Medline]
- Grey JA, Konstan J, Iantaffi A, Wilkerson JM, Galos D, Rosser BRS. An updated protocol to detect invalid entries in an online survey of men who have sex with men (MSM): how do valid and invalid submissions compare? AIDS Behav 2015 Oct;19(10):1928-1937 [FREE Full text] [CrossRef] [Medline]
- Theunissen K, Hoebe C, Kok G, Crutzen R, Kara-Zaïtri C, de Vries N, et al. A Web-Based Respondent Driven Sampling Pilot Targeting Young People at Risk for Chlamydia Trachomatis in Social and Sexual Networks with Testing: A Use Evaluation. Int J Environ Res Public Health 2015 Aug 20;12(8):9889-9906 [FREE Full text] [CrossRef] [Medline]
- Wilkerson JM, Shenk JE, Grey JA, Simon Rosser BR, Noor SW. Recruitment Strategies of Methamphetamine-Using Men Who Have Sex with Men into an Online Survey. J Subst Use 2015;20(1):33-37 [FREE Full text] [CrossRef] [Medline]
- Bauermeister JA, Zimmerman MA, Johns MM, Glowacki P, Stoddard S, Volz E. Innovative recruitment using online networks: lessons learned from an online study of alcohol and other drug use utilizing a web-based, respondent-driven sampling (webRDS) strategy. J Stud Alcohol Drugs 2012 Sep;73(5):834-838 [FREE Full text] [Medline]
- Miner MH, Bockting WO, Romine RS, Raman S. Conducting Internet Research With the Transgender Population: Reaching Broad Samples and Collecting Valid Data. Soc Sci Comput Rev 2012 May 01;30(2):202-211 [FREE Full text] [CrossRef] [Medline]
- Bauermeister JA, Pingel E, Zimmerman M, Couper M, Carballo-Diéguez A, Strecher VJ. Data Quality in web-based HIV/AIDS research: Handling Invalid and Suspicious Data. Field methods 2012 Aug 01;24(3):272-291 [FREE Full text] [CrossRef] [Medline]
- Bowen AM, Daniel CM, Williams ML, Baird GL. Identifying multiple submissions in Internet research: preserving data integrity. AIDS Behav 2008 Nov 1;12(6):964-973 [FREE Full text] [CrossRef] [Medline]
- Schmidt WC. World-Wide Web survey research: Benefits, potential problems, and solutions. Behavior Research Methods, Instruments, & Computers 1997 Jun;29(2):274-279. [CrossRef]
- Quach S, Pereira JA, Russell ML, Wormsbecker AE, Ramsay H, Crowe L, et al. The good, bad, and ugly of online recruitment of parents for health-related focus groups: lessons learned. J Med Internet Res 2013 Nov 14;15(11):e250 [FREE Full text] [CrossRef] [Medline]
- Teitcher JEF, Bockting WO, Bauermeister JA, Hoefer CJ, Miner MH, Klitzman RL. Detecting, preventing, and responding to “fraudsters” in internet research: ethics and tradeoffs. J Law Med Ethics 2015;43(1):116-133 [FREE Full text] [CrossRef] [Medline]
- Kramer J, Rubin A, Coster W, Helmuth E, Hermos J, Rosenbloom D, et al. Strategies to address participant misrepresentation for eligibility in Web-based research. Int J Methods Psychiatr Res 2014 Mar;23(1):120-129 [FREE Full text] [CrossRef] [Medline]
- Konstan J, Rosser B, Ross M, Stanton J, Edwards W. The Story of Subject Naught: A Cautionary but Optimistic Tale of Internet Survey Research. Journal of Computer-Mediated Communication 2005 Jan;10(2):A. [CrossRef]
- Dewitt J, Capistrant B, Kohli N, Rosser B, Mitteldorf D, Merengwa E, et al. Addressing Participant Validity in a Small Internet Health Survey (The Restore Study): Protocol and Recommendations for Survey Response Validation. JMIR Res Protoc 2018 Apr 24;7(4):e96 [FREE Full text] [CrossRef] [Medline]
- Nosen E, Woody S. Online Surveys: Effects of Research Design Decisions on Rates of Invalid Participation and Credibility. Graduate Student Journal of Psychology 2008;10:3-14.
- Poese I, Uhlig S, Kaafar MA, Donnet B, Gueye B. IP geolocation databases. SIGCOMM Comput. Commun. Rev 2011 Apr 15;41(2):53. [CrossRef]
- IP Addresses Beginners Guide. 2011 Mar. URL: https://www.icann.org/en/system/files/files/ip-addresses-beginners-guide-04mar11-en.pdf [WebCite Cache]
- Balakrishnan M, Mohomed I, Ramasubramanian V. Where's that Phone?: Geolocating IP Addresses on 3G Networks. 2009 Presented at: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement ACM Nov; November 04 - 06, 2009; Chicago, Illinois, USA p. 294-300. [CrossRef]
- Zhang L. A retrospective view of network address translation. IEEE Network 2008 Sep;22(5):8-12. [CrossRef]
- U.S. Census Bureau. 2012. 2010 Census of PopulationHousing, PopulationHousing Unit Counts, CPH-2-19, Kentucky URL: https://www.census.gov/prod/cen2010/cph-2-19.pdf [accessed 2018-09-22] [WebCite Cache]
- Qualtrics. Qualtrics URL: https://www.qualtrics.com/ [accessed 2018-09-22] [WebCite Cache]
- Wordpress. Wordpress URL: https://wordpress.com/ [accessed 2018-09-22] [WebCite Cache]
- Snow J. Qualtrics. 2011. The Complete Research Suite: A step-by-step guide to using Qualtrics URL: https://www.qualtrics.com/docs/TheCompleteResearchSuite_print.pdf [accessed 2018-09-22] [WebCite Cache]
|MSM: men who have sex with men|
|IP: Internet Protocol|
|NAT: network address translator|
|LGBTQ: lesbian, gay, bisexual, transgender, and queer|
|SMS: short message service|
Edited by G Eysenbach; submitted 27.09.18; peer-reviewed by BS Rosser, G Kok; comments to author 25.10.18; revised version received 02.11.18; accepted 05.11.18; published 04.02.19Copyright
©April M Ballard, Trey Cardwell, April M Young. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 04.02.2019.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Public Health and Surveillance, is properly cited. The complete bibliographic information, a link to the original publication on http://publichealth.jmir.org, as well as this copyright and license information must be included.