4.3 Article

Identifying Multiple Submissions in Internet Research: Preserving Data Integrity

Journal

AIDS AND BEHAVIOR
Volume 12, Issue 6, Pages 964-973

Publisher

SPRINGER/PLENUM PUBLISHERS
DOI: 10.1007/s10461-007-9352-2

Keywords

Internet research; Multiple submissions; Repeat responders; Validity; Rural; MSM

Funding

  1. NIMH NIH HHS [MH-63667, R01 MH063667, R01 MH063667-05] Funding Source: Medline

Ask authors/readers for more resources

Internet-based sexuality research with hidden populations has become increasingly popular. Respondent anonymity may encourage participation and lower social desirability, but associated disinhibition may promote multiple submissions, especially when incentives are offered. The goal of this study was to identify the usefulness of different variables for detecting multiple submissions from repeat responders and to explore incentive effects. The data included 1,900 submissions from a three-session Internet intervention with a pretest and three post-test questionnaires. Participants were men who have sex with men and incentives were offered to rural participants for completing each questionnaire. The final number of submissions included 1,273 unique, 132 first submissions by repeat responders and 495 additional submissions by the repeat responders (N = 1,900). Four categories of repeat responders were identified: infrequent (2-5 submissions), persistent (6-10 submissions), very persistent (11-30 submissions), and hackers (more than 30 submissions). Internet Provider (IP) addresses, user names, and passwords were the most useful for identifying infrequent repeat responders. Hackers often varied their IP address and identifying information to prevent easy identification, but investigating the data for small variations in IP, using reverse telephone look up, and patterns across usernames and passwords were helpful. Incentives appeared to play a role in stimulating multiple submissions, especially from the more sophisticated hackers. Finally, the web is ever evolving and it will be necessary to have good programmers and staff who evolve as fast as hackers.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available