<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="review-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">Online J Public Health Inform</journal-id><journal-id journal-id-type="publisher-id">ojphi</journal-id><journal-id journal-id-type="index">45</journal-id><journal-title>Online Journal of Public Health Informatics</journal-title><abbrev-journal-title>Online J Public Health Inform</abbrev-journal-title><issn pub-type="epub">1947-2579</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v17i1e70926</article-id><article-id pub-id-type="doi">10.2196/70926</article-id><article-categories><subj-group subj-group-type="heading"><subject>Review</subject></subj-group></article-categories><title-group><article-title>Imposters, Bots, and Other Threats to Data Integrity in Online Research: Scoping Review of the Literature and Recommendations for Best Practices</article-title></title-group><contrib-group><contrib contrib-type="author"><name name-style="western"><surname>Strickland</surname><given-names>Isabella B</given-names></name><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Ferketich</surname><given-names>Amy K</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Tackett</surname><given-names>Alayna P</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff2">2</xref><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Patterson</surname><given-names>Joanne G</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Breitborde</surname><given-names>Nicholas J K</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff4">4</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Davis</surname><given-names>Jade</given-names></name><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Roberts</surname><given-names>Megan</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref></contrib></contrib-group><aff id="aff1"><institution>College of Public Health, The Ohio State University</institution><addr-line>1841 Neil Ave</addr-line><addr-line>Columbus</addr-line><addr-line>OH</addr-line><country>United States</country></aff><aff id="aff2"><institution>Center for Tobacco Research, The Ohio State University Comprehensive Cancer Center, The Ohio State University</institution><addr-line>Columbus</addr-line><addr-line>OH</addr-line><country>United States</country></aff><aff id="aff3"><institution>Division of Medical Oncology, Department of Internal Medicine, College of Medicine, The Ohio State University</institution><addr-line>Columbus</addr-line><addr-line>OH</addr-line><country>United States</country></aff><aff id="aff4"><institution>Psychiatry and Behavioral Health, College of Medicine, The Ohio State University</institution><addr-line>Columbus</addr-line><addr-line>OH</addr-line><country>United States</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Mensah</surname><given-names>Edward</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Maheshwari</surname><given-names>Harsh</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Oluwole</surname><given-names>Odumbo</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Kath</surname><given-names>Suraj</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Megan Roberts, PhD, College of Public Health, The Ohio State University, 1841 Neil Ave, Columbus, OH, 43210, United States, 1 6142924647; <email>roberts.1558@osu.edu</email></corresp></author-notes><pub-date pub-type="collection"><year>2025</year></pub-date><pub-date pub-type="epub"><day>29</day><month>8</month><year>2025</year></pub-date><volume>17</volume><elocation-id>e70926</elocation-id><history><date date-type="received"><day>06</day><month>01</month><year>2025</year></date><date date-type="rev-recd"><day>24</day><month>02</month><year>2025</year></date><date date-type="accepted"><day>10</day><month>04</month><year>2025</year></date></history><copyright-statement>&#x00A9; Isabella B Strickland, Amy K Ferketich, Alayna P Tackett, Joanne G Patterson, Nicholas J K Breitborde, Jade Davis, Megan Roberts. Originally published in the Online Journal of Public Health Informatics (<ext-link ext-link-type="uri" xlink:href="https://ojphi.jmir.org/">https://ojphi.jmir.org/</ext-link>), 29.8.2025. </copyright-statement><copyright-year>2025</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Online Journal of Public Health Informatics, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://ojphi.jmir.org/">https://ojphi.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://ojphi.jmir.org/2025/1/e70926"/><abstract><sec><title>Background</title><p>Threats to data integrity have always existed in online human subjects research, but it appears these threats have become more common and more advanced in recent years. Researchers have proposed various techniques to address satisficers, repeat participants, bots, and fraudulent participants; yet, no synthesis of this literature has been conducted.</p></sec><sec><title>Objective</title><p>This study undertakes a scoping review of recent methods and ethical considerations for addressing threats to data integrity in online research.</p></sec><sec sec-type="methods"><title>Methods</title><p>A PubMed search was used to identify 90 articles published from 2020 to 2024 that were written in English, that discussed online human subjects research, and that had at least one paragraph dedicated to discussing threats to online data integrity.</p></sec><sec sec-type="results"><title>Results</title><p>We cataloged 16 types of techniques for addressing threats to online data integrity. Techniques to authenticate personal information (eg, videoconferencing and mailing incentives to a physical address) appear to be very effective at deterring or identifying fraudulent participants. Yet such techniques also come with ethical considerations, including participant burden and increased threats to privacy. Other techniques, such as Completely Automated Public Turing test to tell Computers and Humans Apart (reCAPTCHA; Google LLC), scores, and checking IP addresses, although very common, were also deemed by several researchers as no longer sufficient protections against advanced threats to data integrity.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>Overall, this review demonstrates the importance of shifting online research protocols as bots and fraudulent participants become more sophisticated.</p></sec></abstract><kwd-group><kwd>review</kwd><kwd>fraud</kwd><kwd>data integrity</kwd><kwd>bots</kwd><kwd>online data collection</kwd><kwd>PRISMA</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>Recent years have witnessed a shift in research protocols, with many studies that were previously conducted in-person being moved online [<xref ref-type="bibr" rid="ref1">1</xref>]. This shift has had several benefits for researchers in terms of easier sampling, broader reach, and better access to historically marginalized populations [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. However, the shift has also ushered in critical concerns about threats to data integrity. While concerns about data integrity have always existed, even with in-person studies, there has been a notable increase in the number and types of threats to data integrity in online studies since the COVID-19 pandemic [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>].</p><p>As outlined in <xref ref-type="table" rid="table1">Table 1</xref>, the types of threats to data integrity in online research come in several forms. First, satisficers (also known as speeders, straightliners, and cheaters) are individuals who rush through surveys with little care for the accuracy or thoroughness of their responses. While satisficers also exist with study protocols administered in-person or by mail [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>], this threat is challenging to monitor online. Next, there are repeat participants (also known as duplicate participants). These are individuals who complete screener surveys or study protocols multiple times. Motivations for repeat participation vary: some people may be curious about what happens if they complete the survey with different answers [<xref ref-type="bibr" rid="ref8">8</xref>]. Others may try to complete the survey multiple times to get extra compensation [<xref ref-type="bibr" rid="ref9">9</xref>]. Whatever the motivation, this behavior can have serious consequences for data integrity and research findings [<xref ref-type="bibr" rid="ref10">10</xref>]. And, again, it is often easier for individuals to engage in these behaviors with online research studies.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Types of threats to data integrity in online research.</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Type of threat</td><td align="left" valign="bottom">Other terms</td><td align="left" valign="bottom">Definition</td></tr></thead><tbody><tr><td align="left" valign="top">Satisficers</td><td align="left" valign="top">Cheaters, straightliners, speeders, and careless participants</td><td align="left" valign="top">Inattentive participants who speed through surveys often not paying attention to questions and responding thoughtlessly</td></tr><tr><td align="left" valign="top">Repeat participants</td><td align="left" valign="top">Duplicate participants</td><td align="left" valign="top">Participants who attempt to complete a study more than once out of curiosity or a desire for additional remuneration</td></tr><tr><td align="left" valign="top">Bots</td><td align="left" valign="top">Chatbots and artificial intelligence respondents</td><td align="left" valign="top">Computer algorithms deployed on studies in order to gain compensation without human effort for completion</td></tr><tr><td align="left" valign="top">Fraudulent participants</td><td align="left" valign="top">Imposters, scammers, bad actors, and lying participants</td><td align="left" valign="top">Participants who lie about their identity or otherwise attempt to deceive researchers often with the intent of gaining study compensation</td></tr></tbody></table></table-wrap><p>Another growing threat to data integrity is bots (also known as chatbots and artificial intelligence respondents). Bots are automated computer programs that people can create to randomly and methodically complete online surveys, usually numerous times, to gain compensation without having to take the time and effort to manually complete the survey [<xref ref-type="bibr" rid="ref11">11</xref>]. Tools such as a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA; or the newer version, reCAPTCHA; Google LLC) can help prevent bots from infiltrating surveys; however, more advanced bots can bypass these measures [<xref ref-type="bibr" rid="ref12">12</xref>]. Bots can very quickly complete surveys and, if they are not properly blocked, can compromise results and force time-consuming and expensive relaunches of research projects [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>].</p><p>Finally, there are fraudulent participants (also known as imposter participants, scammers, and lying participants) [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. Unlike bots, fraudulent participants are real people who complete a study protocol. However, they lie about themselves to qualify for study participation. For example, Pellicano et al [<xref ref-type="bibr" rid="ref4">4</xref>] describe a situation where fraudulent participants posed as either people with autism or parents of children with autism during online, qualitative interviews. In this particular example, several clues aroused the researcher&#x2019;s suspicion, such as keeping cameras off, inconsistent responses between prescreening and the interview, similarities in voices and mannerisms across interviews, and repeated inquiries about payments. Fraudulent participants have been detected in many domains of research but seem, concerningly, to have the largest impact on research on small populations that are often historically minoritized or otherwise vulnerable [<xref ref-type="bibr" rid="ref10">10</xref>]. One study interviewing research participants found that, on average, 55% of participants who had participated in some sort of research fraud reported fabricating information to qualify for studies [<xref ref-type="bibr" rid="ref16">16</xref>]. Several studies have found that these participants often respond differently than authentic participants, potentially influencing the results of research studies or weakening the effects detected [<xref ref-type="bibr" rid="ref17">17</xref>-<xref ref-type="bibr" rid="ref19">19</xref>].</p><p>While many researchers have published concerns or potential solutions to these various threats to data integrity, there has not yet been a review or synthesis of the literature. This research gap makes it difficult and time-consuming for researchers designing new online studies to decide on best practices. Due to the research interests of the authors, we were particularly motivated to identify research methods being used to address threats to online data integrity in the medical and public health domains. Therefore, we used PubMed to conduct a scoping review of methods that address contemporary threats to online data integrity, with keywords that focus on bots and fraudulent participants. Our objectives were to catalog and evaluate the most common research methods used to address these threats and discuss the ethical considerations raised about the techniques. Ultimately, this review aims to expand and centralize knowledge on addressing threats to data integrity in online studies, with the goal of aiding researchers in developing robust online methodologies.</p></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Search Strategy</title><p>This search was conducted using Covidence (Veritas Health Innovation), an online tool used to conduct and organize literature reviews. We searched PubMed for the terms &#x201C;fraud* OR imposter* OR scam* OR bot OR bots.&#x201D; To be eligible for review, papers needed to be published in or after 2020 because we were interested in methods for addressing the recent threats to data integrity that have emerged since COVID-19. Additional eligibility criteria were: discussing an online study, using human participants, being written in English, and having at least one paragraph dedicated to discussing threats to data integrity.</p><p>Our PubMed search yielded an initial 10,681 publications. After eliminating 189 duplicate texts using Covidence, 10,492 publications remained to be screened. Our first phase of screening checked all abstracts and eliminated those not pertaining to online research. Of the 10,492 publications, 196 were retained. In the second phase of screening, the full article was checked for inclusion criteria. Ultimately, 90 articles met criteria for inclusion in this review [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref103">103</xref>]. This review followed the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) 2020 guidelines.</p></sec><sec id="s2-2"><title>Data Extraction</title><p>A codebook was developed through an interrogative process. First, a codebook was created a priori according to our research questions. Additional codes and subcodes were added through an inductive process. Two team members (IBS and JD) independently reviewed and coded each of the 90 articles [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref103">103</xref>]. A senior team member (MR) reviewed their interrater agreement and resolved all discrepancies.</p><p>The following information was extracted and coded from the final 90 articles [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref103">103</xref>]: article type (eg, original research and commentary), type of data collection (eg, qualitative and quantitative), methodology of the study (eg, survey and qualitative interview), country where the study was conducted, recruitment methods (eg, social media and survey service platform), type of suspected threat to data integrity (eg, bots and fraudulent participants), the estimated prevalence of compromised data, and techniques mentioned for addressing threats to data integrity (eg, authenticating personal information and attention checks).</p><p>Techniques to address threats to data integrity were additionally sorted into 3 categories. &#x201C;Very effective&#x201D; techniques were those that authors of the reviewed articles, especially in the most recent publications, deemed to be successful at identifying poor-quality data, such as bots and fraudulent participants. &#x201C;Somewhat effective&#x201D; techniques were those considered capable of identifying a proportion of poor-quality data but that had drawbacks preventing them from being used alone. &#x201C;No longer effective&#x201D; techniques were those deemed by the authors of the reviewed articles as being no longer sufficient in addressing threats to data integrity.</p><p>When synthesizing the data, we computed the most common types of threats to data integrity, the most common recruitment methods, and the estimated prevalence of threats to data integrity. We also narratively reviewed how authors discussed the adverse effects of threats to data integrity. Next, to address our study objectives, we described all the proposed techniques to address threats to data integrity that we uncovered in this review. Finally, we narratively reviewed how authors discussed the ethical considerations raised by the techniques.</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><p>A total of 90 studies were included in the review (<xref ref-type="fig" rid="figure1">Figure 1</xref>). The most common type of threat to data integrity documented by researchers was bots (n=59) followed by fraudulent participants (n=51), repeat participants (n=42), and satisficing participants (n=17). The most common recruitment method was social media advertising, followed by using online survey service platforms, such as MTurk (Amazon Web Services, Inc; Table S1 in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref103">103</xref>]). Many studies used more than one recruitment method.</p><p>The estimated prevalence of threats to data integrity ranged from approximately 1% to 99%. Implications for data validity and reliability were commonly discussed. Other adverse effects included the heavy, and often wasteful, use of resources needed to address fraud. For example, some researchers with a high prevalence of participant fraud described having to end their study and start over, wasting valuable time and resources. Some articles even discussed how dealing with high proportions of imposter participants can be difficult to handle emotionally as researchers. As one research team expressed after finding around 90% of their study participants to be fraudulent: &#x201C;It is disheartening to encounter issues related to fraud during research. Our team experienced significant demoralization related to this occurrence&#x201D; [<xref ref-type="bibr" rid="ref20">20</xref>].</p><p>All of the articles provided information on methods to improve the integrity of data, either by (1) preventing the collection of poor-quality data in the first place or (2) identifying and removing poor-quality data if collected (or both; Table S2 in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref103">103</xref>]). As cataloged in <xref ref-type="table" rid="table2">Table 2</xref>, we identified 16 techniques, representing a wide variety of methods. Techniques deemed to be &#x201C;very effective&#x201D; included authenticating personal information, such as requesting to see participants&#x2019; IDs over a video call, which eliminates the potential for bots and helps identify fraudulent participants. As another version of this technique, Hardesty et al [<xref ref-type="bibr" rid="ref21">21</xref>] mailed the study incentives to participants&#x2019; street addresses (rather than sending the incentive electronically) because they observed that fraudulent participants were providing false addresses to meet geographically based eligibility criteria. A related technique deemed &#x201C;very effective&#x201D; was including background-related questions that could be easily answered by participants in the target population (or by partners in dyad research) but that are not widely known by other groups. For example, in a community study on narcolepsy, data were excluded from participants who reported unlikely symptomology [<xref ref-type="bibr" rid="ref22">22</xref>]. A final &#x201C;very effective&#x201D; technique concerned data checking: cross-checking for inconsistent answers (eg, between screening and a baseline survey). Of note, we observed that these very effective techniques were used across a variety of study designs, including both quantitative and qualitative studies.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Flow chart of the review process for article selection.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="ojphi_v17i1e70926_fig01.png"/></fig><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Techniques to address threats to data integrity in online research and their frequency of being mentioned across the 90 articles examined in this scoping review.</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom" colspan="2">Effectiveness ranking and technique</td><td align="left" valign="bottom">Description</td><td align="left" valign="bottom">Example</td><td align="left" valign="bottom">Freq.<sup><xref ref-type="table-fn" rid="table2fn1">a</xref></sup></td></tr></thead><tbody><tr><td align="left" valign="top" colspan="5">Very effective</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Authenticate personal information</td><td align="left" valign="top">Checking IDs, emails, addresses, zip codes, and phone numbers for authenticity. This could include using third-party services to verify identities, requiring video calls at enrollment (verification step), or mailing incentives to the provided street address.</td><td align="left" valign="top">&#x201C;Include a preinterview briefing over videoconferencing or telephone to go through eligibility criteria and the consent process. Researchers could forewarn potential participants about this aspect in the consent form.&#x201D; [<xref ref-type="bibr" rid="ref4">4</xref>]</td><td align="left" valign="top">48.9%</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Background-related questions</td><td align="left" valign="top">Including questions about information that would be easily answered by participants in target population but is not widely known by other groups.</td><td align="left" valign="top">&#x201C;To reduce fraudulent responses, the study investigators added 4 military validation questions to confirm history of military service prior to the study survey. These questions were developed and piloted with service members and veterans of varying components and across branches.&#x201D; [<xref ref-type="bibr" rid="ref23">23</xref>]</td><td align="left" valign="top">20.0%</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Cross-check inconsistent answers</td><td align="left" valign="top">Checking for inconsistent or contradictory answers across survey items to detect fraud or inattention.</td><td align="left" valign="top">&#x201C;By identifying inconsistencies in data collected at screening and survey data, the team could identify potentially fraudulent or ineligible participants.&#x201D; [<xref ref-type="bibr" rid="ref24">24</xref>]</td><td align="left" valign="top">51.1%</td></tr><tr><td align="left" valign="top" colspan="5">Somewhat effective</td></tr><tr><td align="left" valign="top" rowspan="8"/><td align="left" valign="top">Attention checks</td><td align="left" valign="top">Including survey questions that request specific answers or that may only have one reasonable answer. This screens for satisficing and basic logical reasoning.</td><td align="left" valign="top">&#x201C;The attention checks consisted of the following: (1) embedded on the Grit scale&#x2014;&#x201C;Select &#x2018;Somewhat like me&#x2019; for this statement,&#x201D; (2) embedded on the Beck Depression Inventory&#x2014;&#x201C;1 &#x2013; Select this option,&#x201D; and (3) embedded on the Borderline Personality Inventory&#x2014;&#x201C;Select &#x2018;Yes&#x2019; for this statement.&#x2019;&#x201D; [<xref ref-type="bibr" rid="ref25">25</xref>]</td><td align="left" valign="top">33.3%</td></tr><tr><td align="left" valign="top">Camera-on requirement</td><td align="left" valign="top">Requiring participants to turn on their camera, even if just for a moment, as often fraudulent participants will leave theirs off.</td><td align="left" valign="top">&#x201C;Participants were not using their cameras for the Zoom sessions because they refused to turn on their camera or they stated there were internet issues.&#x201D; [<xref ref-type="bibr" rid="ref26">26</xref>]</td><td align="left" valign="top">10.0%</td></tr><tr><td align="left" valign="top">Check for dataset duplicates</td><td align="left" valign="top">Checking a dataset for duplicate names, emails, etc, across participants for duplicate replies.</td><td align="left" valign="top">&#x201C;SAS programs were run to check the newly submitted record against all previous baseline questionnaires to check for duplicates of email addresses, mobile numbers, IP addresses, mailing addresses, social media handles, and preferred names.&#x201D; [<xref ref-type="bibr" rid="ref24">24</xref>]</td><td align="left" valign="top">46.7%</td></tr><tr><td align="left" valign="top">Post hoc testing</td><td align="left" valign="top">Conducting statistical analysis of data for unreasonable response patterns and notable outliers that may be indicative of fraud.</td><td align="left" valign="top">&#x201C;Interactive visualization can improve data quality by facilitating the identification of issues such as missing data, outliers, duplicates, pattern or constraint violations, and data inconsistencies.&#x201D; [<xref ref-type="bibr" rid="ref27">27</xref>]</td><td align="left" valign="top">16.7%</td></tr><tr><td align="left" valign="top">Watchful of a large number of responses</td><td align="left" valign="top">Checking the timestamps on survey submissions. A flurry of responses or sign-ups can often be an indication of bots or fraud.</td><td align="left" valign="top">&#x201C;Before launching the DIP, various indications of fraudulent activity were noted. These include&#x2026;a rush of survey time stamps&#x2026;found in the same 1&#x2010; to 15-min period.&#x201D; [<xref ref-type="bibr" rid="ref28">28</xref>]</td><td align="left" valign="top">30.0%</td></tr><tr><td align="left" valign="top">Screen for low response rates</td><td align="left" valign="top">Excluding data from participants who complete less than a certain percentage of a study, as they may be satisficing.</td><td align="left" valign="top">&#x201C;Frequently examine the data for any patterns such as large blocks of blank question.&#x201D; [<xref ref-type="bibr" rid="ref29">29</xref>]</td><td align="left" valign="top">8.9%</td></tr><tr><td align="left" valign="top">Changing payment protocols</td><td align="left" valign="top">Intentionally not emphasizing and not automating participant payments. For example, not including the payment amount in recruitment materials.</td><td align="left" valign="top">&#x201C;To maximize reach and limit fraud, gift cards could be manually distributed via text or email after each survey is verified.&#x201D; [<xref ref-type="bibr" rid="ref30">30</xref>]</td><td align="left" valign="top">21.1%</td></tr><tr><td align="left" valign="top">Not paying fraudulent respondents</td><td align="left" valign="top">Informing potential participants in the consent form that fraudulent participants will not be compensated. This helps researchers not waste money on fraudulent participants.</td><td align="left" valign="top">&#x201C;On the consent form, participants were also informed that &#x201C;&#x2026;we have put in place a number of safeguards to ensure that participants provide valid and accurate data for this study. If we have strong reason to believe your data are invalid, your responses will not be approved or paid and your data will be discarded.&#x201D; [<xref ref-type="bibr" rid="ref31">31</xref>]</td><td align="left" valign="top">11.1%</td></tr><tr><td align="left" valign="top" colspan="5">No longer effective</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">IP address or Geolocation</td><td align="left" valign="top">Examining participant IP and geolocation to see if they match location requirements of study and screening for duplicate IP addresses.</td><td align="left" valign="top">&#x201C;[Researchers used] other survey platform features to track IP addresses, geolocation, latitude and longitude, and participants&#x2019; postal codes when they discovered that geographic markers or indicators did not match the participants&#x2019; stated location of residence.&#x201D; [<xref ref-type="bibr" rid="ref32">32</xref>]</td><td align="left" valign="top">65.6%</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">(re)<break/>CAPTCHA</td><td align="left" valign="top">Including tests that can help to screen out bots by providing challenges that theoretically only humans can complete.</td><td align="left" valign="top">&#x201C;Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) script was created and implemented into the Google Form.&#x201D; [<xref ref-type="bibr" rid="ref33">33</xref>]</td><td align="left" valign="top">45.6%</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Timing checks</td><td align="left" valign="top">Checking for unusually fast or slow response times, which can indicate bots or satisficing.</td><td align="left" valign="top">&#x201C;We noticed a large proportion of responses with improbably fast completion times (as well as those with particularly long completion times, eg, 4220&#x2009;min).&#x201D; [<xref ref-type="bibr" rid="ref34">34</xref>]</td><td align="left" valign="top">45.6%</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Open-ended questions</td><td align="left" valign="top">Including open-ended questions and reviewing the responses. This can help assess attention as well as check for bots who may incoherently respond.</td><td align="left" valign="top">&#x201C;Another indicator of data quality is suspicious responses to open-ended questions. For example, when given an open response box to report thoughts or ask questions at the end of the survey, responses written in all caps, one-word responses seemingly unrelated to the prompt, restatements of parts of the question, or nonsensical phrases.&#x201D; [<xref ref-type="bibr" rid="ref35">35</xref>]</td><td align="left" valign="top">37.8%</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Honeypots</td><td align="left" valign="top">Incorporating questions into only the code of a survey, such that they are not visible to the human eye. These questions would only be answered by bots.</td><td align="left" valign="top">&#x201C;We added a honeypot question as a second line of defense against bots. Honeypots are survey questions hidden from rendering on the screen using custom JavaScript code.&#x201D; [<xref ref-type="bibr" rid="ref36">36</xref>]</td><td align="left" valign="top">14.4%</td></tr></tbody></table><table-wrap-foot><fn id="table2fn1"><p><sup>a</sup>Freq.: frequency of articles mentioning this technique.</p></fn></table-wrap-foot></table-wrap><p>Several techniques were deemed &#x201C;somewhat effective,&#x201D; as they had notable benefits as well as limitations. For example, attention check questions help detect satisficers and some types of bots but are ineffective against fraudulent participants. Many studies noted suspicion when a large number of surveys were completed at once, as that can indicate their study has been &#x201C;discovered&#x201D; by bots or fraudulent respondents; thus, being watchful of a large number of responses is a useful technique but is not sufficient for detecting all cases of threats to data integrity. Another technique, changing payment protocols (eg, intentionally not emphasizing participant payments in recruitment materials), was framed as a preventative measure rather than a definitive means of detecting fraud.</p><p>Finally, several techniques were deemed &#x201C;no longer effective&#x201D; by the authors: IP address and geolocation checks, reCAPTCHA, timing checks (ie, checking for unusually fast or unusually slow responses), open-ended questions, and honeypot questions (ie, questions not visible to the human eye but would be seen and answered by bots). Although many studies still report using these techniques, many authors also discussed how such methods can now be easily bypassed. For example, reCAPTCHA is not a challenge for most advanced bots, and certainly not for fraudulent participants. Likewise, proxy servers can help &#x201C;fake&#x201D; a local IP address. The invention of ChatGPT (OpenAI) and other artificial intelligence natural language processing chatbots makes short answer questions a less effective means of screening, as bots are often able to respond coherently to open-ended questions. Some bots can also be trained to complete surveys in a realistic timeframe and are also able to overlook honeypot questions. Therefore, although they are still somewhat useful for removing simpler bots and fraud attempts, these &#x201C;no longer effective&#x201D; techniques are unable to catch or detect more sophisticated attacks and should not be overly relied upon.</p><p>While discussing techniques to improve data integrity, many authors reflected on ethical considerations. For instance, as most &#x201C;very effective&#x201D; techniques require asking both personal and personally identifiable questions, additional procedures to protect participant privacy and rights may be necessary [<xref ref-type="bibr" rid="ref37">37</xref>]. Another key ethical concern expressed by researchers was mistakenly excluding genuine participants. For example, fraud detection methods have the potential to introduce selection bias, such as when blocking responses from the same IP address deters residents of high-density housing developments [<xref ref-type="bibr" rid="ref24">24</xref>]. Deterring genuine participants is also a major concern; for example, many techniques, such as requiring a video call at screening, can place additional burdens on participants and feel invasive [<xref ref-type="bibr" rid="ref4">4</xref>]. Similarly, verification techniques that convey doubt to participants about their genuineness can compromise trust [<xref ref-type="bibr" rid="ref38">38</xref>]. As a counter to these concerns, other authors discussed how techniques such as videoconferencing, when conducted with sensitivity, can foster and strengthen rapport and help researchers better understand their participant population [<xref ref-type="bibr" rid="ref39">39</xref>]. Ultimately, thoughtful study design was encouraged, such as urging researchers to reflect on how to best balance their needs of (1) research integrity and quality; (2) feasibility and efficiency; and (3) safeguarding participants&#x2019; rights, safety, and privacy [<xref ref-type="bibr" rid="ref38">38</xref>]. Often, somewhat minor changes can help work toward this balance. For example, Singh and Sagar [<xref ref-type="bibr" rid="ref37">37</xref>] encourage methods such as deidentifying data, using encryption processes or password-protected data storage, and using HIPAA (Health Insurance Portability and Accountability Act)-compliant online survey platforms. And Roehl and Harland [<xref ref-type="bibr" rid="ref5">5</xref>] emphasized the importance of transparency during the consent process, so that participants are aware of what identifiable information will be requested from them and why.</p></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>Online research is expanding and holds great promise for innovative and impactful research. But as techniques to protect data integrity advance, so too do the methods of mendacious individuals providing false or unreliable responses for monetary gain. In this scoping review, we identified 90 articles published since 2020 that described methods for addressing online threats to data integrity [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref103">103</xref>]. We found that some of the most common techniques discussed were IP Address or Geolocation checks and reCAPTHCA. This is concerning, given that several articles detailed the reasons these techniques are no longer effective against sophisticated bots or fraudulent participants. Overall, these findings reveal a crucial area for improvement in handling threats to online data integrity. Yet our review also discovered new and innovative techniques for addressing threats to online data integrity. Specifically, we found that authenticating personal information, posing background-related questions, and cross-checking inconsistent answers were deemed very effective techniques for addressing contemporary threats.</p></sec><sec id="s4-2"><title>Recommendations</title><p>While there is no one foolproof way for researchers to prevent participant fraud, it is clear from this review that the field has moved beyond reCAPTCHA as a sufficient technique for ensuring data integrity. Bots are advancing and fraudulent participants are becoming more sophisticated, making reCAPTCHA ill-equipped to handle the scope of the current problem. We recommend that researchers engaging in online data collection develop a robust strategy for ensuring data integrity early in the design of their research protocol. For such designs, we recommend that researchers use multiple techniques (rather than relying on the soundness of just one technique), use the techniques described in the articles reviewed here, and draw the most from techniques deemed to be &#x201C;very effective.&#x201D; Although the constraints of timelines, person power, and budgets can render some techniques unfeasible, many &#x201C;very effective&#x201D; techniques are efficient and low cost; for example, researchers can think creatively to develop background-related questions that, even with internet searching, would only be readily known and (or) accurately answered by their population. When relying on survey service platforms for access to online samples, researchers should be critical of the techniques used by the platforms to guarantee the quality of their panels. We also suggest that techniques for ensuring data integrity should be critically considered by journal editors, journal reviewers, and grant reviewers when evaluating the rigor of study methods.</p><p>The ethical concerns discussed by the articles in this review highlight the responsibilities of researchers to continue focusing on participant rights and privacy. Techniques for ensuring data integrity (eg, personal questions to authenticate identity) should be balanced against these responsibilities. More broadly, the comfort of participants and their rapport with the study team should be considered. The relative weight of these considerations will vary depending on many factors. For instance, more complex study designs (eg, longitudinal studies that rely on participant trust and investment for good retention) may require techniques that integrate authentication checks with rapport-building. The vulnerability of the sample and the sensitivity of the research topic must also be considered. Techniques for improving data integrity that increase participant burden, barriers, or privacy risk must be matched with greater participant accommodations&#x2014;this could include greater compensation, clear explanations to participants during consent and enrollment about why certain questions are being asked, and enhanced data protection measures. Researchers attempting to exclude fraudulent participants should always be aware of their own biases and ensure that they are not excluding participants simply because they do not align with expected results.</p></sec><sec id="s4-3"><title>Limitations and Future Directions</title><p>Our scoping review has some limitations. First, we only used one database for review (PubMed). This was done due to the large volume of articles on the subject and our focus on health research; however, it may have overlooked insights from other fields. Second, our search terms led to the studies reviewed primarily focusing on bots, fraudulent participants, and repeat participants, likely leading to an overestimation of these behaviors and an underestimation of the prevalence of participant satisficing and the tactics used to mitigate those behaviors. It is important to acknowledge that moving forward, some tactics that are currently in our &#x201C;very effective&#x201D; category may become less effective with the evolution of artificial intelligence, or as fraudulent participants become more familiar with current strategies. Going forward, more empirical studies should be conducted on research methods for addressing threats to data integrity, to quantitatively compare the effectiveness of various techniques used to address threats to data integrity in online research. Future work should also consider the participant perspective on these various techniques in order to improve their effectiveness and minimize negative consequences.</p></sec><sec id="s4-4"><title>Conclusions</title><p>Threats to data integrity appear to be on the rise, particularly with online research, and numerous solutions and prevention strategies have been recommended. In order to aid researchers in developing robust online methodologies, this scoping review discusses the most common types of threats to data integrity, synthesizes the most common prevention methods, and discusses the ethical considerations raised about the techniques. Doubtless, new threats to data integrity will continue to emerge, and researchers should continue developing the most effective methods in response.</p></sec></sec></body><back><ack><p>Research reported in this publication was supported by the National Cancer Institute and Food and Drug Administration's Center for Tobacco Products (CTP; grant U54CA287392). The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health or the Food and Drug Administration.</p></ack><notes><sec><title>Data Availability</title><p>All data generated or analyzed during this study are included in this published article and its supplementary information files.</p></sec></notes><fn-group><fn fn-type="con"><p>IBS contributed to conceptualization (lead), data curation (lead), formal analysis (equal), investigation (lead), methodology (equal), and writing&#x2014;original draft (lead). AKF was responsible for funding acquisition (equal), methodology (supporting), and writing&#x2014;review and editing (equal). APT, JGP, and NJKB contributed to methodology (supporting) and writing&#x2014;review and editing (equal). JD participated in formal analysis (equal) and writing&#x2014;review and editing (equal). MER contributed to conceptualization (supporting), funding acquisition (equal), formal analysis (equal), investigation (supporting), methodology (supporting), supervision (lead), and writing&#x2014;review and editing (lead).</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">HIPAA</term><def><p>Health Insurance Portability and Accountability Act</p></def></def-item><def-item><term id="abb2">PRISMA</term><def><p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Maheu</surname><given-names>C</given-names> </name><name name-style="western"><surname>Lemonde</surname><given-names>M</given-names> </name><name name-style="western"><surname>Mayo</surname><given-names>S</given-names> </name><name name-style="western"><surname>Galica</surname><given-names>J</given-names> </name><name name-style="western"><surname>Bally</surname><given-names>J</given-names> </name></person-group><article-title>Moving research forward during COVID-19</article-title><source>Can Oncol Nurs J</source><year>2021</year><volume>31</volume><issue>4</issue><fpage>490</fpage><lpage>492</lpage><pub-id pub-id-type="medline">34786468</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Myers</surname><given-names>KJ</given-names> </name><name name-style="western"><surname>Jaffe</surname><given-names>T</given-names> </name><name name-style="western"><surname>Kanda</surname><given-names>DA</given-names> </name><etal/></person-group><article-title>Reaching the &#x201C;Hard-to-Reach&#x201D; sexual and gender diverse communities for population-based research in cancer prevention and control: methods for online survey data collection and management</article-title><source>Front Oncol</source><year>2022</year><volume>12</volume><fpage>841951</fpage><pub-id pub-id-type="doi">10.3389/fonc.2022.841951</pub-id><pub-id pub-id-type="medline">35756657</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Upadhyay</surname><given-names>UD</given-names> </name><name name-style="western"><surname>Jovel</surname><given-names>IJ</given-names> </name><name name-style="western"><surname>McCuaig</surname><given-names>KD</given-names> </name><name name-style="western"><surname>Cartwright</surname><given-names>AF</given-names> </name></person-group><article-title>Using Google Ads to recruit and retain a cohort considering abortion in the United States</article-title><source>Contracept X</source><year>2020</year><volume>2</volume><fpage>100017</fpage><pub-id pub-id-type="doi">10.1016/j.conx.2019.100017</pub-id><pub-id pub-id-type="medline">32550532</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pellicano</surname><given-names>E</given-names> </name><name name-style="western"><surname>Adams</surname><given-names>D</given-names> </name><name name-style="western"><surname>Crane</surname><given-names>L</given-names> </name><etal/></person-group><article-title>Letter to the Editor: a possible threat to data integrity for online qualitative autism research</article-title><source>Autism</source><year>2024</year><month>03</month><volume>28</volume><issue>3</issue><fpage>786</fpage><lpage>792</lpage><pub-id pub-id-type="doi">10.1177/13623613231174543</pub-id><pub-id pub-id-type="medline">37212144</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Roehl</surname><given-names>JM</given-names> </name><name name-style="western"><surname>Harland</surname><given-names>DJ</given-names> </name></person-group><article-title>Imposter participants: overcoming methodological challenges related to balancing participant privacy with data quality when using online recruitment and data collection</article-title><source>Qual Rep</source><year>2022</year><volume>27</volume><fpage>2469</fpage><lpage>2485</lpage><pub-id pub-id-type="doi">10.46743/2160-3715/2022.5475</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Krosnick</surname><given-names>JA</given-names> </name><name name-style="western"><surname>Alwin</surname><given-names>DF</given-names> </name></person-group><article-title>An evaluation of a cognitive theory of response-order effects in survey measurement</article-title><source>Public Opin Q</source><year>1987</year><volume>51</volume><issue>2</issue><fpage>201</fpage><pub-id pub-id-type="doi">10.1086/269029</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="report"><person-group person-group-type="author"><name name-style="western"><surname>Suskie</surname><given-names>LA</given-names> </name></person-group><article-title>Survey research: what works for the institutional researcher. institutional research information series no. 1</article-title><year>1988</year><publisher-name>North East Association for Institutional Research, C/O Larry Metzger, Ithaca College</publisher-name></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bauermeister</surname><given-names>J</given-names> </name><name name-style="western"><surname>Pingel</surname><given-names>E</given-names> </name><name name-style="western"><surname>Zimmerman</surname><given-names>M</given-names> </name><name name-style="western"><surname>Couper</surname><given-names>M</given-names> </name><name name-style="western"><surname>Carballo-Di&#x00E9;guez</surname><given-names>A</given-names> </name><name name-style="western"><surname>Strecher</surname><given-names>VJ</given-names> </name></person-group><article-title>Data quality in web-based HIV/AIDS research: handling invalid and suspicious data</article-title><source>Field Methods</source><year>2012</year><month>08</month><day>1</day><volume>24</volume><issue>3</issue><fpage>272</fpage><lpage>291</lpage><pub-id pub-id-type="doi">10.1177/1525822X12443097</pub-id><pub-id pub-id-type="medline">23180978</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Teitcher</surname><given-names>JEF</given-names> </name><name name-style="western"><surname>Bockting</surname><given-names>WO</given-names> </name><name name-style="western"><surname>Bauermeister</surname><given-names>JA</given-names> </name><name name-style="western"><surname>Hoefer</surname><given-names>CJ</given-names> </name><name name-style="western"><surname>Miner</surname><given-names>MH</given-names> </name><name name-style="western"><surname>Klitzman</surname><given-names>RL</given-names> </name></person-group><article-title>Detecting, preventing, and responding to &#x201C;fraudsters&#x201D; in internet research: ethics and tradeoffs</article-title><source>J Law Med Ethics</source><year>2015</year><volume>43</volume><issue>1</issue><fpage>116</fpage><lpage>133</lpage><pub-id pub-id-type="doi">10.1111/jlme.12200</pub-id><pub-id pub-id-type="medline">25846043</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pullen Sansfa&#x00E7;on</surname><given-names>A</given-names> </name><name name-style="western"><surname>Gravel</surname><given-names>E</given-names> </name><name name-style="western"><surname>Gelly</surname><given-names>MA</given-names> </name></person-group><article-title>Dealing with scam in online qualitative research: strategies and ethical considerations</article-title><source>Int J Qual Methods</source><year>2024</year><month>01</month><volume>23</volume><pub-id pub-id-type="doi">10.1177/16094069231224610</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lawrence</surname><given-names>PR</given-names> </name><name name-style="western"><surname>Osborne</surname><given-names>MC</given-names> </name><name name-style="western"><surname>Sharma</surname><given-names>D</given-names> </name><name name-style="western"><surname>Spratling</surname><given-names>R</given-names> </name><name name-style="western"><surname>Calamaro</surname><given-names>CJ</given-names> </name></person-group><article-title>Methodological challenge: addressing bots in online research</article-title><source>J Pediatr Health Care</source><year>2023</year><volume>37</volume><issue>3</issue><fpage>328</fpage><lpage>332</lpage><pub-id pub-id-type="doi">10.1016/j.pedhc.2022.12.006</pub-id><pub-id pub-id-type="medline">36717299</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="other"><person-group person-group-type="author"><name name-style="western"><surname>Al-Fannah</surname><given-names>NM</given-names> </name></person-group><article-title>Making defeating captchas harder for bots 2017</article-title><source>arXiv</source><access-date>2025-08-11</access-date><comment>Preprint posted online on  Apr 10, 2017</comment><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.1704.02803">https://doi.org/10.48550/arXiv.1704.02803</ext-link></comment></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Perkel</surname><given-names>JM</given-names> </name></person-group><article-title>Mischief-making bots attacked my scientific survey</article-title><source>Nature New Biol</source><year>2020</year><month>03</month><volume>579</volume><issue>7799</issue><fpage>461</fpage><lpage>461</lpage><pub-id pub-id-type="doi">10.1038/d41586-020-00768-0</pub-id><pub-id pub-id-type="medline">32184487</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Storozuk</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ashley</surname><given-names>M</given-names> </name><name name-style="western"><surname>Delage</surname><given-names>V</given-names> </name><name name-style="western"><surname>Maloney</surname><given-names>EA</given-names> </name></person-group><article-title>Got bots? Practical recommendations to protect online survey data from bot attacks</article-title><source>Quant Method Psychol</source><year>2020</year><volume>16</volume><issue>5</issue><fpage>472</fpage><lpage>481</lpage><pub-id pub-id-type="doi">10.20982/tqmp.16.5.p472</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chandler</surname><given-names>J</given-names> </name><name name-style="western"><surname>Sisso</surname><given-names>I</given-names> </name><name name-style="western"><surname>Shapiro</surname><given-names>D</given-names> </name></person-group><article-title>Participant carelessness and fraud: consequences for clinical research and potential solutions</article-title><source>J Abnorm Psychol</source><year>2020</year><month>01</month><volume>129</volume><issue>1</issue><fpage>49</fpage><lpage>55</lpage><pub-id pub-id-type="doi">10.1037/abn0000479</pub-id><pub-id pub-id-type="medline">31868387</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Devine</surname><given-names>EG</given-names> </name><name name-style="western"><surname>Pingitore</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Margiotta</surname><given-names>KN</given-names> </name><etal/></person-group><article-title>Frequency of concealment, fabrication and falsification of study data by deceptive subjects</article-title><source>Contemp Clin Trials Commun</source><year>2021</year><month>03</month><volume>21</volume><fpage>100713</fpage><pub-id pub-id-type="doi">10.1016/j.conctc.2021.100713</pub-id><pub-id pub-id-type="medline">33604482</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Siegel</surname><given-names>JT</given-names> </name><name name-style="western"><surname>Navarro</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Thomson</surname><given-names>AL</given-names> </name></person-group><article-title>The impact of overtly listing eligibility requirements on MTurk: an investigation involving organ donation, recruitment scripts, and feelings of elevation</article-title><source>Soc Sci Med</source><year>2015</year><month>10</month><volume>142</volume><fpage>256</fpage><lpage>260</lpage><pub-id pub-id-type="doi">10.1016/j.socscimed.2015.08.020</pub-id><pub-id pub-id-type="medline">26322721</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Siegel</surname><given-names>JT</given-names> </name><name name-style="western"><surname>Navarro</surname><given-names>M</given-names> </name></person-group><article-title>A conceptual replication examining the risk of overtly listing eligibility criteria on Amazon&#x2019;s Mechanical Turk</article-title><source>J Applied Social Pyschol</source><year>2019</year><month>04</month><volume>49</volume><issue>4</issue><fpage>239</fpage><lpage>248</lpage><pub-id pub-id-type="doi">10.1111/jasp.12580</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sharpe Wessling</surname><given-names>K</given-names> </name><name name-style="western"><surname>Huber</surname><given-names>J</given-names> </name><name name-style="western"><surname>Netzer</surname><given-names>O</given-names> </name></person-group><article-title>MTurk character misrepresentation: assessment and solutions</article-title><source>J Consum Res</source><year>2017</year><month>06</month><day>1</day><volume>44</volume><issue>1</issue><fpage>211</fpage><lpage>230</lpage><pub-id pub-id-type="doi">10.1093/jcr/ucx053</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gordon</surname><given-names>JH</given-names> </name><name name-style="western"><surname>Fujinaga-Gordon</surname><given-names>K</given-names> </name><name name-style="western"><surname>Sherwin</surname><given-names>C</given-names> </name></person-group><article-title>Fraudulent online survey respondents may disproportionately threaten validity of research in small target populations</article-title><source>Health Expect</source><year>2024</year><month>06</month><volume>27</volume><issue>3</issue><fpage>e14099</fpage><pub-id pub-id-type="doi">10.1111/hex.14099</pub-id><pub-id pub-id-type="medline">38845165</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hardesty</surname><given-names>JJ</given-names> </name><name name-style="western"><surname>Crespi</surname><given-names>E</given-names> </name><name name-style="western"><surname>Nian</surname><given-names>Q</given-names> </name><etal/></person-group><article-title>The vaping and patterns of e-cigarette use research study: protocol for a web-based cohort study</article-title><source>JMIR Res Protoc</source><year>2023</year><month>03</month><day>2</day><volume>12</volume><fpage>e38732</fpage><pub-id pub-id-type="doi">10.2196/38732</pub-id><pub-id pub-id-type="medline">36862467</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Davidson</surname><given-names>RD</given-names> </name><name name-style="western"><surname>Biddle</surname><given-names>K</given-names> </name><name name-style="western"><surname>Nassan</surname><given-names>M</given-names> </name><name name-style="western"><surname>Scammell</surname><given-names>TE</given-names> </name><name name-style="western"><surname>Zhou</surname><given-names>ES</given-names> </name></person-group><article-title>The impact of narcolepsy on social relationships in young adults</article-title><source>J Clin Sleep Med</source><year>2022</year><month>12</month><day>1</day><volume>18</volume><issue>12</issue><fpage>2751</fpage><lpage>2761</lpage><pub-id pub-id-type="doi">10.5664/jcsm.10212</pub-id><pub-id pub-id-type="medline">35946418</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tannahill</surname><given-names>HS</given-names> </name><name name-style="western"><surname>Blais</surname><given-names>RK</given-names> </name></person-group><article-title>Using military screening questions to anonymously recruit post-9/11 era service members and veterans using online survey methods</article-title><source>Mil Med</source><year>2024</year><month>05</month><day>18</day><volume>189</volume><issue>5-6</issue><fpage>e1282</fpage><lpage>e1288</lpage><pub-id pub-id-type="doi">10.1093/milmed/usad469</pub-id><pub-id pub-id-type="medline">38140962</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Guest</surname><given-names>JL</given-names> </name><name name-style="western"><surname>Adam</surname><given-names>E</given-names> </name><name name-style="western"><surname>Lucas</surname><given-names>IL</given-names> </name><etal/></person-group><article-title>Methods for authenticating participants in fully web-based mobile app trials from the iReach Project: cross-sectional study</article-title><source>JMIR Mhealth Uhealth</source><year>2021</year><month>08</month><day>31</day><volume>9</volume><issue>8</issue><fpage>e28232</fpage><pub-id pub-id-type="doi">10.2196/28232</pub-id><pub-id pub-id-type="medline">34463631</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Webb</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Tangney</surname><given-names>JP</given-names> </name></person-group><article-title>Too good to be true: bots and bad data from Mechanical Turk</article-title><source>Perspect Psychol Sci</source><year>2024</year><month>11</month><volume>19</volume><issue>6</issue><fpage>887</fpage><lpage>890</lpage><pub-id pub-id-type="doi">10.1177/17456916221120027</pub-id><pub-id pub-id-type="medline">36343213</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mizerek</surname><given-names>E</given-names> </name><name name-style="western"><surname>Wolf</surname><given-names>L</given-names> </name><name name-style="western"><surname>Moon</surname><given-names>MD</given-names> </name></person-group><article-title>Identifying and mitigating fraud when using social media for research recruitment</article-title><source>J Emerg Nurs</source><year>2023</year><month>07</month><volume>49</volume><issue>4</issue><fpage>530</fpage><lpage>533</lpage><pub-id pub-id-type="doi">10.1016/j.jen.2023.04.002</pub-id><pub-id pub-id-type="medline">37393079</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chen</surname><given-names>AT</given-names> </name><name name-style="western"><surname>Komi</surname><given-names>M</given-names> </name><name name-style="western"><surname>Bessler</surname><given-names>S</given-names> </name><name name-style="western"><surname>Mikles</surname><given-names>SP</given-names> </name><name name-style="western"><surname>Zhang</surname><given-names>Y</given-names> </name></person-group><article-title>Integrating statistical and visual analytic methods for bot identification of health-related survey data</article-title><source>J Biomed Inform</source><year>2023</year><month>08</month><volume>144</volume><fpage>104439</fpage><pub-id pub-id-type="doi">10.1016/j.jbi.2023.104439</pub-id><pub-id pub-id-type="medline">37419375</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hohn</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Braswell</surname><given-names>AA</given-names> </name><name name-style="western"><surname>DeVita</surname><given-names>JM</given-names> </name></person-group><article-title>Preventing and protecting against internet research fraud in anonymous web-based research: protocol for the development and implementation of an anonymous web-based data integrity plan</article-title><source>JMIR Res Protoc</source><year>2022</year><month>09</month><day>12</day><volume>11</volume><issue>9</issue><fpage>e38550</fpage><pub-id pub-id-type="doi">10.2196/38550</pub-id><pub-id pub-id-type="medline">36094806</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bybee</surname><given-names>S</given-names> </name><name name-style="western"><surname>Cloyes</surname><given-names>K</given-names> </name><name name-style="western"><surname>Ellington</surname><given-names>L</given-names> </name><name name-style="western"><surname>Baucom</surname><given-names>B</given-names> </name><name name-style="western"><surname>Supiano</surname><given-names>K</given-names> </name><name name-style="western"><surname>Mooney</surname><given-names>K</given-names> </name></person-group><article-title>Bots and nots: safeguarding online survey research with underrepresented and diverse populations</article-title><source>Psychol Sex</source><year>2022</year><volume>13</volume><issue>4</issue><fpage>901</fpage><lpage>911</lpage><pub-id pub-id-type="doi">10.1080/19419899.2021.1936617</pub-id><pub-id pub-id-type="medline">36439051</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Salem</surname><given-names>M</given-names> </name><name name-style="western"><surname>Pollack</surname><given-names>L</given-names> </name><name name-style="western"><surname>Zepeda</surname><given-names>A</given-names> </name><name name-style="western"><surname>Tebb</surname><given-names>KP</given-names> </name></person-group><article-title>Utilization of online systems to promote youth participation in research: a methodological study</article-title><source>World J Methodol</source><year>2023</year><month>09</month><day>20</day><volume>13</volume><issue>4</issue><fpage>210</fpage><lpage>222</lpage><pub-id pub-id-type="doi">10.5662/wjm.v13.i4.210</pub-id><pub-id pub-id-type="medline">37771869</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gratz</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Tull</surname><given-names>MT</given-names> </name><name name-style="western"><surname>Richmond</surname><given-names>JR</given-names> </name><name name-style="western"><surname>Edmonds</surname><given-names>KA</given-names> </name><name name-style="western"><surname>Scamaldo</surname><given-names>KM</given-names> </name><name name-style="western"><surname>Rose</surname><given-names>JP</given-names> </name></person-group><article-title>Thwarted belongingness and perceived burdensomeness explain the associations of COVID-19 social and economic consequences to suicide risk</article-title><source>Suicide Life Threat Behav</source><year>2020</year><month>12</month><volume>50</volume><issue>6</issue><fpage>1140</fpage><lpage>1148</lpage><pub-id pub-id-type="doi">10.1111/sltb.12654</pub-id><pub-id pub-id-type="medline">32589811</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kumarasamy</surname><given-names>V</given-names> </name><name name-style="western"><surname>Goodfellow</surname><given-names>N</given-names> </name><name name-style="western"><surname>Ferron</surname><given-names>EM</given-names> </name><name name-style="western"><surname>Wright</surname><given-names>AL</given-names> </name></person-group><article-title>Evaluating the problem of fraudulent participants in health care research: multimethod pilot study</article-title><source>JMIR Form Res</source><year>2024</year><month>06</month><day>4</day><volume>8</volume><fpage>e51530</fpage><pub-id pub-id-type="doi">10.2196/51530</pub-id><pub-id pub-id-type="medline">38833292</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bisdas</surname><given-names>S</given-names> </name><name name-style="western"><surname>Topriceanu</surname><given-names>CC</given-names> </name><name name-style="western"><surname>Zakrzewska</surname><given-names>Z</given-names> </name><etal/></person-group><article-title>Artificial intelligence in medicine: a multinational multi-center survey on the medical and dental students&#x2019; perception</article-title><source>Front Public Health</source><year>2021</year><volume>9</volume><fpage>795284</fpage><pub-id pub-id-type="doi">10.3389/fpubh.2021.795284</pub-id><pub-id pub-id-type="medline">35004598</pub-id></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Burnette</surname><given-names>CB</given-names> </name><name name-style="western"><surname>Luzier</surname><given-names>JL</given-names> </name><name name-style="western"><surname>Bennett</surname><given-names>BL</given-names> </name><etal/></person-group><article-title>Concerns and recommendations for using Amazon MTurk for eating disorder research</article-title><source>Int J Eat Disord</source><year>2022</year><month>02</month><volume>55</volume><issue>2</issue><fpage>263</fpage><lpage>272</lpage><pub-id pub-id-type="doi">10.1002/eat.23614</pub-id><pub-id pub-id-type="medline">34562036</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Douglas</surname><given-names>BD</given-names> </name><name name-style="western"><surname>Ewell</surname><given-names>PJ</given-names> </name><name name-style="western"><surname>Brauer</surname><given-names>M</given-names> </name></person-group><article-title>Data quality in online human-subjects research: comparisons between MTurk, Prolific, CloudResearch, Qualtrics, and SONA</article-title><source>PLoS One</source><year>2023</year><volume>18</volume><issue>3</issue><fpage>e0279720</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0279720</pub-id><pub-id pub-id-type="medline">36917576</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bonett</surname><given-names>S</given-names> </name><name name-style="western"><surname>Lin</surname><given-names>W</given-names> </name><name name-style="western"><surname>Sexton Topper</surname><given-names>P</given-names> </name><etal/></person-group><article-title>Assessing and improving data integrity in web-based surveys: comparison of fraud detection systems in a COVID-19 study</article-title><source>JMIR Form Res</source><year>2024</year><month>01</month><day>12</day><volume>8</volume><fpage>e47091</fpage><pub-id pub-id-type="doi">10.2196/47091</pub-id><pub-id pub-id-type="medline">38214962</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Singh</surname><given-names>S</given-names> </name><name name-style="western"><surname>Sagar</surname><given-names>R</given-names> </name></person-group><article-title>A critical look at online survey or questionnaire-based research studies during COVID-19</article-title><source>Asian J Psychiatr</source><year>2021</year><month>11</month><volume>65</volume><fpage>102850</fpage><pub-id pub-id-type="doi">10.1016/j.ajp.2021.102850</pub-id><pub-id pub-id-type="medline">34534919</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wright</surname><given-names>M</given-names> </name><name name-style="western"><surname>Matheson</surname><given-names>J</given-names> </name><name name-style="western"><surname>Watson</surname><given-names>TM</given-names> </name><name name-style="western"><surname>Sproule</surname><given-names>B</given-names> </name><name name-style="western"><surname>Le Foll</surname><given-names>B</given-names> </name><name name-style="western"><surname>Brands</surname><given-names>B</given-names> </name></person-group><article-title>Participant fraud in virtual qualitative substance use research: recommendations and considerations for detection and prevention based on a case study</article-title><source>Subst Use Misuse</source><year>2024</year><volume>59</volume><issue>8</issue><fpage>1261</fpage><lpage>1270</lpage><pub-id pub-id-type="doi">10.1080/10826084.2024.2330892</pub-id><pub-id pub-id-type="medline">38503716</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wood</surname><given-names>NK</given-names> </name><name name-style="western"><surname>Bindler</surname><given-names>RJ</given-names> </name></person-group><article-title>A videoconferencing verification method for enrollment of breastfeeding dyads to an online prospective mixed methods study during the COVID-19 pandemic</article-title><source>J Adv Nurs</source><year>2024</year><month>07</month><volume>80</volume><issue>7</issue><fpage>2970</fpage><lpage>2976</lpage><pub-id pub-id-type="doi">10.1111/jan.15981</pub-id><pub-id pub-id-type="medline">38012846</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Agley</surname><given-names>J</given-names> </name><name name-style="western"><surname>Xiao</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Nolan</surname><given-names>R</given-names> </name><name name-style="western"><surname>Golzarri-Arroyo</surname><given-names>L</given-names> </name></person-group><article-title>Quality control questions on Amazon&#x2019;s Mechanical Turk (MTurk): a randomized trial of impact on the USAUDIT, PHQ-9, and GAD-7</article-title><source>Behav Res Methods</source><year>2022</year><month>04</month><volume>54</volume><issue>2</issue><fpage>885</fpage><lpage>897</lpage><pub-id pub-id-type="doi">10.3758/s13428-021-01665-8</pub-id><pub-id pub-id-type="medline">34357539</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bethel</surname><given-names>C</given-names> </name><name name-style="western"><surname>Rainbow</surname><given-names>JG</given-names> </name><name name-style="western"><surname>Dudding</surname><given-names>KM</given-names> </name></person-group><article-title>Recruiting nurses via social media for survey studies</article-title><source>Nurs Res</source><year>2021</year><volume>70</volume><issue>3</issue><fpage>231</fpage><lpage>235</lpage><pub-id pub-id-type="doi">10.1097/NNR.0000000000000482</pub-id><pub-id pub-id-type="medline">33060416</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bush</surname><given-names>J</given-names> </name><name name-style="western"><surname>Blackwell</surname><given-names>CW</given-names> </name></person-group><article-title>Social media as a recruitment strategy with transgender-identified individuals: using an ethical lens to direct methodology</article-title><source>J Transcult Nurs</source><year>2022</year><month>09</month><volume>33</volume><issue>5</issue><fpage>603</fpage><lpage>614</lpage><pub-id pub-id-type="doi">10.1177/10436596221101928</pub-id><pub-id pub-id-type="medline">35699438</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Campbell</surname><given-names>CK</given-names> </name><name name-style="western"><surname>Ndukwe</surname><given-names>S</given-names> </name><name name-style="western"><surname>Dub&#x00E9;</surname><given-names>K</given-names> </name><name name-style="western"><surname>Sauceda</surname><given-names>JA</given-names> </name><name name-style="western"><surname>Saberi</surname><given-names>P</given-names> </name></person-group><article-title>Overcoming challenges of online research: measures to ensure enrollment of eligible participants</article-title><source>JJ Acquir Immune Defic Syndr</source><year>2022</year><volume>91</volume><issue>2</issue><fpage>232</fpage><lpage>236</lpage><pub-id pub-id-type="doi">10.1097/QAI.0000000000003035</pub-id><pub-id pub-id-type="medline">36094490</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Davies</surname><given-names>MR</given-names> </name><name name-style="western"><surname>Monssen</surname><given-names>D</given-names> </name><name name-style="western"><surname>Sharpe</surname><given-names>H</given-names> </name><etal/></person-group><article-title>Management of fraudulent participants in online research: practical recommendations from a randomized controlled feasibility trial</article-title><source>Int J Eat Disord</source><year>2024</year><month>06</month><access-date>2025-08-11</access-date><volume>57</volume><issue>6</issue><fpage>1311</fpage><lpage>1321</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://onlinelibrary.wiley.com/toc/1098108x/57/6">https://onlinelibrary.wiley.com/toc/1098108x/57/6</ext-link></comment><pub-id pub-id-type="doi">10.1002/eat.24085</pub-id><pub-id pub-id-type="medline">37921564</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Drysdale</surname><given-names>K</given-names> </name><name name-style="western"><surname>Wells</surname><given-names>N</given-names> </name><name name-style="western"><surname>Smith</surname><given-names>AKJ</given-names> </name><name name-style="western"><surname>Gunatillaka</surname><given-names>N</given-names> </name><name name-style="western"><surname>Sturgiss</surname><given-names>EA</given-names> </name><name name-style="western"><surname>Wark</surname><given-names>T</given-names> </name></person-group><article-title>Beyond the challenge to research integrity: imposter participation in incentivised qualitative research and its impact on community engagement</article-title><source>Health Sociol Rev</source><year>2023</year><month>09</month><day>2</day><volume>32</volume><issue>3</issue><fpage>372</fpage><lpage>380</lpage><pub-id pub-id-type="doi">10.1080/14461242.2023.2261433</pub-id><pub-id pub-id-type="medline">37786312</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dulin</surname><given-names>P</given-names> </name><name name-style="western"><surname>Mertz</surname><given-names>R</given-names> </name><name name-style="western"><surname>Edwards</surname><given-names>A</given-names> </name><name name-style="western"><surname>King</surname><given-names>D</given-names> </name></person-group><article-title>Contrasting a mobile app with a conversational chatbot for reducing alcohol consumption: randomized controlled pilot trial</article-title><source>JMIR Form Res</source><year>2022</year><volume>6</volume><issue>5</issue><fpage>e33037</fpage><pub-id pub-id-type="doi">10.2196/33037</pub-id><pub-id pub-id-type="medline">35576569</pub-id></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Dutra</surname><given-names>LM</given-names> </name><name name-style="western"><surname>Farrelly</surname><given-names>MC</given-names> </name><name name-style="western"><surname>Bradfield</surname><given-names>B</given-names> </name><name name-style="western"><surname>Ridenhour</surname><given-names>J</given-names> </name><name name-style="western"><surname>Guillory</surname><given-names>J</given-names> </name></person-group><source>Modeling the Probability of Fraud in Social Media in a National Cannabis Survey</source><year>2021</year><publisher-name>RTI Press</publisher-name></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Geiger</surname><given-names>G</given-names> </name><name name-style="western"><surname>Kiel</surname><given-names>L</given-names> </name><name name-style="western"><surname>Horiguchi</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Latinas in medicine: evaluating and understanding the experience of Latinas in medical education: a cross sectional survey</article-title><source>BMC Med Educ</source><year>2024</year><month>01</month><day>3</day><volume>24</volume><issue>1</issue><fpage>4</fpage><pub-id pub-id-type="doi">10.1186/s12909-023-04982-y</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Glazer</surname><given-names>JV</given-names> </name><name name-style="western"><surname>MacDonnell</surname><given-names>K</given-names> </name><name name-style="western"><surname>Frederick</surname><given-names>C</given-names> </name><name name-style="western"><surname>Ingersoll</surname><given-names>K</given-names> </name><name name-style="western"><surname>Ritterband</surname><given-names>LM</given-names> </name></person-group><article-title>Liar! Liar! Identifying eligibility fraud by applicants in digital health research</article-title><source>Internet Interv</source><year>2021</year><month>09</month><volume>25</volume><fpage>100401</fpage><pub-id pub-id-type="doi">10.1016/j.invent.2021.100401</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Godinho</surname><given-names>A</given-names> </name><name name-style="western"><surname>Schell</surname><given-names>C</given-names> </name><name name-style="western"><surname>Cunningham</surname><given-names>JA</given-names> </name></person-group><article-title>Out damn bot, out: recruiting real people into substance use studies on the internet</article-title><source>Subst Abus</source><year>2020</year><month>01</month><volume>41</volume><issue>1</issue><fpage>3</fpage><lpage>5</lpage><pub-id pub-id-type="doi">10.1080/08897077.2019.1691131</pub-id></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gonzalez</surname><given-names>JM</given-names> </name><name name-style="western"><surname>Grover</surname><given-names>K</given-names> </name><name name-style="western"><surname>Leblanc</surname><given-names>TW</given-names> </name><name name-style="western"><surname>Reeve</surname><given-names>BB</given-names> </name></person-group><article-title>Did a bot eat your homework? An assessment of the potential impact of bad actors in online administration of preference surveys</article-title><source>PLoS ONE</source><year>2023</year><month>10</month><day>5</day><volume>18</volume><issue>10</issue><fpage>e0287766</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0287766</pub-id></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gratz</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Scamaldo</surname><given-names>KM</given-names> </name><name name-style="western"><surname>Vida&#x00F1;a</surname><given-names>AG</given-names> </name><name name-style="western"><surname>Richmond</surname><given-names>JR</given-names> </name><name name-style="western"><surname>Tull</surname><given-names>MT</given-names> </name></person-group><article-title>Prospective interactive influence of financial strain and emotional nonacceptance on problematic alcohol use during the COVID-19 pandemic</article-title><source>Am J Drug Alcohol Abuse</source><year>2021</year><month>01</month><day>2</day><volume>47</volume><issue>1</issue><fpage>107</fpage><lpage>116</lpage><pub-id pub-id-type="doi">10.1080/00952990.2020.1849248</pub-id></nlm-citation></ref><ref id="ref53"><label>53</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Griffin</surname><given-names>M</given-names> </name><name name-style="western"><surname>Martino</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>LoSchiavo</surname><given-names>C</given-names> </name><etal/></person-group><article-title>Ensuring survey research data integrity in the era of internet bots</article-title><source>Qual Quant</source><year>2022</year><month>08</month><volume>56</volume><issue>4</issue><fpage>2841</fpage><lpage>2852</lpage><pub-id pub-id-type="doi">10.1007/s11135-021-01252-1</pub-id></nlm-citation></ref><ref id="ref54"><label>54</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Guastaferro</surname><given-names>K</given-names> </name><name name-style="western"><surname>Abuchaibe</surname><given-names>V</given-names> </name><name name-style="western"><surname>McCormick</surname><given-names>KV</given-names> </name><etal/></person-group><article-title>Adapting a selective parent-focused child sexual abuse prevention curriculum for a universal audience: a pilot study</article-title><source>PLoS One</source><year>2024</year><month>05</month><day>16</day><volume>19</volume><issue>5</issue><fpage>e0302982</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0302982</pub-id></nlm-citation></ref><ref id="ref55"><label>55</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Habib</surname><given-names>D</given-names> </name><name name-style="western"><surname>Jha</surname><given-names>N</given-names> </name></person-group><article-title>AIM against survey fraud</article-title><source>JAMIA Open</source><year>2021</year><month>10</month><day>8</day><volume>4</volume><issue>4</issue><fpage>ooab099</fpage><pub-id pub-id-type="doi">10.1093/jamiaopen/ooab099</pub-id></nlm-citation></ref><ref id="ref56"><label>56</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hartman</surname><given-names>R</given-names> </name><name name-style="western"><surname>Moss</surname><given-names>AJ</given-names> </name><name name-style="western"><surname>Rabinowitz</surname><given-names>I</given-names> </name><etal/></person-group><article-title>Do you know the Wooly Bully? Testing era-based knowledge to verify participant age online</article-title><source>Behav Res Methods</source><year>2023</year><month>10</month><volume>55</volume><issue>7</issue><fpage>3313</fpage><lpage>3325</lpage><pub-id pub-id-type="doi">10.3758/s13428-022-01944-y</pub-id></nlm-citation></ref><ref id="ref57"><label>57</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hauser</surname><given-names>DJ</given-names> </name><name name-style="western"><surname>Moss</surname><given-names>AJ</given-names> </name><name name-style="western"><surname>Rosenzweig</surname><given-names>C</given-names> </name><name name-style="western"><surname>Jaffe</surname><given-names>SN</given-names> </name><name name-style="western"><surname>Robinson</surname><given-names>J</given-names> </name><name name-style="western"><surname>Litman</surname><given-names>L</given-names> </name></person-group><article-title>Evaluating CloudResearch&#x2019;s Approved Group as a solution for problematic data quality on MTurk</article-title><source>Behav Res Methods</source><volume>55</volume><issue>8</issue><fpage>3953</fpage><lpage>3964</lpage><pub-id pub-id-type="doi">10.3758/s13428-022-01999-x</pub-id></nlm-citation></ref><ref id="ref58"><label>58</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ikegami</surname><given-names>K</given-names> </name><name name-style="western"><surname>Yoshimoto</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Baba</surname><given-names>H</given-names> </name><name name-style="western"><surname>Sekoguchi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Ando</surname><given-names>H</given-names> </name><name name-style="western"><surname>Ogami</surname><given-names>A</given-names> </name></person-group><article-title>Study protocol and preliminary results of the impact of occupational health workers&#x2019; activities on their health: Nationwide Prospective Internet-Based Survey</article-title><source>JMIR Form Res</source><volume>6</volume><issue>7</issue><fpage>e35290</fpage><pub-id pub-id-type="doi">10.2196/35290</pub-id></nlm-citation></ref><ref id="ref59"><label>59</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ilagan</surname><given-names>MJ</given-names> </name><name name-style="western"><surname>Falk</surname><given-names>CF</given-names> </name></person-group><article-title>Model-agnostic unsupervised detection of bots in a Likert-type questionnaire</article-title><source>Behav Res Methods</source><volume>56</volume><issue>5</issue><fpage>5068</fpage><lpage>5085</lpage><pub-id pub-id-type="doi">10.3758/s13428-023-02246-7</pub-id></nlm-citation></ref><ref id="ref60"><label>60</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ilagan</surname><given-names>MJ</given-names> </name><name name-style="western"><surname>Falk</surname><given-names>CF</given-names> </name></person-group><article-title>Supervised classes, unsupervised mixing proportions: detection of bots in a Likert-type questionnaire</article-title><source>Educ Psychol Meas</source><year>2023</year><month>04</month><volume>83</volume><issue>2</issue><fpage>217</fpage><lpage>239</lpage><pub-id pub-id-type="doi">10.1177/00131644221104220</pub-id></nlm-citation></ref><ref id="ref61"><label>61</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Karuchit</surname><given-names>S</given-names> </name><name name-style="western"><surname>Thiengtham</surname><given-names>P</given-names> </name><name name-style="western"><surname>Tanpradech</surname><given-names>S</given-names> </name><etal/></person-group><article-title>A web-based, respondent-driven sampling survey among men who have sex with men (Kai Noi): description of methods and characteristics</article-title><source>JMIR Form Res</source><year>2024</year><volume>8</volume><fpage>e50812</fpage><pub-id pub-id-type="doi">10.2196/50812</pub-id></nlm-citation></ref><ref id="ref62"><label>62</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Keith</surname><given-names>MG</given-names> </name><name name-style="western"><surname>McKay</surname><given-names>AS</given-names> </name></person-group><article-title>Too anecdotal to be true? Mechanical Turk is not all bots and bad data: response to Webb and Tangney (2022)</article-title><source>Perspect Psychol Sci</source><year>2024</year><month>11</month><volume>19</volume><issue>6</issue><fpage>900</fpage><lpage>907</lpage><pub-id pub-id-type="doi">10.1177/17456916241234328</pub-id></nlm-citation></ref><ref id="ref63"><label>63</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kim</surname><given-names>M</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>H</given-names> </name><name name-style="western"><surname>Allison</surname><given-names>J</given-names> </name></person-group><article-title>Challenges and lessons learned from a mobile health, web-based human papillomavirus intervention for female Korean American College Students: feasibility experimental study</article-title><source>JMIR Form Res</source><year>2020</year><month>01</month><day>29</day><volume>4</volume><issue>1</issue><fpage>e14111</fpage><pub-id pub-id-type="doi">10.2196/14111</pub-id></nlm-citation></ref><ref id="ref64"><label>64</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kolc</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Tan</surname><given-names>YXK</given-names> </name><name name-style="western"><surname>Lo</surname><given-names>AZY</given-names> </name><name name-style="western"><surname>Shvetcov</surname><given-names>A</given-names> </name><name name-style="western"><surname>Mitchell</surname><given-names>PB</given-names> </name><name name-style="western"><surname>Perkes</surname><given-names>IE</given-names> </name></person-group><article-title>Measuring psychiatric symptoms online: a systematic review of the use of inventories on Amazon Mechanical Turk (mTurk)</article-title><source>J Psychiatr Res</source><year>2023</year><month>07</month><volume>163</volume><fpage>118</fpage><lpage>126</lpage><pub-id pub-id-type="doi">10.1016/j.jpsychires.2023.05.027</pub-id></nlm-citation></ref><ref id="ref65"><label>65</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lepage</surname><given-names>S</given-names> </name><name name-style="western"><surname>Conway</surname><given-names>A</given-names> </name><name name-style="western"><surname>Goodson</surname><given-names>N</given-names> </name><name name-style="western"><surname>Wicks</surname><given-names>P</given-names> </name><name name-style="western"><surname>Flight</surname><given-names>L</given-names> </name><name name-style="western"><surname>Devane</surname><given-names>D</given-names> </name></person-group><article-title>Online randomised trials with children: a scoping review</article-title><source>PLoS One</source><year>2023</year><month>05</month><day>25</day><volume>18</volume><issue>5</issue><fpage>e0280965</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0280965</pub-id></nlm-citation></ref><ref id="ref66"><label>66</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Levi</surname><given-names>R</given-names> </name><name name-style="western"><surname>Ridberg</surname><given-names>R</given-names> </name><name name-style="western"><surname>Akers</surname><given-names>M</given-names> </name><name name-style="western"><surname>Seligman</surname><given-names>H</given-names> </name></person-group><article-title>Survey fraud and the integrity of web-based survey research</article-title><source>Am J Health Promot</source><year>2022</year><month>01</month><volume>36</volume><issue>1</issue><fpage>18</fpage><lpage>20</lpage><pub-id pub-id-type="doi">10.1177/08901171211037531</pub-id></nlm-citation></ref><ref id="ref67"><label>67</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Loebenberg</surname><given-names>G</given-names> </name><name name-style="western"><surname>Oldham</surname><given-names>M</given-names> </name><name name-style="western"><surname>Brown</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Bot or not? Detecting and managing participant deception when conducting digital research remotely: case study of a randomized controlled trial</article-title><source>J Med Internet Res</source><year>2023</year><volume>25</volume><fpage>e46523</fpage><pub-id pub-id-type="doi">10.2196/46523</pub-id></nlm-citation></ref><ref id="ref68"><label>68</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lorenzo-Luaces</surname><given-names>L</given-names> </name><name name-style="western"><surname>Howard</surname><given-names>J</given-names> </name><name name-style="western"><surname>Edinger</surname><given-names>A</given-names> </name><etal/></person-group><article-title>Sociodemographics and transdiagnostic mental health symptoms in SOCIAL (Studies of Online Cohorts for Internalizing Symptoms and Language) I and II: cross-sectional survey and botometer analysis</article-title><source>JMIR Form Res</source><year>2022</year><volume>6</volume><issue>10</issue><fpage>e39324</fpage><pub-id pub-id-type="doi">10.2196/39324</pub-id></nlm-citation></ref><ref id="ref69"><label>69</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mitchell</surname><given-names>JW</given-names> </name><name name-style="western"><surname>Chavanduka</surname><given-names>TMD</given-names> </name><name name-style="western"><surname>Sullivan</surname><given-names>S</given-names> </name><name name-style="western"><surname>Stephenson</surname><given-names>R</given-names> </name></person-group><article-title>Recommendations from a descriptive evaluation to improve screening procedures for web-based studies with couples: cross-sectional study</article-title><source>JMIR Public Health Surveill</source><year>2020</year><month>05</month><day>12</day><volume>6</volume><issue>2</issue><fpage>e15079</fpage><pub-id pub-id-type="doi">10.2196/15079</pub-id></nlm-citation></ref><ref id="ref70"><label>70</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mournet</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Kleiman</surname><given-names>EM</given-names> </name></person-group><article-title>Internet-based mental health survey research: navigating internet bots on reddit</article-title><source>Cyberpsychol Behav Soc Netw</source><year>2023</year><month>02</month><day>1</day><volume>26</volume><issue>2</issue><fpage>73</fpage><lpage>79</lpage><pub-id pub-id-type="doi">10.1089/cyber.2022.0173</pub-id></nlm-citation></ref><ref id="ref71"><label>71</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>O&#x2019;Donnell</surname><given-names>N</given-names> </name><name name-style="western"><surname>Satherley</surname><given-names>RM</given-names> </name><name name-style="western"><surname>Davey</surname><given-names>E</given-names> </name><name name-style="western"><surname>Bryan</surname><given-names>G</given-names> </name></person-group><article-title>Fraudulent participants in qualitative child health research: identifying and reducing bot activity</article-title><source>Arch Dis Child</source><year>2023</year><month>05</month><volume>108</volume><issue>5</issue><fpage>415</fpage><lpage>416</lpage><pub-id pub-id-type="doi">10.1136/archdischild-2022-325049</pub-id><pub-id pub-id-type="medline">36669866</pub-id></nlm-citation></ref><ref id="ref72"><label>72</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Panesar</surname><given-names>P</given-names> </name><name name-style="western"><surname>Mayo</surname><given-names>SJ</given-names> </name></person-group><article-title>&#x201C;Taking out the trash&#x201D;: strategies for preventing and managing fraudulent data in web-surveys</article-title><source>Can Oncol Nurs J</source><year>2023</year><volume>33</volume><issue>2</issue><fpage>283</fpage><lpage>284</lpage><pub-id pub-id-type="medline">37152829</pub-id></nlm-citation></ref><ref id="ref73"><label>73</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Parks</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Duffecy</surname><given-names>J</given-names> </name><name name-style="western"><surname>McCabe</surname><given-names>JE</given-names> </name><etal/></person-group><article-title>Lessons learned recruiting and retaining pregnant and postpartum individuals in digital trials: viewpoint</article-title><source>JMIR Pediatr Parent</source><year>2022</year><volume>5</volume><issue>2</issue><fpage>e35320</fpage><pub-id pub-id-type="doi">10.2196/35320</pub-id></nlm-citation></ref><ref id="ref74"><label>74</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pekarsky</surname><given-names>C</given-names> </name><name name-style="western"><surname>Skiffington</surname><given-names>J</given-names> </name><name name-style="western"><surname>Leijser</surname><given-names>LM</given-names> </name><name name-style="western"><surname>Slater</surname><given-names>D</given-names> </name><name name-style="western"><surname>Metcalfe</surname><given-names>A</given-names> </name></person-group><article-title>Social media recruitment strategies to recruit pregnant women into a longitudinal observational cohort study: usability study</article-title><source>J Med Internet Res</source><year>2022</year><volume>24</volume><issue>12</issue><fpage>e40298</fpage><pub-id pub-id-type="doi">10.2196/40298</pub-id></nlm-citation></ref><ref id="ref75"><label>75</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pozzar</surname><given-names>R</given-names> </name><name name-style="western"><surname>Hammer</surname><given-names>MJ</given-names> </name><name name-style="western"><surname>Underhill-Blazey</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Threats of bots and other bad actors to data quality following research participant recruitment through social media: cross-sectional questionnaire</article-title><source>J Med Internet Res</source><year>2020</year><volume>22</volume><issue>10</issue><fpage>e23021</fpage><pub-id pub-id-type="doi">10.2196/23021</pub-id></nlm-citation></ref><ref id="ref76"><label>76</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pratt-Chapman</surname><given-names>M</given-names> </name><name name-style="western"><surname>Moses</surname><given-names>J</given-names> </name><name name-style="western"><surname>Arem</surname><given-names>H</given-names> </name></person-group><article-title>Strategies for the identification and prevention of survey fraud: data analysis of a web-based survey</article-title><source>JMIR Cancer</source><year>2021</year><month>07</month><day>16</day><volume>7</volume><issue>3</issue><fpage>e30730</fpage><pub-id pub-id-type="doi">10.2196/30730</pub-id><pub-id pub-id-type="medline">34269685</pub-id></nlm-citation></ref><ref id="ref77"><label>77</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Price</surname><given-names>M</given-names> </name><name name-style="western"><surname>Hidalgo</surname><given-names>JE</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>JN</given-names> </name><etal/></person-group><article-title>The cyborg method: a method to identify fraudulent responses from crowdsourced data</article-title><source>Comput Human Behav</source><year>2024</year><month>08</month><volume>157</volume><fpage>108253</fpage><pub-id pub-id-type="doi">10.1016/j.chb.2024.108253</pub-id><pub-id pub-id-type="medline">38799787</pub-id></nlm-citation></ref><ref id="ref78"><label>78</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Reed</surname><given-names>ND</given-names> </name><name name-style="western"><surname>Bull</surname><given-names>S</given-names> </name><name name-style="western"><surname>Shrestha</surname><given-names>U</given-names> </name><name name-style="western"><surname>Sarche</surname><given-names>M</given-names> </name><name name-style="western"><surname>Kaufman</surname><given-names>CE</given-names> </name></person-group><article-title>Combating fraudulent participation in Urban American Indian and Alaska Native Virtual Health Research: Protocol for Increasing Data Integrity in Online Research (PRIOR)</article-title><source>JMIR Res Protoc</source><year>2024</year><volume>13</volume><fpage>e52281</fpage><pub-id pub-id-type="doi">10.2196/52281</pub-id></nlm-citation></ref><ref id="ref79"><label>79</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ridge</surname><given-names>D</given-names> </name><name name-style="western"><surname>Bullock</surname><given-names>L</given-names> </name><name name-style="western"><surname>Causer</surname><given-names>H</given-names> </name><etal/></person-group><article-title>&#x2018;Imposter participants&#x2019; in online qualitative research, a new and increasing threat to data integrity?</article-title><source>Health Expect</source><year>2023</year><month>06</month><access-date>2025-08-11</access-date><volume>26</volume><issue>3</issue><fpage>941</fpage><lpage>944</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://onlinelibrary.wiley.com/toc/13697625/26/3">https://onlinelibrary.wiley.com/toc/13697625/26/3</ext-link></comment><pub-id pub-id-type="doi">10.1111/hex.13724</pub-id></nlm-citation></ref><ref id="ref80"><label>80</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rodriguez</surname><given-names>C</given-names> </name><name name-style="western"><surname>Oppenheimer</surname><given-names>DM</given-names> </name></person-group><article-title>Creating a Bot-tleneck for malicious AI: psychological methods for bot detection</article-title><source>Behav Res Methods</source><year>2024</year><month>09</month><volume>56</volume><issue>6</issue><fpage>6258</fpage><lpage>6275</lpage><pub-id pub-id-type="doi">10.3758/s13428-024-02357-9</pub-id><pub-id pub-id-type="medline">38561551</pub-id></nlm-citation></ref><ref id="ref81"><label>81</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rodriguez</surname><given-names>E</given-names> </name><name name-style="western"><surname>Peer</surname><given-names>K</given-names> </name><name name-style="western"><surname>Fruh</surname><given-names>V</given-names> </name><etal/></person-group><article-title>Digital global recruitment for women&#x2019;s health research: cross-sectional study</article-title><source>JMIR Form Res</source><year>2022</year><volume>6</volume><issue>9</issue><fpage>e39046</fpage><pub-id pub-id-type="doi">10.2196/39046</pub-id></nlm-citation></ref><ref id="ref82"><label>82</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Roman</surname><given-names>ZJ</given-names> </name><name name-style="western"><surname>Brandt</surname><given-names>H</given-names> </name><name name-style="western"><surname>Miller</surname><given-names>JM</given-names> </name></person-group><article-title>Automated bot detection using Bayesian latent class models in online surveys</article-title><source>Front Psychol</source><year>2022</year><volume>13</volume><fpage>789223</fpage><pub-id pub-id-type="doi">10.3389/fpsyg.2022.789223</pub-id></nlm-citation></ref><ref id="ref83"><label>83</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Salinas</surname><given-names>MR</given-names> </name></person-group><article-title>Are your participants real? Dealing with fraud in recruiting older adults online</article-title><source>West J Nurs Res</source><year>2023</year><month>01</month><volume>45</volume><issue>1</issue><fpage>93</fpage><lpage>99</lpage><pub-id pub-id-type="doi">10.1177/01939459221098468</pub-id><pub-id pub-id-type="medline">35587721</pub-id></nlm-citation></ref><ref id="ref84"><label>84</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sefcik</surname><given-names>JS</given-names> </name><name name-style="western"><surname>Hathaway</surname><given-names>Z</given-names> </name><name name-style="western"><surname>DiMaria-Ghalili</surname><given-names>RA</given-names> </name></person-group><article-title>When snowball sampling leads to an avalanche of fraudulent participants in qualitative research</article-title><source>Int J Older People Nurs</source><year>2023</year><month>11</month><access-date>2025-08-11</access-date><volume>18</volume><issue>6</issue><fpage>e12572</fpage><comment><ext-link ext-link-type="uri" xlink:href="https://onlinelibrary.wiley.com/toc/17483743/18/6">https://onlinelibrary.wiley.com/toc/17483743/18/6</ext-link></comment><pub-id pub-id-type="doi">10.1111/opn.12572</pub-id><pub-id pub-id-type="medline">37632269</pub-id></nlm-citation></ref><ref id="ref85"><label>85</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sharma</surname><given-names>P</given-names> </name><name name-style="western"><surname>McPhail</surname><given-names>SM</given-names> </name><name name-style="western"><surname>Kularatna</surname><given-names>S</given-names> </name><name name-style="western"><surname>Senanayake</surname><given-names>S</given-names> </name><name name-style="western"><surname>Abell</surname><given-names>B</given-names> </name></person-group><article-title>Navigating the challenges of imposter participants in online qualitative research: lessons learned from a paediatric health services study</article-title><source>BMC Health Serv Res</source><year>2020</year><volume>24</volume><issue>1</issue><fpage>724</fpage><pub-id pub-id-type="doi">10.1186/s12913-024-11166-x</pub-id></nlm-citation></ref><ref id="ref86"><label>86</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Silva</surname><given-names>SSM</given-names> </name><name name-style="western"><surname>Meyer</surname><given-names>D</given-names> </name><name name-style="western"><surname>Jayawardana</surname><given-names>M</given-names> </name></person-group><article-title>Detecting possible persons of interest in a physical activity program using step entries: Including a web&#x2010;based application for outlier detection and decision&#x2010;making</article-title><source>Biom J</source><year>2020</year><month>03</month><access-date>2025-08-11</access-date><volume>62</volume><issue>2</issue><fpage>414</fpage><lpage>427</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://onlinelibrary.wiley.com/toc/15214036/62/2">https://onlinelibrary.wiley.com/toc/15214036/62/2</ext-link></comment><pub-id pub-id-type="doi">10.1002/bimj.201900008</pub-id></nlm-citation></ref><ref id="ref87"><label>87</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Simone</surname><given-names>M</given-names> </name><name name-style="western"><surname>Cascalheira</surname><given-names>CJ</given-names> </name><name name-style="western"><surname>Pierce</surname><given-names>BG</given-names> </name></person-group><article-title>A quasi-experimental study examining the efficacy of multimodal bot screening tools and recommendations to preserve data integrity in online psychological research</article-title><source>Am Psychol</source><year>2024</year><volume>79</volume><issue>7</issue><fpage>956</fpage><lpage>969</lpage><pub-id pub-id-type="doi">10.1037/amp0001183</pub-id></nlm-citation></ref><ref id="ref88"><label>88</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sosenko</surname><given-names>FL</given-names> </name><name name-style="western"><surname>Bramley</surname><given-names>G</given-names> </name></person-group><article-title>Smartphone-based Respondent Driven Sampling (RDS): a methodological advance in surveying small or &#x2018;hard-to-reach&#x2019; populations</article-title><source>PLoS One</source><year>2022</year><volume>17</volume><issue>7</issue><fpage>e0270673</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0270673</pub-id></nlm-citation></ref><ref id="ref89"><label>89</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Stephenson</surname><given-names>R</given-names> </name><name name-style="western"><surname>Chavanduka</surname><given-names>TMD</given-names> </name><name name-style="western"><surname>Sullivan</surname><given-names>S</given-names> </name><name name-style="western"><surname>Mitchell</surname><given-names>JW</given-names> </name></person-group><article-title>Correlates of successful enrollment of same-sex male couples into a web-based HIV prevention research study: cross-sectional study</article-title><source>JMIR Public Health Surveill</source><year>2020</year><volume>6</volume><issue>1</issue><fpage>e15078</fpage><pub-id pub-id-type="doi">10.2196/15078</pub-id></nlm-citation></ref><ref id="ref90"><label>90</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tran</surname><given-names>NK</given-names> </name><name name-style="western"><surname>Welles</surname><given-names>SL</given-names> </name><name name-style="western"><surname>Goldstein</surname><given-names>ND</given-names> </name></person-group><article-title>Geolocation to identify online study-eligible gay, bisexual, and men who have sex with men in Philadelphia, Pennsylvania</article-title><source>Epidemiology</source><year>2023</year><volume>34</volume><issue>4</issue><fpage>462</fpage><lpage>466</lpage><pub-id pub-id-type="doi">10.1097/EDE.0000000000001607</pub-id></nlm-citation></ref><ref id="ref91"><label>91</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Veldheer</surname><given-names>S</given-names> </name><name name-style="western"><surname>Whitehead-Zimmers</surname><given-names>M</given-names> </name><name name-style="western"><surname>Bordner</surname><given-names>C</given-names> </name><etal/></person-group><article-title>Participant preferences for the development of a digitally delivered gardening intervention to improve diet, physical activity, and cardiovascular health: cross-sectional study</article-title><source>JMIR Form Res</source><year>2023</year><volume>7</volume><fpage>e41498</fpage><pub-id pub-id-type="doi">10.2196/41498</pub-id></nlm-citation></ref><ref id="ref92"><label>92</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Venugopal</surname><given-names>A</given-names> </name><name name-style="western"><surname>Marya</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ludwig</surname><given-names>B</given-names> </name><name name-style="western"><surname>Alam</surname><given-names>MK</given-names> </name></person-group><article-title>Satisficing and bots</article-title><source>Br Dent J</source><year>2022</year><month>01</month><day>28</day><volume>232</volume><issue>2</issue><fpage>68</fpage><lpage>68</lpage><pub-id pub-id-type="doi">10.1038/s41415-022-3891-9</pub-id></nlm-citation></ref><ref id="ref93"><label>93</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Vu</surname><given-names>M</given-names> </name><name name-style="western"><surname>Huynh</surname><given-names>VN</given-names> </name><name name-style="western"><surname>Bednarczyk</surname><given-names>RA</given-names> </name><etal/></person-group><article-title>Experience and lessons learned from multi-modal internet-based recruitment of U.S. Vietnamese into research</article-title><source>PLoS One</source><year>2021</year><volume>16</volume><issue>8</issue><fpage>e0256074</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0256074</pub-id></nlm-citation></ref><ref id="ref94"><label>94</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Walker</surname><given-names>LO</given-names> </name><name name-style="western"><surname>Murry</surname><given-names>N</given-names> </name><name name-style="western"><surname>Longoria</surname><given-names>KD</given-names> </name></person-group><article-title>Improving data integrity and quality from online health surveys of women with infant children</article-title><source>Nurs Res</source><year>2023</year><volume>72</volume><issue>5</issue><fpage>386</fpage><lpage>391</lpage><pub-id pub-id-type="doi">10.1097/NNR.0000000000000671</pub-id></nlm-citation></ref><ref id="ref95"><label>95</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wang</surname><given-names>J</given-names> </name><name name-style="western"><surname>Calderon</surname><given-names>G</given-names> </name><name name-style="western"><surname>Hager</surname><given-names>ER</given-names> </name><etal/></person-group><article-title>Identifying and preventing fraudulent responses in online public health surveys: lessons learned during the COVID-19 pandemic</article-title><source>PLOS Glob Public Health</source><year>2023</year><volume>3</volume><issue>8</issue><fpage>e0001452</fpage><pub-id pub-id-type="doi">10.1371/journal.pgph.0001452</pub-id></nlm-citation></ref><ref id="ref96"><label>96</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wardropper</surname><given-names>CB</given-names> </name><name name-style="western"><surname>Dayer</surname><given-names>AA</given-names> </name><name name-style="western"><surname>Goebel</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Martin</surname><given-names>VY</given-names> </name></person-group><article-title>Conducting conservation social science surveys online</article-title><source>Conserv Biol</source><year>2021</year><month>10</month><access-date>2025-08-11</access-date><volume>35</volume><issue>5</issue><fpage>1650</fpage><lpage>1658</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://conbio.onlinelibrary.wiley.com/toc/15231739/35/5">https://conbio.onlinelibrary.wiley.com/toc/15231739/35/5</ext-link></comment><pub-id pub-id-type="doi">10.1111/cobi.13747</pub-id></nlm-citation></ref><ref id="ref97"><label>97</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Willis</surname><given-names>TA</given-names> </name><name name-style="western"><surname>Wright-Hughes</surname><given-names>A</given-names> </name><name name-style="western"><surname>Skinner</surname><given-names>C</given-names> </name><etal/></person-group><article-title>The detection and management of attempted fraud during an online randomised trial</article-title><source>Trials</source><year>2023</year><volume>24</volume><issue>1</issue><fpage>494</fpage><pub-id pub-id-type="doi">10.1186/s13063-023-07517-4</pub-id></nlm-citation></ref><ref id="ref98"><label>98</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Woolfall</surname><given-names>K</given-names> </name></person-group><article-title>Identifying and preventing fraudulent participation in qualitative research</article-title><source>Arch Dis Child</source><year>2023</year><month>06</month><volume>108</volume><issue>6</issue><fpage>421</fpage><lpage>422</lpage><pub-id pub-id-type="doi">10.1136/archdischild-2023-325328</pub-id></nlm-citation></ref><ref id="ref99"><label>99</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Xu</surname><given-names>J</given-names> </name><name name-style="western"><surname>Tian</surname><given-names>G</given-names> </name><name name-style="western"><surname>He</surname><given-names>J</given-names> </name><etal/></person-group><article-title>The public&#x2019;s self-avoidance and other-reliance in the reporting of medical insurance fraud: a cross-sectional survey in China</article-title><source>Risk Manag Healthc Policy</source><year>2023</year><volume>16</volume><fpage>2869</fpage><lpage>2881</lpage><pub-id pub-id-type="doi">10.2147/RMHP.S438854</pub-id><pub-id pub-id-type="medline">38149180</pub-id></nlm-citation></ref><ref id="ref100"><label>100</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Xu</surname><given-names>J</given-names> </name><name name-style="western"><surname>Zhang</surname><given-names>T</given-names> </name><name name-style="western"><surname>Zhang</surname><given-names>H</given-names> </name><etal/></person-group><article-title>What influences the public&#x2019;s willingness to report health insurance fraud in familiar or unfamiliar healthcare settings? a cross-sectional study of the young and middle-aged people in China</article-title><source>BMC Public Health</source><year>2024</year><volume>24</volume><issue>1</issue><fpage>24</fpage><pub-id pub-id-type="doi">10.1186/s12889-023-17581-9</pub-id></nlm-citation></ref><ref id="ref101"><label>101</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Young</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Ballard</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Cooper</surname><given-names>HLF</given-names> </name></person-group><article-title>Novel recruitment methods for research among young adults in rural areas who use opioids: cookouts, coupons, and community-based staff</article-title><source>Public Health Rep</source><year>2020</year><month>11</month><volume>135</volume><issue>6</issue><fpage>746</fpage><lpage>755</lpage><pub-id pub-id-type="doi">10.1177/0033354920954796</pub-id></nlm-citation></ref><ref id="ref102"><label>102</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhang</surname><given-names>H</given-names> </name><name name-style="western"><surname>Zhang</surname><given-names>T</given-names> </name><name name-style="western"><surname>Shi</surname><given-names>Q</given-names> </name><etal/></person-group><article-title>Who is more likely to report medical insurance fraud in the two scenarios of whether it results in a direct loss of individual benefit? A cross-sectional survey in China</article-title><source>Psychol Res Behav Manag</source><year>2022</year><volume>15</volume><fpage>2331</fpage><lpage>2341</lpage><pub-id pub-id-type="doi">10.2147/PRBM.S375823</pub-id></nlm-citation></ref><ref id="ref103"><label>103</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zuniga</surname><given-names>C</given-names> </name><name name-style="western"><surname>Ragosta</surname><given-names>S</given-names> </name><name name-style="western"><surname>Thompson</surname><given-names>TA</given-names> </name></person-group><article-title>Recruiting foreign-born individuals who have sought an abortion in the United States: lessons from a feasibility study</article-title><source>Front Glob Womens Health</source><year>2024</year><volume>4</volume><fpage>1114820</fpage><pub-id pub-id-type="doi">10.3389/fgwh.2023.1114820</pub-id></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Study details described in the 90 manuscripts examined in this scoping review.</p><media xlink:href="ojphi_v17i1e70926_app1.docx" xlink:title="DOCX File, 56 KB"/></supplementary-material><supplementary-material id="app2"><label>Multimedia Appendix 2</label><p>Techniques for addressing threats to data integrity in online research as mentioned in the 90 manuscripts examined in this scoping review.</p><media xlink:href="ojphi_v17i1e70926_app2.docx" xlink:title="DOCX File, 63 KB"/></supplementary-material><supplementary-material id="app3"><label>Checklist 1</label><p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) checklist.</p><media xlink:href="ojphi_v17i1e70926_app3.docx" xlink:title="DOCX File, 32 KB"/></supplementary-material></app-group></back></article>