<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v22i10e23021</article-id>
      <article-id pub-id-type="pmid">33026360</article-id>
      <article-id pub-id-type="doi">10.2196/23021</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Threats of Bots and Other Bad Actors to Data Quality Following Research Participant Recruitment Through Social Media: Cross-Sectional Questionnaire</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Katapodi</surname>
            <given-names>Maria</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Akers</surname>
            <given-names>Laura</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>West</surname>
            <given-names>William</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Pozzar</surname>
            <given-names>Rachel</given-names>
          </name>
          <degrees>RN, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Phyllis F Cantor Center for Research in Nursing and Patient Care Services</institution>
            <institution>Dana-Farber Cancer Institute</institution>
            <addr-line>450 Brookline Ave</addr-line>
            <addr-line>LW517</addr-line>
            <addr-line>Boston, MA, </addr-line>
            <country>United States</country>
            <phone>1 857 215 0743</phone>
            <email>rachel_pozzar@dfci.harvard.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5033-5701</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Hammer</surname>
            <given-names>Marilyn J</given-names>
          </name>
          <degrees>RN, DC, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-9561-6144</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Underhill-Blazey</surname>
            <given-names>Meghan</given-names>
          </name>
          <degrees>APRN, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-1433-5915</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Wright</surname>
            <given-names>Alexi A</given-names>
          </name>
          <degrees>MPH, MD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-9776-7114</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Tulsky</surname>
            <given-names>James A</given-names>
          </name>
          <degrees>MD</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-7458-0453</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Hong</surname>
            <given-names>Fangxin</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8049-0086</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author">
          <name name-style="western">
            <surname>Gundersen</surname>
            <given-names>Daniel A</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2543-9231</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author">
          <name name-style="western">
            <surname>Berry</surname>
            <given-names>Donna L</given-names>
          </name>
          <degrees>RN, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff7" ref-type="aff">7</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7935-2807</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Phyllis F Cantor Center for Research in Nursing and Patient Care Services</institution>
        <institution>Dana-Farber Cancer Institute</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>School of Nursing</institution>
        <institution>University of Rochester</institution>
        <addr-line>Rochester, NY</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>McGraw/Patterson Center for Population Sciences</institution>
        <institution>Dana-Farber Cancer Institute</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Psychosocial Oncology and Palliative Care</institution>
        <institution>Dana-Farber Cancer Institute</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Department of Data Sciences</institution>
        <institution>Dana-Farber Cancer Institute</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>Survey and Data Management Core</institution>
        <institution>Dana-Farber Cancer Institute</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff7">
        <label>7</label>
        <institution>Department of Biobehavioral Nursing and Health Informatics</institution>
        <institution>University of Washington</institution>
        <addr-line>Seattle, WA</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Rachel Pozzar <email>rachel_pozzar@dfci.harvard.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>10</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>7</day>
        <month>10</month>
        <year>2020</year>
      </pub-date>
      <volume>22</volume>
      <issue>10</issue>
      <elocation-id>e23021</elocation-id>
      <history>
        <date date-type="received">
          <day>30</day>
          <month>7</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>14</day>
          <month>9</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>16</day>
          <month>9</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>16</day>
          <month>9</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Rachel Pozzar, Marilyn J Hammer, Meghan Underhill-Blazey, Alexi A Wright, James A Tulsky, Fangxin Hong, Daniel A Gundersen, Donna L Berry. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 07.10.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.jmir.org/2020/10/e23021/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Recruitment of health research participants through social media is becoming more common. In the United States, 80% of adults use at least one social media platform. Social media platforms may allow researchers to reach potential participants efficiently. However, online research methods may be associated with unique threats to sample validity and data integrity. Limited research has described issues of data quality and authenticity associated with the recruitment of health research participants through social media, and sources of low-quality and fraudulent data in this context are poorly understood.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The goal of the research was to describe and explain threats to sample validity and data integrity following recruitment of health research participants through social media and summarize recommended strategies to mitigate these threats. Our experience designing and implementing a research study using social media recruitment and online data collection serves as a case study.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Using published strategies to preserve data integrity, we recruited participants to complete an online survey through the social media platforms Twitter and Facebook. Participants were to receive $15 upon survey completion. Prior to manually issuing remuneration, we reviewed completed surveys for indicators of fraudulent or low-quality data. Indicators attributable to respondent error were labeled suspicious, while those suggesting misrepresentation were labeled fraudulent. We planned to remove cases with 1 fraudulent indicator or at least 3 suspicious indicators.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Within 7 hours of survey activation, we received 271 completed surveys. We classified 94.5% (256/271) of cases as fraudulent and 5.5% (15/271) as suspicious. In total, 86.7% (235/271) provided inconsistent responses to verifiable items and 16.2% (44/271) exhibited evidence of bot automation. Of the fraudulent cases, 53.9% (138/256) provided a duplicate or unusual response to one or more open-ended items and 52.0% (133/256) exhibited evidence of inattention.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Research findings from several disciplines suggest studies in which research participants are recruited through social media are susceptible to data quality issues. Opportunistic individuals who use virtual private servers to fraudulently complete research surveys for profit may contribute to low-quality data. Strategies to preserve data integrity following research participant recruitment through social media are limited. Development and testing of novel strategies to prevent and detect fraud is a research priority.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>social media</kwd>
        <kwd>internet</kwd>
        <kwd>methods</kwd>
        <kwd>data accuracy</kwd>
        <kwd>fraud</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Health research participants are increasingly recruited online [<xref ref-type="bibr" rid="ref1">1</xref>]. Researchers may access potential research participants through a variety of online sources, including classified advertisements, search engine advertisements, survey panels, email listservs, crowdsourced online labor markets, and social media platforms [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>]. Recruitment of health research participants through social media is particularly popular and has been reported in at least 69 unique papers published between 2011 and 2019 [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref7">7</xref>].</p>
      <p>Recruitment of health research participants through social media may appeal to researchers for several reasons. First, 80% of US adults use social media, and rates of social media use exceed 60% in almost every sociodemographic category for which data are available [<xref ref-type="bibr" rid="ref8">8</xref>]. Although only 40% of US adults aged 65 years and older use social media, this proportion has grown substantially from 12% in 2010 [<xref ref-type="bibr" rid="ref8">8</xref>]. Second, social media platforms permit researchers to target advertisements to users according to their age, gender, education, location, interests, and behaviors [<xref ref-type="bibr" rid="ref9">9</xref>]. Targeted social media advertisements enable researchers to direct their recruitment efforts toward individuals who are likely to meet study eligibility criteria. Third, the practical and ethical considerations of recruiting health research participants from social media have been well characterized. Guides to using social media to recruit participants to health research studies are available in the peer-reviewed literature and are increasingly produced by academic institutions [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. Likewise, several authors have proposed approaches to ensure the protection of human research participants who are recruited through social media [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>].</p>
      <p>Researchers have sought to describe the extent to which participant recruitment through social media is cost-effective and efficient [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref19">19</xref>]. Although study results vary, some researchers suggest the use of social media may be more efficient and affordable than traditional recruitment methods in clinical settings [<xref ref-type="bibr" rid="ref5">5</xref>]. Likewise, there is evidence that social media platforms effectively provide researchers with a way to access members of small or difficult-to-reach populations [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. Despite these findings, studies in which research participants are recruited through social media are vulnerable to the same challenges associated with other methods of recruiting research participants online [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>]. Respondent misrepresentation of eligibility criteria, duplicate enrollment, and automated enrollment by software applications known as bots pose serious threats to sample validity and data integrity [<xref ref-type="bibr" rid="ref23">23</xref>]. Nevertheless, these challenges are poorly described in the health sciences literature, particularly as they relate to the recruitment of health research participants through social media.</p>
      <p>Ongoing development of best practices for all aspects of online research is necessary to encourage rigor and ensure judicious use of limited resources. The purpose of this paper is to describe and explain potential threats to sample validity and data integrity associated with the recruitment of health research participants through social media. We use our recent experience recruiting health research participants through social media as a case study. Drawing upon this example and from published research within and outside of the health sciences literature, we aim to provide a comprehensive overview of strategies that may be used to mitigate these threats.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>We designed a cross-sectional descriptive study that elicited patient perceptions of patient-provider communication in the ovarian cancer care setting. At the time of initial recruitment, eligible participants were English-speaking US adults diagnosed with ovarian cancer within the last 12 months. We planned to recruit participants through the Facebook and Twitter social media platforms and collect data online through a Research Electronic Data Capture (REDCap) survey [<xref ref-type="bibr" rid="ref24">24</xref>]. Upon survey completion, valid participants would be issued a $15 electronic gift card. The Dana-Farber/Harvard Cancer Center institutional review board (IRB) approved the study protocol.</p>
      <p>We developed our study protocol (<xref rid="figure1" ref-type="fig">Figure 1</xref>) after reviewing published guides to recruiting health research participants online [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>] and seeking advice from our institution’s REDCap administrators and survey research core. First, we created a study page on Facebook and study account on Twitter. Next, we developed and planned to disseminate a set of Facebook posts, targeted Facebook advertisements, tweets (Twitter posts), and targeted Twitter advertisements. The Facebook page, Twitter account profile, Facebook posts, tweets, and targeted advertisements each included a brief overview of the study purpose and link to an eligibility screening questionnaire. Promotions described a gynecologic cancer communication study rather than an ovarian cancer communication study to prevent respondent misrepresentation of eligibility criteria [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. No other details related to eligibility criteria were apparent from study promotions.</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>Procedure for participant recruitment and enrollment.</p>
        </caption>
        <graphic xlink:href="jmir_v22i10e23021_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>To access the eligibility screening questionnaire, respondents were required to pass a completely automated public Turing test to tell computers and humans apart (CAPTCHA) [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. The eligibility screening questionnaire asked respondents to report how they heard about the study and used branching logic to deny access to ineligible respondents [<xref ref-type="bibr" rid="ref25">25</xref>]. Respondents who reportedly met eligibility criteria were directed to a study information page that included all elements of informed consent. The study information page informed respondents that remuneration was limited to one gift card per participant and evidence of fraudulent activity may result in study removal [<xref ref-type="bibr" rid="ref23">23</xref>]. Respondents who agreed to enroll in the study were prompted to provide their email address and create a survey passcode. Enrolled participants received automated emails containing a unique survey link and were required to enter their passcode to access the survey.</p>
      <p>The survey included 124 closed- and 14 open-ended items. We pretested the survey and estimated that it would require 15 minutes to complete. We designed the survey to include several elements aimed at identifying low-quality or fraudulent responses. These included (1) a timestamp at the beginning and end of the survey, (2) hidden items, which are visible to bots but invisible to human respondents, and (3) pairs of items that could be used to identify inconsistent or illogical responses (eg, timestamp time zone and self-reported location). Prior to manually distributing participant remuneration, we planned to review completed surveys for evidence of inattention, duplicate or unusual responses to open-ended items, inconsistent responses to verifiable items, and evidence of automation. Specific examples from each of these categories are provided in the Results section.</p>
      <p>We initiated recruitment with a single tweet that read “Help researchers learn about communication in gynecologic cancer care. Fill out a research survey from Dana-Farber Cancer Institute and receive a $15 Amazon gift card. Visit [link to the eligibility screening questionnaire] to learn more.” We also added the link to the eligibility screening questionnaire to the study Facebook page and Twitter account profile. We scheduled targeted advertisements to be launched at a later date.</p>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>Less than 7 hours after initiating recruitment, 576 respondents had completed the eligibility screening questionnaire. We suspected fraudulent activity after noting that although eligibility was limited to US residents, 82.5% (475/576) of responses to the eligibility screening questionnaire were submitted between the hours of midnight and 4:00 am Eastern Standard Time. In turn, we removed the tweet containing the link to the eligibility screening questionnaire, deleted the link from the Facebook page and Twitter account profile, and temporarily deactivated the survey.</p>
      <p>Of the respondents who completed the eligibility screening questionnaire, 47.0% (271/576) reportedly met eligibility criteria, enrolled in the study, and completed the survey. Of the completed surveys, 47.2% (128/271) were submitted between the hours of 1:00 and 5:00 am in the participant’s reported time zone. The mean time to survey completion was 12.8 (SD 14.8) minutes. Three members of the study team (RP, MJH, and DLB) assessed completed surveys for quality and authenticity. We began by highlighting evidence of inattention, duplicate or unusual responses to open-ended items, inconsistent responses to verifiable items, and evidence of automation in each case. Next, we documented the specific indicators of low-quality or fraudulent data that were present in the data set. Indicators that could reasonably be attributed to respondent error or coincidence were labeled as suspicious, while those that strongly suggested automation or respondent misrepresentation were labeled as fraudulent (<xref ref-type="table" rid="table1">Table 1</xref>). Given the possibility that some legitimate respondents could have completed the survey between the hours of 1:00 and 5:00 am, we opted not to include hour of survey submission on our list of indicators.</p>
      <p>We classified cases with 1 fraudulent indicator or at least 3 suspicious indicators as fraudulent, cases with no fraudulent indicators and 1 to 2 suspicious indicators as suspicious, and cases with no fraudulent or suspicious indicators as legitimate.</p>
      <p>In total, we classified 94.5% (256/271) as fraudulent, 5.5% (15/271) as suspicious, and none as legitimate. Most cases (241/271, 88.9%) exhibited more than 1 type of indicator of low-quality or fraudulent data. Of the fraudulent cases, 52.0% (133/256) exhibited evidence of inattention, with survey completion times under 5 minutes in 24.6% (63/256) of cases and under 10 minutes in 27.3% (70/256) of cases. More than half of the fraudulent cases (138/256, 53.9%) included a duplicate or unusual response to an open-ended item. For example, in response to an item asking if participants wished to share anything else about communicating with doctors and other health professionals, 2 respondents entered “professional and technical personnel carry out film packaging management.” In response to an item asking participants what recommendations their clinicians had made about surgery, 6 respondents entered “the first choice surgery excision treatment, surgery pathology.”</p>
      <table-wrap position="float" id="table1">
        <label>Table 1</label>
        <caption>
          <p>Indicators of low-quality or fraudulent data.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="30"/>
          <col width="870"/>
          <col width="100"/>
          <thead>
            <tr valign="top">
              <td colspan="2">Indicator</td>
              <td>Designation</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td colspan="2">
                <bold>Evidence of inattention</bold>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Survey completion time &#60;5 minutes</td>
              <td>Fraudulent</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Survey completion time &#60;10 minutes</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Same response provided to every closed-ended item on a survey page (straight lining)</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td colspan="2">
                <bold>Duplicate or unusual responses to open-ended items</bold>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Exact response (consisting of more than 2-3 words) provided by more than one respondent</td>
              <td>Fraudulent</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Response is nonsensical or irrelevant to item</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Several responses follow the same pattern in terms of phrasing or formatting</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Response is an exact duplicate of text found on an existing website</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td colspan="2">
                <bold>Inconsistent responses to verifiable items</bold>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Reported location and zip code prefix do not match</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Reported location and timestamp time zone do not match</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Reported treatment facility is not a cancer care facility</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Timestamp time zone indicates survey was completed outside of the United States</td>
              <td>Fraudulent</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Response to “Where did you hear about this survey?” identified an organization that was not involved with recruitment</td>
              <td>Suspicious</td>
            </tr>
            <tr valign="top">
              <td colspan="2">
                <bold>Evidence of bot automation</bold>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Response provided to one or more hidden items</td>
              <td>Fraudulent</td>
            </tr>
          </tbody>
        </table>
      </table-wrap>
      <p>In total, 86.7% (235/271) of cases included an inconsistent response to 1 or more verifiable items, and 16.2% (44/271) included a response to a hidden item. Every case that included a response to a hidden item and had valid timestamp data (25/271, 9.2%) exhibited a survey completion time under 2 minutes.</p>
      <p>After consulting with our institution’s IRB, we removed fraudulent cases from the study without remuneration. We issued remuneration to the 15 respondents whose cases were classified as suspicious; however, we will exclude these cases from planned data analyses. We reinitiated recruitment by creating a duplicate REDCap project with a new URL. The new URL was not posted publicly; rather, promotions were limited to targeted Facebook advertisements and Facebook posts in private groups. Several months after successfully reinitiating recruitment in this fashion, we received 3 completed surveys in rapid succession. Upon review, we classified these cases as fraudulent. On review of Facebook user engagement with our targeted advertisements, we determined that a Facebook user who met our targeting criteria had shared one of our advertisements in a public Facebook post. We promptly removed the advertisements from Facebook and reinitiated recruitment using a third REDCap project URL without further issues.</p>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Our initial attempt to recruit health research participants through social media resulted in a large volume of low-quality and fraudulent data. Although we implemented strategies to prevent respondent misrepresentation of eligibility criteria and automated enrollment, hundreds of respondents navigated past checkpoints meant to restrict access to eligible human respondents.</p>
        <p>Although our study protocol was informed by published guidance on the recruitment of health research participants through social media [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref14">14</xref>], discussions of data quality and authenticity are largely absent from these works. Likewise, existing discussions of data quality and authenticity may be embedded in articles that discuss the challenges of online research more generally [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. Researchers who consult the literature prior to recruiting health research participants through social media may overlook articles that do not refer to social media explicitly.</p>
        <p>Our experience suggests studies in which research participants are recruited through social media are susceptible to many of the same pitfalls as studies in which participants are recruited through other online means [<xref ref-type="bibr" rid="ref25">25</xref>-<xref ref-type="bibr" rid="ref28">28</xref>]. In a related example, Dewitt and colleagues [<xref ref-type="bibr" rid="ref22">22</xref>] conducted a cross-sectional descriptive study in which data were collected via web-based survey. The study team recruited research participants through an electronic mailing list and Facebook. Following data collection, they found that 60.5% (289/478) of completed survey responses were fraudulent. Similarly, Ballard and colleagues recruited research participants through an unspecified social media platform [<xref ref-type="bibr" rid="ref21">21</xref>]. Following data collection, they determined that of the survey responses, 28.3% (117/414) were fraudulent and 10.1% (42/414) were potentially fraudulent. It is possible that the proportion of fraudulent responses was higher in our study because we shared the link to our eligibility screening questionnaire on both Facebook and Twitter. Nevertheless, these findings highlight the need to address issues of sample validity and data integrity as they pertain to the role of social media in health research.</p>
        <p>Although issues of data quality and authenticity are not unique to studies in which research participants are recruited online, individuals who intend to defraud researchers may find that technology permits them to do so on a larger scale than would otherwise be possible. For example, bots can be programmed to rapidly complete online surveys. However, our experience and those of others suggest that the majority of fraudulent data cannot be attributed to bots alone [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. All respondents in our study were able to pass a CAPTCHA, and only 16.2% (44/271) responded to one or more hidden survey items. Although some bots may be capable of passing a CAPTCHA and generating a fraudulent email address [<xref ref-type="bibr" rid="ref22">22</xref>], access to our survey was restricted to respondents who provided a valid email address and had access to its inbox. Moreover, most respondents successfully identified a cancer treatment facility in the United States and entered a zip code prefix in the same geographic region. These activities require a degree of sophistication characteristic of human respondents [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
        <p>Several authors have observed that <italic>satisficing</italic>, in which eligible respondents expend the minimal amount of cognitive effort needed to complete a survey, contributes to low-quality data [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. One limitation of our fraud detection protocol is the overlap between indicators of fraud and indicators of satisficing. However, given the speed with which we accumulated low-quality data, it is likely that our results largely reflect a coordinated effort by ineligible respondents to obtain remuneration rather than sample-wide satisficing. Groups of individuals who intend to defraud researchers may exchange information about online research studies that provide financial incentives [<xref ref-type="bibr" rid="ref23">23</xref>]. Moreover, in a 2019 blog post, the founder of a company specializing in market research identified at least one website dedicated to training individuals to fraudulently complete large volumes of online surveys [<xref ref-type="bibr" rid="ref31">31</xref>]. Although the phenomenon of respondent misrepresentation has been identified in the health sciences literature [<xref ref-type="bibr" rid="ref25">25</xref>], the mechanisms by which low-quality and fraudulent survey responses are submitted by human respondents are poorly described. Improved understanding of this phenomenon is necessary to prevent the exploitation of research studies in which participants are recruited through social media and other online means.</p>
      </sec>
      <sec>
        <title>Role of Virtual Private Servers</title>
        <p>Research from other disciplines offers insight into strategies used to defraud researchers who recruit research participants online. In the field of behavioral accounting, Dennis and colleagues [<xref ref-type="bibr" rid="ref28">28</xref>] described 2 studies in which they recruited research participants through Amazon’s Mechanical Turk, a crowdsourced online labor market. They received a large volume of responses that exhibited many of the same indicators of low-quality or fraudulent data that were present in our data. The authors used internet protocol (IP) address geolocation to identify the source of these responses and discovered multiple IP addresses with identical global positioning system coordinates. On further investigation, the authors determined that the IP addresses in question were associated with both a server farm and an internet service provider known to provide virtual private servers (VPSs).</p>
        <p>Server farms are large collections of computer hardware housed in a single location. Server farms provide users with remote access to hardware with a processing capacity that exceeds that of a single computer. Each server farm can host a nearly unlimited number of VPSs, each of which functions like an individual computer but lacks its own physical hardware [<xref ref-type="bibr" rid="ref28">28</xref>]. Like a physical computer, a VPS comprises data files, software programs, and an operating system [<xref ref-type="bibr" rid="ref28">28</xref>]. An individual using more than one VPS would be able to use one physical computer to remotely program multiple VPSs to complete research surveys at the same time (<xref rid="figure2" ref-type="fig">Figure 2</xref>).</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>The role of virtual private servers in research participant misrepresentation.</p>
          </caption>
          <graphic xlink:href="jmir_v22i10e23021_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>Responses that originate from one individual using more than one VPS may be difficult to identify. Each VPS has a unique IP address associated with the physical location of the server farm rather than that of its user [<xref ref-type="bibr" rid="ref28">28</xref>]. An individual using more than one VPS may masquerade as multiple respondents, each with a unique IP address. Furthermore, an individual using a VPS hosted on a server farm within the United States may mask his or her true location and circumvent strategies to limit study enrollment to US residents [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref32">32</xref>].</p>
        <p>A VPS is not the only way in which an individual can mask his or her location. Virtual private networks, anonymous proxies, and spoofed IP addresses may be used for the same purpose. It is important to note that some individuals conceal their location or IP address out of privacy concerns and may not have malicious intent [<xref ref-type="bibr" rid="ref32">32</xref>]. However, research suggests VPS use is associated with the collection of low-quality and fraudulent data following online recruitment of research participants.</p>
        <p>Dennis and colleagues [<xref ref-type="bibr" rid="ref28">28</xref>] used respondent IP addresses to compare the data they received from respondents who used a VPS to the data they received from those who did not. In open-ended item responses, respondents who used a VPS exhibited significantly higher proportions of English language misuse, incoherent or nonsensical phrases, duplicate responses, and responses that were copied verbatim from an existing website. The similarities between the responses received by Dennis and colleagues and our study team suggest individuals who use a VPS to defraud researchers are active outside of crowdsourced labor markets and may enroll in research studies that recruit participants through social media. The implications of this finding for data quality are especially concerning given a recent analysis by Kennedy and colleagues [<xref ref-type="bibr" rid="ref32">32</xref>], who analyzed 38 studies that recruited research participants through Amazon’s Mechanical Turk and found evidence of respondents using a VPS as early as 2015.</p>
      </sec>
      <sec>
        <title>Strategies to Preserve Sample Validity and Data Integrity</title>
        <p>Published papers within and outside of the health sciences literature offer suggestions to avoid collecting low-quality and fraudulent data from research participants recruited online. Although most strategies are applicable to studies that recruit research participants through social media, we provide additional suggestions that are specific to this approach. Limited research describes strategies to identify respondents using a VPS. Herein, we summarize the progress that has been made in this area to date and identify topics in need of further development. Strategies to prevent collection of low-quality or fraudulent data are proposed according to project phase below.</p>
        <p>Preparation of study protocol and IRB application:</p>
        <list list-type="bullet">
          <list-item>
            <p>Develop a written protocol for identifying and responding to low-quality data [<xref ref-type="bibr" rid="ref22">22</xref>]</p>
          </list-item>
          <list-item>
            <p>Include language that permits the study team to verify respondent identities if needed (eg, via telephone call) [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>In consent document, state that participants will be removed from the study without remuneration in cases of fraud and participants will not receive additional remuneration for completing the study more than once [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]</p>
          </list-item>
          <list-item>
            <p>Mail remuneration to a physical address to avoid respondent misrepresentation of location-based eligibility criteria [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>Lower the value of or eliminate remuneration [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>Prepare study advertisements that do not explicitly state eligibility criteria [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]</p>
          </list-item>
          <list-item>
            <p>Seek guidance from institutional resources (eg, information systems, research computing, and the IRB)</p>
          </list-item>
        </list>
        <p>Preparation of data collection instruments:</p>
        <list list-type="bullet">
          <list-item>
            <p>Use a data collection platform with fraud prevention and detection features (eg, Qualtrics) [<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]</p>
          </list-item>
          <list-item>
            <p>Use automated invitations to send each respondent a unique link to the data collection instrument [<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>Ask respondents to identify where they heard about the study [<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>Require respondents to pass a CAPTCHA [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>Collect respondent IP addresses (according to the Health Insurance Portability and Accountability Act Privacy Rule, IP address is considered an identifier) [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]</p>
          </list-item>
          <list-item>
            <p>Collect verifiable information, such as telephone number or physical address [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]</p>
          </list-item>
          <list-item>
            <p>Include at least one hidden item in each instrument. This can be accomplished by adding the @HIDDEN action tag to an item in REDCap or by adding custom JavaScript code to an item in Qualtrics</p>
          </list-item>
          <list-item>
            <p>Include a time stamp at the beginning and end of each instrument [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>Include (and consider requiring a response to) open-ended items [<xref ref-type="bibr" rid="ref28">28</xref>]</p>
          </list-item>
          <list-item>
            <p>Include items with embedded directives (eg, “select the third option below”) [<xref ref-type="bibr" rid="ref27">27</xref>]</p>
          </list-item>
          <list-item>
            <p>Include pairs of items that can be compared for consistency [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
          <list-item>
            <p>Include items that require respondents to demonstrate insider knowledge [<xref ref-type="bibr" rid="ref25">25</xref>]</p>
          </list-item>
        </list>
        <p>Active recruitment and data collection:</p>
        <list list-type="bullet">
          <list-item>
            <p>Avoid posting links to data collection instruments in the public space</p>
          </list-item>
          <list-item>
            <p>Use targeted advertisements to avoid promoting the study to ineligible respondents [<xref ref-type="bibr" rid="ref9">9</xref>]</p>
          </list-item>
          <list-item>
            <p>Limit visibility of study-related social media profiles to audiences in the target geographic regions</p>
          </list-item>
          <list-item>
            <p>Monitor social media user engagement with study posts and advertisements (eg, for public shares or comments related to eligibility criteria)</p>
          </list-item>
          <list-item>
            <p>Monitor frequency and content of responses for suspicious patterns</p>
          </list-item>
          <list-item>
            <p>Identify respondents using a VPS with a tool such as the rIP R package or Shiny [<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>]</p>
          </list-item>
        </list>
        <p>Researchers will need to weigh the potential benefits of each strategy against the financial and practical burden it may impose. For example, eliminating participant remuneration may remove the incentive for individuals who aim to defraud researchers [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. However, survey completion and response rates are likely to be higher when remuneration is offered [<xref ref-type="bibr" rid="ref35">35</xref>]. Entering participants into a raffle drawing for a larger incentive may serve as an acceptable compromise [<xref ref-type="bibr" rid="ref25">25</xref>]. Alternatively, to verify that respondents meet location-based eligibility criteria, researchers may elect to mail gift cards to a physical address rather than send them electronically [<xref ref-type="bibr" rid="ref25">25</xref>]. Some researchers have reported successfully verifying respondent eligibility over the telephone [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref25">25</xref>], but as Teitcher and colleagues [<xref ref-type="bibr" rid="ref23">23</xref>] observed, respondent eligibility verification is labor-intensive and may increase burden for legitimate participants.</p>
        <p>Not every strategy mentioned will be appropriate for every research study. Similarly, no strategy will effectively preserve sample validity and data integrity when used alone. For example, although CAPTCHAs are intended to differentiate human respondents from bots, they are not always effective [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Likewise, although IP addresses can be used to verify that a respondent meets geographic eligibility criteria, IP-based geolocation is not always accurate [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. Given that each strategy may be associated with one or more shortcomings, we recommend a comprehensive and multifaceted approach.</p>
        <p>There is a need for research that develops and tests strategies to limit enrollment of individuals who may be using a VPS to defraud researchers. One approach has been proposed by Waggoner and colleagues [<xref ref-type="bibr" rid="ref33">33</xref>], who developed a package called rIP for the statistical computing environment R (R Foundation for Statistical Computing). The rIP package provides researchers with the location of respondent IP addresses, information about likely VPS or server farm use, and a recommendation about whether to include the respondent’s data in the data set. The team created an online version of the tool called Shiny that allows users to upload comma-separated value files for analysis in lieu of using R [<xref ref-type="bibr" rid="ref33">33</xref>]. Although the rIP package and Shiny application have the potential to substantially reduce the workload associated with data quality review, prevention of low-quality responses is preferable to retrospective data classification. In a separate paper, Kennedy and colleagues [<xref ref-type="bibr" rid="ref32">32</xref>] described embedding code in their Qualtrics survey to identify respondents whose IP address is associated with a server farm or VPS. The code used the IP verification website IP Hub [<xref ref-type="bibr" rid="ref36">36</xref>] to identify these respondents and redirected them to a message informing them that they were ineligible to participate in the study. Additional solutions that capitalize on emerging knowledge of low-quality and fraudulent data sources are needed.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Our study team did not collect the IP addresses of respondents. As such, we could not use the rIP R package or Shiny app [<xref ref-type="bibr" rid="ref33">33</xref>] to determine whether a respondent used a VPS to access our survey. Future research that compares information provided by the rIP R package or Shiny app to the indicators of fraudulent or low-quality data that are described in this paper is warranted.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The recruitment of health research participants through social media is associated with several potential advantages. Nevertheless, studies in which research participants are recruited through social media are vulnerable to significant threats to sample validity and data integrity. There is a pressing need for best practices to prevent respondent misrepresentation of eligibility criteria and to identify low-quality and fraudulent data. As health researchers increasingly turn to social media to access potential research participants, development of strategies to ensure rigor remains a priority.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CAPTCHA</term>
          <def>
            <p>completely automated, public Turing test to tell computers and humans apart</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">IP</term>
          <def>
            <p>internet protocol</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IRB</term>
          <def>
            <p>institutional review board</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">REDCap</term>
          <def>
            <p>Research Electronic Data Capture</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">VPS</term>
          <def>
            <p>virtual private server</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>RP is supported by an American Cancer Society Postdoctoral Fellowship (133063-PF-19-102-01-CPPB) and a Gordon and Betty Moore Foundation Society for Medical Decision Making Fellowship in Medical Decision Making (GBMF7853).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rosa</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Campbell</surname>
              <given-names>ANC</given-names>
            </name>
            <name name-style="western">
              <surname>Miele</surname>
              <given-names>GM</given-names>
            </name>
            <name name-style="western">
              <surname>Brunner</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Winstanley</surname>
              <given-names>EL</given-names>
            </name>
          </person-group>
          <article-title>Using e-technologies in clinical trials</article-title>
          <source>Contemp Clin Trials</source>
          <year>2015</year>
          <month>11</month>
          <volume>45</volume>
          <issue>Pt A</issue>
          <fpage>41</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cct.2015.07.007</pub-id>
          <pub-id pub-id-type="medline">26176884</pub-id>
          <pub-id pub-id-type="pii">S1551-7144(15)30044-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC4648297</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dworkin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hessel</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Gliske</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Rudi</surname>
              <given-names>JH</given-names>
            </name>
          </person-group>
          <article-title>A comparison of three online recruitment strategies for engaging parents</article-title>
          <source>Fam Relat</source>
          <year>2016</year>
          <month>10</month>
          <volume>65</volume>
          <issue>4</issue>
          <fpage>550</fpage>
          <lpage>561</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28804184"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/fare.12206</pub-id>
          <pub-id pub-id-type="medline">28804184</pub-id>
          <pub-id pub-id-type="pmcid">PMC5552070</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guillory</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Murphy</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bradfield</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Nonnemaker</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hsieh</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Comparing Twitter and online panels for survey recruitment of e-cigarette users and smokers</article-title>
          <source>J Med Internet Res</source>
          <year>2016</year>
          <month>11</month>
          <day>15</day>
          <volume>18</volume>
          <issue>11</issue>
          <fpage>e288</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2016/11/e288/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.6326</pub-id>
          <pub-id pub-id-type="medline">27847353</pub-id>
          <pub-id pub-id-type="pii">v18i11e288</pub-id>
          <pub-id pub-id-type="pmcid">PMC5128722</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Antoun</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Conrad</surname>
              <given-names>FG</given-names>
            </name>
            <name name-style="western">
              <surname>Schober</surname>
              <given-names>MF</given-names>
            </name>
          </person-group>
          <article-title>Comparisons of online recruitment strategies for convenience samples: Craigslist, Google AdWords, Facebook, and Amazon Mechanical Turk</article-title>
          <source>Field Methods</source>
          <year>2015</year>
          <month>09</month>
          <day>16</day>
          <volume>28</volume>
          <issue>3</issue>
          <fpage>231</fpage>
          <lpage>246</lpage>
          <pub-id pub-id-type="doi">10.1177/1525822X15603149</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reagan</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Nowlin</surname>
              <given-names>SY</given-names>
            </name>
            <name name-style="western">
              <surname>Birdsall</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Gabbay</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Vorderstrasse</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>D'Eramo Melkus</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Integrative review of recruitment of research participants through Facebook</article-title>
          <source>Nurs Res</source>
          <year>2019</year>
          <volume>68</volume>
          <issue>6</issue>
          <fpage>423</fpage>
          <lpage>432</lpage>
          <pub-id pub-id-type="doi">10.1097/NNR.0000000000000385</pub-id>
          <pub-id pub-id-type="medline">31693547</pub-id>
          <pub-id pub-id-type="pii">00006199-201911000-00002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Topolovec-Vranic</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Natarajan</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The use of social media in recruitment for medical research studies: a scoping review</article-title>
          <source>J Med Internet Res</source>
          <year>2016</year>
          <month>11</month>
          <day>7</day>
          <volume>18</volume>
          <issue>11</issue>
          <fpage>e286</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2016/11/e286/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.5698</pub-id>
          <pub-id pub-id-type="medline">27821383</pub-id>
          <pub-id pub-id-type="pii">v18i11e286</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Whitaker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Stevelink</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Fear</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The use of Facebook in recruiting participants for health research purposes: a systematic review</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>08</month>
          <day>28</day>
          <volume>19</volume>
          <issue>8</issue>
          <fpage>e290</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2017/8/e290/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.7071</pub-id>
          <pub-id pub-id-type="medline">28851679</pub-id>
          <pub-id pub-id-type="pii">v19i8e290</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Pew Research Center</collab>
          </person-group>
          <source>Social Media Fact Sheet</source>
          <year>2019</year>
          <access-date>2020-07-27</access-date>
          <publisher-loc>Washington</publisher-loc>
          <publisher-name>Pew Internet and American Life Project</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewresearch.org/internet/fact-sheet/social-media/">https://www.pewresearch.org/internet/fact-sheet/social-media/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carter-Harris</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Facebook targeted advertisement for research recruitment: a primer for nurse researchers</article-title>
          <source>Appl Nurs Res</source>
          <year>2016</year>
          <month>11</month>
          <volume>32</volume>
          <fpage>144</fpage>
          <lpage>147</lpage>
          <pub-id pub-id-type="doi">10.1016/j.apnr.2016.07.006</pub-id>
          <pub-id pub-id-type="medline">27969019</pub-id>
          <pub-id pub-id-type="pii">S0897-1897(16)30065-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Akers</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <article-title>Using Facebook for large-scale online randomized clinical trial recruitment: effective advertising strategies</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>11</month>
          <day>08</day>
          <volume>20</volume>
          <issue>11</issue>
          <fpage>e290</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2018/11/e290/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9372</pub-id>
          <pub-id pub-id-type="medline">30409765</pub-id>
          <pub-id pub-id-type="pii">v20i11e290</pub-id>
          <pub-id pub-id-type="pmcid">PMC6250956</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arigo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pagoto</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Carter-Harris</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Lillie</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Nebeker</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Using social media for health research: methodological and ethical considerations for recruitment and intervention delivery</article-title>
          <source>Digit Health</source>
          <year>2018</year>
          <volume>4</volume>
          <fpage>2055207618771757</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29942634"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2055207618771757</pub-id>
          <pub-id pub-id-type="medline">29942634</pub-id>
          <pub-id pub-id-type="pii">10.1177_2055207618771757</pub-id>
          <pub-id pub-id-type="pmcid">PMC6016568</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Harvard Catalyst Regulatory Foundations, Ethics, &#38; Law Program</collab>
          </person-group>
          <article-title>The use of social media in recruitment to research: a guide for investigators and IRBs</article-title>
          <year>2017</year>
          <access-date>2020-07-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://catalyst.harvard.edu/pdf/regulatory/Social_Media_Guidance.pdf">https://catalyst.harvard.edu/pdf/regulatory/Social_Media_Guidance.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <article-title>The use of social media in recruitment to research: a guide for investigators and IRBs</article-title>
          <year>2017</year>
          <access-date>2020-07-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://catalyst.harvard.edu/pdf/regulatory/Social_Media_Guidance.pdf">https://catalyst.harvard.edu/pdf/regulatory/Social_Media_Guidance.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ramo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kaur</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Introduction to social media recruitment: opportunities and challenges</source>
          <year>2020</year>
          <access-date>2020-07-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://recruit.ucsf.edu/introduction-social-media-recruitment-opportunities-and-challenges">https://recruit.ucsf.edu/introduction-social-media-recruitment-opportunities-and-challenges</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kamp</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Herbell</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Magginis</surname>
              <given-names>WH</given-names>
            </name>
            <name name-style="western">
              <surname>Berry</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Given</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Facebook recruitment and the protection of human subjects</article-title>
          <source>West J Nurs Res</source>
          <year>2019</year>
          <month>02</month>
          <day>07</day>
          <volume>41</volume>
          <issue>9</issue>
          <fpage>1270</fpage>
          <lpage>1281</lpage>
          <pub-id pub-id-type="doi">10.1177/0193945919828108</pub-id>
          <pub-id pub-id-type="medline">30729866</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wozney</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Turner</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Rose-Davis</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>McGrath</surname>
              <given-names>PJ</given-names>
            </name>
          </person-group>
          <article-title>Facebook ads to the rescue? Recruiting a hard to reach population into an Internet-based behavioral health intervention trial</article-title>
          <source>Internet Interv</source>
          <year>2019</year>
          <month>09</month>
          <volume>17</volume>
          <fpage>100246</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2214-7829(19)30003-X"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.invent.2019.100246</pub-id>
          <pub-id pub-id-type="medline">31080751</pub-id>
          <pub-id pub-id-type="pii">S2214-7829(19)30003-X</pub-id>
          <pub-id pub-id-type="pmcid">PMC6500917</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Frandsen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Thow</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ferguson</surname>
              <given-names>SG</given-names>
            </name>
          </person-group>
          <article-title>The effectiveness of social media (Facebook) compared with more traditional advertising methods for recruiting eligible participants to health research studies: a randomized, controlled clinical trial</article-title>
          <source>JMIR Res Protoc</source>
          <year>2016</year>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>e161</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.researchprotocols.org/2016/3/e161/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/resprot.5747</pub-id>
          <pub-id pub-id-type="medline">27511829</pub-id>
          <pub-id pub-id-type="pii">v5i3e161</pub-id>
          <pub-id pub-id-type="pmcid">PMC4997003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ramo</surname>
              <given-names>DE</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez</surname>
              <given-names>TMS</given-names>
            </name>
            <name name-style="western">
              <surname>Chavez</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sommer</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Prochaska</surname>
              <given-names>JJ</given-names>
            </name>
          </person-group>
          <article-title>Facebook recruitment of young adult smokers for a cessation trial: methods, metrics, and lessons learned</article-title>
          <source>Internet Interv</source>
          <year>2014</year>
          <month>04</month>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>58</fpage>
          <lpage>64</lpage>
          <pub-id pub-id-type="doi">10.1016/j.invent.2014.05.001</pub-id>
          <pub-id pub-id-type="medline">25045624</pub-id>
          <pub-id pub-id-type="pmcid">PMC4100621</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carter-Harris</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bartlett</surname>
              <given-names>ER</given-names>
            </name>
            <name name-style="western">
              <surname>Warrick</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rawl</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Beyond traditional newspaper advertisement: leveraging Facebook-targeted advertisement to recruit long-term smokers for research</article-title>
          <source>J Med Internet Res</source>
          <year>2016</year>
          <volume>18</volume>
          <issue>6</issue>
          <fpage>e117</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2016/6/e117/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.5502</pub-id>
          <pub-id pub-id-type="medline">27306780</pub-id>
          <pub-id pub-id-type="pii">v18i6e117</pub-id>
          <pub-id pub-id-type="pmcid">PMC4927805</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nelson</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Loux</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Arnold</surname>
              <given-names>LD</given-names>
            </name>
            <name name-style="western">
              <surname>Siddiqui</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Schootman</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Obtaining contextually relevant geographic data using Facebook recruitment in public health studies</article-title>
          <source>Health Place</source>
          <year>2019</year>
          <month>01</month>
          <volume>55</volume>
          <fpage>37</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1016/j.healthplace.2018.11.002</pub-id>
          <pub-id pub-id-type="medline">30466814</pub-id>
          <pub-id pub-id-type="pii">S1353-8292(18)30527-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ballard</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Cardwell</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Young</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Fraud detection protocol for web-based research among men who have sex with men: development and descriptive evaluation</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2019</year>
          <month>02</month>
          <day>04</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>e12344</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2019/1/e12344/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12344</pub-id>
          <pub-id pub-id-type="medline">30714944</pub-id>
          <pub-id pub-id-type="pii">v5i1e12344</pub-id>
          <pub-id pub-id-type="pmcid">PMC6378547</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dewitt</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Capistrant</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kohli</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Rosser</surname>
              <given-names>BRS</given-names>
            </name>
            <name name-style="western">
              <surname>Mitteldorf</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Merengwa</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>West</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Addressing participant validity in a small internet health survey (the Restore Study): protocol and recommendations for survey response validation</article-title>
          <source>JMIR Res Protoc</source>
          <year>2018</year>
          <month>04</month>
          <day>24</day>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>e96</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchprotocols.org/2018/4/e96/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/resprot.7655</pub-id>
          <pub-id pub-id-type="medline">29691203</pub-id>
          <pub-id pub-id-type="pii">v7i4e96</pub-id>
          <pub-id pub-id-type="pmcid">PMC5941092</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Teitcher</surname>
              <given-names>JEF</given-names>
            </name>
            <name name-style="western">
              <surname>Bockting</surname>
              <given-names>WO</given-names>
            </name>
            <name name-style="western">
              <surname>Bauermeister</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Hoefer</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Miner</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Klitzman</surname>
              <given-names>RL</given-names>
            </name>
          </person-group>
          <article-title>Detecting, preventing, and responding to "fraudsters" in internet research: ethics and tradeoffs</article-title>
          <source>J Law Med Ethics</source>
          <year>2015</year>
          <volume>43</volume>
          <issue>1</issue>
          <fpage>116</fpage>
          <lpage>133</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25846043"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/jlme.12200</pub-id>
          <pub-id pub-id-type="medline">25846043</pub-id>
          <pub-id pub-id-type="pmcid">PMC4669957</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harris</surname>
              <given-names>PA</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Thielke</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Payne</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gonzalez</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Conde</surname>
              <given-names>JG</given-names>
            </name>
          </person-group>
          <article-title>Research electronic data capture (REDCap): a metadata-driven methodology and workflow process for providing translational research informatics support</article-title>
          <source>J Biomed Inform</source>
          <year>2009</year>
          <month>04</month>
          <volume>42</volume>
          <issue>2</issue>
          <fpage>377</fpage>
          <lpage>381</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://linkinghub.elsevier.com/retrieve/pii/S1532-0464(08)00122-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2008.08.010</pub-id>
          <pub-id pub-id-type="medline">18929686</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(08)00122-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC2700030</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kramer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rubin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Coster</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Helmuth</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Hermos</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rosenbloom</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moed</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Dooley</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Liljenquist</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Brief</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Enggasser</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Keane</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Roy</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lachowicz</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Strategies to address participant misrepresentation for eligibility in Web-based research</article-title>
          <source>Int J Methods Psychiatr Res</source>
          <year>2014</year>
          <month>03</month>
          <volume>23</volume>
          <issue>1</issue>
          <fpage>120</fpage>
          <lpage>129</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24431134"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/mpr.1415</pub-id>
          <pub-id pub-id-type="medline">24431134</pub-id>
          <pub-id pub-id-type="pmcid">PMC4070377</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Conrique</surname>
              <given-names>BG</given-names>
            </name>
            <name name-style="western">
              <surname>McDade-Montez</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>PM</given-names>
            </name>
          </person-group>
          <article-title>Detection and prevention of data fraud in a study of community college career technical education students</article-title>
          <source>Community Coll J Res Pract</source>
          <year>2019</year>
          <month>06</month>
          <day>13</day>
          <volume>44</volume>
          <issue>9</issue>
          <fpage>690</fpage>
          <lpage>693</lpage>
          <pub-id pub-id-type="doi">10.1080/10668926.2019.1629126</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>House</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Respondent screening and revealed preference axioms: testing quarantining methods for enhanced data quality in web panel surveys</article-title>
          <source>Public Opin Q</source>
          <year>2015</year>
          <month>06</month>
          <day>02</day>
          <volume>79</volume>
          <issue>3</issue>
          <fpage>687</fpage>
          <lpage>709</lpage>
          <pub-id pub-id-type="doi">10.1093/poq/nfv015</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dennis</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Goodson</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Pearson</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Online worker fraud and evolving threats to the integrity of MTurk data: a discussion of virtual private servers and the limitations of IP-based screening procedures</article-title>
          <source>Behav Res Account</source>
          <year>2020</year>
          <volume>32</volume>
          <issue>1</issue>
          <fpage>119</fpage>
          <lpage>134</lpage>
          <pub-id pub-id-type="doi">10.2308/bria-18-044</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hamby</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Survey satisficing inflates reliability and validity measures: an experimental comparison of college and Amazon Mechanical Turk samples</article-title>
          <source>Educ Psychol Meas</source>
          <year>2016</year>
          <month>12</month>
          <volume>76</volume>
          <issue>6</issue>
          <fpage>912</fpage>
          <lpage>932</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29795893"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/0013164415627349</pub-id>
          <pub-id pub-id-type="medline">29795893</pub-id>
          <pub-id pub-id-type="pii">10.1177_0013164415627349</pub-id>
          <pub-id pub-id-type="pmcid">PMC5965608</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lelkes</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Krosnick</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Marx</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Judd</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Complete anonymity compromises the accuracy of self-reports</article-title>
          <source>J Exp Soc Psychol</source>
          <year>2012</year>
          <month>11</month>
          <volume>48</volume>
          <issue>6</issue>
          <fpage>1291</fpage>
          <lpage>1299</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jesp.2012.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pasternak</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <source>Market research fraud: distributed survey farms exposed</source>
          <year>2019</year>
          <access-date>2020-07-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://persona.ly/blog/2019/01/market-research-fraud-distributed-survey-farms-exposed/">https://persona.ly/blog/2019/01/market-research-fraud-distributed-survey-farms-exposed/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kennedy</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Clifford</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Burleigh</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Waggoner</surname>
              <given-names>PD</given-names>
            </name>
            <name name-style="western">
              <surname>Jewell</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Winter</surname>
              <given-names>NJG</given-names>
            </name>
          </person-group>
          <article-title>The shape of and solutions to the MTurk quality crisis</article-title>
          <source>Pol Sci Res Methods</source>
          <year>2020</year>
          <month>04</month>
          <day>24</day>
          <fpage>1</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1017/psrm.2020.6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Waggoner</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Kennedy</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Clifford</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Detecting fraud in online surveys by tracing, scoring, and visualizing IP addresses</article-title>
          <source>JOSS</source>
          <year>2019</year>
          <month>05</month>
          <volume>4</volume>
          <issue>37</issue>
          <fpage>1285</fpage>
          <pub-id pub-id-type="doi">10.21105/joss.01285</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <collab>R Core Team</collab>
          </person-group>
          <source>R: A Language and Environment for Statistical Computing</source>
          <year>2013</year>
          <publisher-loc>Vienna</publisher-loc>
          <publisher-name>R Foundation for Statistical Computing</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Goritz</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Incentives in web studies: methodological issues and a review</article-title>
          <source>Int J Internet Sci</source>
          <year>2006</year>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>58</fpage>
          <lpage>70</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ijis.net/ijis1_1/ijis1_1_goeritz.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <source>IP Hub: Proxy and VPN detection API</source>
          <year>2020</year>
          <access-date>2020-07-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://iphub.info/">https://iphub.info/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
