Metadata
Title
Guidance for Mitigating Fraud and Safeguarding Data Integrity in Online Research
Category
general
UUID
68ac2524ff194bdd87304c663339449a
Source URL
https://cris.utoronto.ca/guides/mitigating-fraud-online-research/
Parent URL
https://cris.utoronto.ca/guides/
Crawl Time
2026-03-10T07:47:24+00:00
Rendered Raw Markdown

Guidance for Mitigating Fraud and Safeguarding Data Integrity in Online Research

Source: https://cris.utoronto.ca/guides/mitigating-fraud-online-research/ Parent: https://cris.utoronto.ca/guides/

.elementor-134578 .elementor-element.elementor-element-bafb986{--display:flex;--min-height:20vh;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;--justify-content:center;--gap:0px 0px;--row-gap:0px;--column-gap:0px;--overlay-opacity:0.5;--padding-top:5%;--padding-bottom:5%;--padding-left:0%;--padding-right:0%;}.elementor-134578 .elementor-element.elementor-element-bafb986:not(.elementor-motion-effects-element-type-background), .elementor-134578 .elementor-element.elementor-element-bafb986 > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url("https://cris.utoronto.ca/wp-content/uploads/background-cris-guides-copy.jpg");background-position:top right;background-size:cover;}.elementor-134578 .elementor-element.elementor-element-bafb986::before, .elementor-134578 .elementor-element.elementor-element-bafb986 > .elementor-background-video-container::before, .elementor-134578 .elementor-element.elementor-element-bafb986 > .e-con-inner > .elementor-background-video-container::before, .elementor-134578 .elementor-element.elementor-element-bafb986 > .elementor-background-slideshow::before, .elementor-134578 .elementor-element.elementor-element-bafb986 > .e-con-inner > .elementor-background-slideshow::before, .elementor-134578 .elementor-element.elementor-element-bafb986 > .elementor-motion-effects-container > .elementor-motion-effects-layer::before{--background-overlay:'';}.elementor-134578 .elementor-element.elementor-element-7ffe7c9{--display:flex;}.elementor-134578 .elementor-element.elementor-element-7ffe7c9:not(.elementor-motion-effects-element-type-background), .elementor-134578 .elementor-element.elementor-element-7ffe7c9 > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-primary );}.elementor-134578 .elementor-element.elementor-element-e033d6f > .elementor-widget-container{margin:0px 0px 0px 0px;padding:2px 2px 2px 2px;}.elementor-134578 .elementor-element.elementor-element-e033d6f{text-align:start;}.elementor-134578 .elementor-element.elementor-element-e033d6f .elementor-heading-title{font-weight:600;text-transform:none;font-style:normal;color:#FFFFFF;}@media(max-width:767px){.elementor-134578 .elementor-element.elementor-element-e033d6f.elementor-element{--align-self:flex-start;}}@media(min-width:768px){.elementor-134578 .elementor-element.elementor-element-bafb986{--content-width:75%;}.elementor-134578 .elementor-element.elementor-element-7ffe7c9{--width:520px;}}

Guidance for Mitigating Fraud and Safeguarding Data Integrity in Online Research

.elementor-134582 .elementor-element.elementor-element-5192e2b{--display:flex;--min-height:0px;--justify-content:center;--gap:0px 0px;--row-gap:0px;--column-gap:0px;--margin-top:0px;--margin-bottom:0px;--margin-left:0px;--margin-right:0px;--padding-top:0px;--padding-bottom:8px;--padding-left:0px;--padding-right:0px;}.elementor-134582 .elementor-element.elementor-element-5192e2b:not(.elementor-motion-effects-element-type-background), .elementor-134582 .elementor-element.elementor-element-5192e2b > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:#F3F5F8;}.elementor-134582 .elementor-element.elementor-element-ed0cd6b{--display:flex;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--justify-content:flex-start;--align-items:center;--gap:0px 0px;--row-gap:0px;--column-gap:0px;--margin-top:0px;--margin-bottom:0px;--margin-left:0px;--margin-right:0px;--padding-top:0px;--padding-bottom:0px;--padding-left:0px;--padding-right:0px;}.elementor-134582 .elementor-element.elementor-element-b3f4237{--box-min-height:0px;width:var( --container-widget-width, 93.528% );max-width:93.528%;--container-widget-width:93.528%;--container-widget-flex-grow:0;--box-border-width:0px;--box-border-radius:0px;--separator-width:0px;--box-padding:10px;--item-text-hover-decoration:underline;}.elementor-134582 .elementor-element.elementor-element-b3f4237 .elementor-toc__header-title{text-align:start;}.elementor-134582 .elementor-element.elementor-element-b3f4237 .elementor-toc__header, .elementor-134582 .elementor-element.elementor-element-b3f4237 .elementor-toc__header-title{font-size:1.2rem;font-weight:bold;}.elementor-134582 .elementor-element.elementor-element-b3f4237 .elementor-toc__header{flex-direction:row;}@media(min-width:768px){.elementor-134582 .elementor-element.elementor-element-5192e2b{--content-width:76%;}}/* Start custom CSS for table-of-contents, class: .elementor-element-b3f4237 */.elementor-toc__header { padding-bottom: 0; } .elementor-134582 .elementor-element.elementor-element-b3f4237 { .elementor-toc__list-wrapper { list-style: none; padding: 0; display: inline-flex; align-content: flex-start; justify-content: space-between; width: 100%; flex-wrap: wrap; align-items: first baseline; } .elementor-toc__list-item { margin-bottom: .2em; padding-left: .5em; padding-right: .5em; padding-top: 10px !important; padding-bottom: 0px !important; }/* End custom CSS */ /* Start custom CSS for container, class: .elementor-element-5192e2b */.elementor-134582 .elementor-element.elementor-element-5192e2b .elementor-toc__toggle-button { display: none !important; }/* End custom CSS */

On This Page:

Online research carried out by fraudulent participants or bots undermines research validity and imposes substantial resource demands on researchers. The purpose of this guidance document is to outline practical strategies available to researchers to mitigate fraud and safeguard data integrity in online research involving human participants. This document is not meant to provide directives. Researchers are responsible for evaluating the risks and benefits of the various strategies when designing a solution for their unique research context. Researchers are also responsible for adhering to the relevant policies and guidelines for research involving humans (e.g., Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans (TCPS2 2022)).

Download a PDF of this guidance

Background & Definitions

Online research has become ubiquitous and offers many benefits. Conducting research online helps to overcome logistical barriers associated with in-person research and facilitates recruitment, including reaching participants from underrepresented or hard-to-reach populations. As a result, online methods such as web-based surveys, interviews, and focus groups have enabled both larger-scale and more targeted research. However, with the increased prevalence of online research, instances of fraud have also risen.

In the context of online research, fraud is defined as deceptive practices that interfere with study recruitment or data collection, often for personal gain. Typically, fraud occurs to gain access to incentives (monetary or in kind) that are being offered to research participants. There is also a growing concern of potential interference by malicious actors in research that is political or sensitive in nature.

Various types of fraudulent actors exist, including: fraudulent participants, who are not eligible for the study and who knowingly falsify information or impersonate the target population of a study to participate; participants who intentionally or unintentionally submit multiple responses to online data collection forms; and more recently, ‘bots’ that involve computer software programmed to automatically complete online data collection forms on a large scale. Currently, generative artificial intelligence (AI) (e.g., ChatGPT or other chatbots) appears to be enabling fraud in online research by generating human-like responses that make bots more difficult to detect.

Online research fraud poses a substantial threat to data integrity and the validity of research findings and has many negative implications for researchers. In recent web-based surveys in the social sciences and agricultural economics fields, approximately 60%-96% of responses were deemed fraudulent (Bonett et al. 2024, Goodrich et al. 2023, Griffin et al. 2022). Failing to prevent or address fraud by removing these responses from study samples can result in inaccurate or invalid research findings and study conclusions. Furthermore, beyond the financial burden of providing compensation for potentially thousands of fraudulent submissions, significant resources including time and money may be required to review and clean the collected data. Therefore, researchers need robust and ethically-sound strategies to mitigate fraud and safeguard data integrity in online research.

Definitions

Online research fraud: Deceptive practices that interfere with study recruitment or data collection, often for personal gain.

Fraudulent actors: Humans or computer programs (e.g., bots) that commit online research fraud by falsifying or duplicating data.

Bots: Short for ‘robots’, bots are automated computer programs designed and/or administered by humans to complete online tasks. In the research context, bots complete surveys and provide email addresses to receive study incentives. They can be programmed to do so on a large scale, thus receiving the incentive many times.

Incentive: Anything offered to participants, monetary or otherwise, to encourage participation in research (e.g., compensation, honorarium).

Strategies for Mitigating Fraud in Online Research

The following section presents strategies that researchers may consider implementing to mitigate fraud in their online studies. The strategies have been organized into three main research stages: study design (including incentive and recruitment strategies), data collection tool design (including technology- and content-based strategies), and data cleaning. This structure is meant to enhance clarity, however, there may be overlap between these stages. The order of the strategies within each section does not represent a hierarchy of preference or effectiveness. Furthermore, the strategies are not separated by study design (e.g., web-based surveys, mixed-methods, interviews, focus groups), as there may be considerable overlap depending on the research stage and specific study design features. Researchers need to evaluate the applicability and appropriateness of the strategies for their unique research context.

Over time, fraudulent actors are expected to become increasingly sophisticated as the online research landscape evolves. While this guidance is intended to cover a breadth of strategies currently available to researchers, it is not comprehensive and requires careful consideration prior to implementation. Some overarching guidance for selecting strategies includes:

Study Design

Incentive and recruitment strategies for mitigating fraud in the study design stage

Study design: Incentive strategies

Do not automate incentive payments

Advantages

Disadvantages

Additional considerations

Create separate data collection tools for research data and incentives data

Advantages

Disadvantages

Additional considerations

Limit how the incentive is advertised

Advantages

Disadvantages

Additional considerations

Consider whether to offer a draw-based incentive or guaranteed compensation

Advantages

Disadvantages

Additional considerations

Consider offering geo-locked gift cards as incentives

Advantages

Disadvantages

Additional considerations

Study design: Recruitment Strategies

Use a two-stage eligibility screening and data collection process

Advantages

Disadvantages

Additional considerations

Recruit by invitation only

Advantages

Disadvantages

Advantages

Disadvantages

Additional considerations

Create unique URLs for each recruitment source or campaign

Advantages

Disadvantages

Additional considerations

Consider recruiting from online crowdsourcing platforms (e.g., Amazon Mechanical Turk (MTurk), Prolific, Leger)

Advantages

Disadvantages

Additional considerations

Consider using a participant pool management system (e.g. Sona Systems)

Advantages

Disadvantages

Additional considerations

Data Collection Tool Design

Technology- and content-based strategies for mitigating fraud in the data collection tool design stage

Data collection tool design: Technology-based strategies

Include a CAPTCHA verification question

Advantages

Disadvantages

Additional considerations

Enable the bot detection feature in the online survey platform

Advantages

Disadvantages

Additional considerations

Prevent multiple submissions using cookies

Advantages

Disadvantages

Additional considerations

Include hidden or honeypot question(s)

Advantages

Disadvantages

Additional considerations

Protect the survey using a password

Advantages

Disadvantages

Protect the study using online identity authentication

Advantages

Disadvantages

Additional considerations

Use a “Secondary Unique Field”

Advantages

Disadvantages

Additional considerations

Prevent search engine indexing of survey/page URL

Advantages

Disadvantages

Randomize the order of multiple-choice responses

Advantages

Disadvantages

Prevent multiple responses from the same IP address

Advantages

Disadvantages

Additional considerations

Data collection tool design: Content-based strategies

Include multiple questions that relate to the eligibility criteria

Advantages

Disadvantages

Additional considerations

Include question(s) that are highly specific to the target population or that test institutional knowledge

Advantages

Disadvantages

Additional considerations

Repeat questions or include similar questions to enhance accuracy of fraud detection

Advantages

Disadvantages

Additional considerations

Include open-ended question(s)

Advantages

Disadvantages

Additional considerations

Include attention check question(s) or false question(s)

Advantages

Disadvantages

Data Cleaning Strategies

Strategies for mitigating fraud in the data cleaning stage

Data Cleaning Strategies

Verify the duplication or legitimacy of participant email addresses

Advantages

Disadvantages

Additional considerations

Verify IP addresses or browser/OS combinations

Advantages

Disadvantages

Review for survey response patterns

Advantages

Disadvantages

Monitor speed of survey completion

Advantages

Disadvantages

Additional considerations

Monitor survey start and stop time

Advantages

Disadvantages

Monitor the timing of survey responses in relation to recruitment campaigns

Advantages

Disadvantages

Conduct a verification step and monitor for inconsistencies in responses

Advantages

Disadvantages

Additional considerations

Frequently Asked Questions

This FAQ section is designed to address common questions and provide guidance on best practices and ethical considerations for mitigating fraud in online research studies.

1. How many strategies should I implement in each of my studies?

The number of fraud-mitigating strategies that should be used will be unique to each research context. General guidance includes:

2. Can I just use the built-in antifraud technology in platforms such as REDCap or Qualtrics?

3. Do I need to provide compensation even though fraudulent actors seem to target studies offering incentives?

4. What other ethical principles guide the use of study incentives?

The use of study incentives is subject to institutional and national research ethics policies. Some key ethical principles that impact how researchers should manage incentives in online research include:

5. What should I do if my survey is anonymous?

References & Resources

References and additional reading

Bonett, S., Lin, W., Sexton Topper, P., Wolfe, J., Golinkoff, J., Deshpande, A., … & Bauermeister, J. (2024). Assessing and Improving Data Integrity in Web-Based Surveys: Comparison of Fraud Detection Systems in a COVID-19 Study. JMIR Formative Research, 8, e47091.

Goodrich, B., Fenton, M., Penn, J., Bovay, J., & Mountain, T. (2023). Battling bots: Experiences and strategies to mitigate fraudulent responses in online surveys. Applied Economic Perspectives and Policy, 45(2), 762-784.

Griffin, M., Martino, R. J., LoSchiavo, C., Comer-Carruthers, C., Krause, K. D., Stults, C. B., & Halkitis, P. N. (2021). Ensuring survey research data integrity in the era of internet bots. Quality & quantity, 1-12.

King-Nyberg, B., Thomson, E. F., Morris-Reade, J., Borgen, R., & Taylor, C. (2023). The Bot Toolbox: An Accidental Case Study on How to Eliminate Bots from Your Online Survey. Journal for Social Thought, 7(1).

Lawlor, J., Thomas, C., Guhin, A. T., Kenyon, K., Lerner, M. D., Ucas Consortium, & Drahota, A. (2021). Suspicious and fraudulent online survey participation: Introducing the REAL framework. Methodological Innovations, 14(3), 20597991211050467.

Sterzing, P. R., Gartner, R. E., & McGeough, B. L. (2018). Conducting anonymous, incentivized, online surveys with sexual and gender minority adolescents: Lessons learned from a national polyvictimization study. Journal of interpersonal violence, 33(5), 740-761.

Yarrish, C., Groshon, L., Mitchell, J., Appelbaum, A., Klock, S., Winternitz, T., & Friedman-Wheeler, D. G. (2019). Finding the signal in the noise: Minimizing responses from bots and inattentive humans in online research. The Behavior Therapist, 42(7), 235-242.

Research Policies and Guidance

Guidance from peer institutions

Survey platform resources

University of Toronto Contacts

For questions related to research ethics contact the Human Research Ethics Unit (HREU)

For questions related to information security contact the Research Information Security Program (RISP)

Download a PDF of this guidance