Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2008 Nov;12(6):964-73.
doi: 10.1007/s10461-007-9352-2. Epub 2008 Feb 1.

Identifying multiple submissions in Internet research: preserving data integrity

Affiliations

Identifying multiple submissions in Internet research: preserving data integrity

Anne M Bowen et al. AIDS Behav. 2008 Nov.

Abstract

Internet-based sexuality research with hidden populations has become increasingly popular. Respondent anonymity may encourage participation and lower social desirability, but associated disinhibition may promote multiple submissions, especially when incentives are offered. The goal of this study was to identify the usefulness of different variables for detecting multiple submissions from repeat responders and to explore incentive effects. The data included 1,900 submissions from a three-session Internet intervention with a pretest and three post-test questionnaires. Participants were men who have sex with men and incentives were offered to rural participants for completing each questionnaire. The final number of submissions included 1,273 "unique", 132 first submissions by "repeat responders" and 495 additional submissions by the "repeat responders" (N = 1,900). Four categories of repeat responders were identified: "infrequent" (2-5 submissions), "persistent" (6-10 submissions), "very persistent" (11-30 submissions), and "hackers" (more than 30 submissions). Internet Provider (IP) addresses, user names, and passwords were the most useful for identifying "infrequent" repeat responders. "Hackers" often varied their IP address and identifying information to prevent easy identification, but investigating the data for small variations in IP, using reverse telephone look up, and patterns across usernames and passwords were helpful. Incentives appeared to play a role in stimulating multiple submissions, especially from the more sophisticated "hackers". Finally, the web is ever evolving and it will be necessary to have good programmers and staff who evolve as fast as "hackers".

PubMed Disclaimer

Figures

Fig. 1
Fig. 1
Flow chart of the overall HOPE study design. Screening for multiple submissions was ongoing during the study. Many were identified prior to activation and routed to non-payment group. If a multiple submission was identified after activation, the account was locked with a request to contact the project. Data used for this manuscript represents a post hoc analysis of all 1,900 participants who completed the screening, consent, and identifying information page

Similar articles

Cited by

References

    1. Birnbaum MH. Psychological experiments on the Internet. San Diego: Academic; 2000.
    1. Birnbaum MH. Human research and data collection via the Internet. Annual Review of Psychology. 2004;55:803–832. - PubMed
    1. Bowen AM. Internet sexuality research with rural MSM: Can we recruit and retain them? Journal Sex Research. 2005;42(4):317–323. - PubMed
    1. Bowen AM, Williams MW, Horvath K. Using the Internet to recruit rural MSM for HIV risk assessment: Sampling issues. AIDS & Behavior. 2004;8(3):311–319. - PMC - PubMed
    1. Catania J. A comment on advancing the frontiers of sexological methods. The Journal of Sex Research. 1999;36:1–2.

Publication types