<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id><journal-id journal-id-type="publisher-id">jmir</journal-id><journal-id journal-id-type="index">1</journal-id><journal-title>Journal of Medical Internet Research</journal-title><abbrev-journal-title>J Med Internet Res</abbrev-journal-title><issn pub-type="epub">1438-8871</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v28i1e85161</article-id><article-id pub-id-type="doi">10.2196/85161</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Using Epidemiological Test Diagnostics to Select Fraud Detection Methods: Secondary Analysis of Quantitative Cross-Sectional Survey Data</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Willard-Grace</surname><given-names>Rachel</given-names></name><degrees>MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Klima</surname><given-names>Tali</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Dedhia</surname><given-names>Mansi</given-names></name><degrees>MPH, MS</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Lo</surname><given-names>Emily</given-names></name><degrees>BA, BS</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Nisnevich</surname><given-names>Annie</given-names></name><degrees>BS</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Gray</surname><given-names>Allison</given-names></name><degrees>MA</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Henry</surname><given-names>Holly</given-names></name><degrees>MHS, PhD</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib></contrib-group><aff id="aff1"><institution>Department of Family and Community Medicine, University of California, San Francisco</institution><addr-line>Box 1315 2540 23rd St., Floor 5, 5511</addr-line><addr-line>San Francisco</addr-line><addr-line>CA</addr-line><country>United States</country></aff><aff id="aff2"><institution>Practical Research Solutions</institution><addr-line>Sunnyvale</addr-line><addr-line>CA</addr-line><country>United States</country></aff><aff id="aff3"><institution>Lucile Packard Foundation for Children's Health</institution><addr-line>Palo Alto</addr-line><addr-line>CA</addr-line><country>United States</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Stone</surname><given-names>Alicia</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Ekwueme</surname><given-names>Moses</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Deng</surname><given-names>Yangyang</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Rachel Willard-Grace, MPH, Department of Family and Community Medicine, University of California, San Francisco, Box 1315 2540 23rd St., Floor 5, 5511, San Francisco, CA, 94143, United States, 1 415-297-3969; <email>rachel.willard@ucsf.edu</email></corresp></author-notes><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>5</day><month>3</month><year>2026</year></pub-date><volume>28</volume><elocation-id>e85161</elocation-id><history><date date-type="received"><day>02</day><month>10</month><year>2025</year></date><date date-type="rev-recd"><day>11</day><month>01</month><year>2026</year></date><date date-type="accepted"><day>30</day><month>01</month><year>2026</year></date></history><copyright-statement>&#x00A9; Rachel Willard-Grace, Tali Klima, Mansi Dedhia, Emily Lo, Annie Nisnevich, Allison Gray, Holly Henry. Originally published in the Journal of Medical Internet Research (<ext-link ext-link-type="uri" xlink:href="https://www.jmir.org">https://www.jmir.org</ext-link>), 5.3.2026. </copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://www.jmir.org/">https://www.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://www.jmir.org/2026/1/e85161"/><abstract><sec><title>Background</title><p>Survey research has the potential to elevate the experiences and opinions of marginalized populations. The rising number of bot attacks, a method of participant fraud that creates multiple records in survey data using automated software, threatens to drown out those voices and produce inaccurate findings. Rapid identification and mitigation of bot attacks are vital; however, there is limited guidance for researchers on scalable approaches to address this problem.</p></sec><sec><title>Objective</title><p>This study aimed to assess how well recommended methods detect fraud using an epidemiological diagnostic test framework to inform web-based survey researchers on how best to identify and shut down bot attacks.</p></sec><sec sec-type="methods"><title>Methods</title><p>We analyzed data from a cross-sectional web-based statewide survey on access to pediatric subspecialty care in California that used Qualtrics survey software. Caregivers of children with chronic conditions were recruited through family resource centers (FRCs), nonprofit agencies serving families with developmental delays and chronic medical conditions. The survey was sent out to 17 FRCs, whose staff distributed anonymous links to their clients through listservs and flyers. Respondents who completed the survey received a US $30 gift card. Prior to launch, we designed a protocol to identify and respond to bot attacks and reviewed responses for markers of fraudulent activity. If markers were identified or there was a spike in responses, a senior member of our research team reviewed patterns among all submitted surveys for each FRC to look for signs of bot attacks. We calculated epidemiologic measures of diagnostic test accuracy, such as sensitivity, specificity, positive predictive value, and negative predictive value, which describe a test&#x2019;s ability to distinguish &#x201C;disease&#x201D; (in this case, fraudulent records) from normal cases, to better understand the utility of recommended strategies to identify bot attacks.</p></sec><sec sec-type="results"><title>Results</title><p>We received 646 valid survey records and 905 fraudulent records resulting from bot attacks. The primary indicator of a bot attack was a sudden spike in responses to the survey. Differences in demographics and outcomes, including wait times for pediatric subspecialty care and use of health care services, between the valid and fraudulent data indicated that failure to remove fraudulent records would have substantially altered the survey results. Most recommended methods in the literature for identifying fraudulent responses had low sensitivity to detect bot attacks, and only 2 were better than chance alone at correctly identifying bot attacks. Combinations of fraud markers and blocks of repeated responses were particularly useful to identify bot attacks.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>Fraudulent data entry using bots is increasing in survey research. Sharing flexible protocols to identify and mitigate them in a way that is responsive to their ever-changing nature is vital to ensuring that researchers elevate the voices of real people within survey research to inform policy and programmatic discussions.</p></sec></abstract><kwd-group><kwd>health care surveys</kwd><kwd>bots</kwd><kwd>surveys</kwd><kwd>questionnaires</kwd><kwd>survey methodology</kwd><kwd>web-based data collection</kwd><kwd>specificity</kwd><kwd>sensitivity</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>Survey research has the potential to elevate the experiences and opinions of individuals who may be difficult to reach. While ideal survey methods include the use of individualized, single-use survey links shared with a defined and verified set of respondents, in reality, there are important populations who are not neatly vetted and included in registries and, in some cases, whose safety depends on being invisible and unregistered [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Since creating single-use survey links matched to known populations is challenging in these situations, many surveys use generic survey links, which carry a greater risk of use by fraudulent responders for profit or manipulative purposes.</p><p>The rising number of fraudulent responses threatens to drown out those voices. Our nonexhaustive literature review of 13 studies exploring fraudulent responses found a range of 13% to 97% of survey responses were identified as fraudulent, with a pooled proportion of 61%. Eight of 13 studies reported that more than half of responses were fraudulent (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref10">10</xref>]. The onslaught of fraudulent responses has a number of consequences; key among these is the distortion of study findings, leading to inaccurate results if fraudulent records are not excluded [<xref ref-type="bibr" rid="ref4">4</xref>]. For the purpose of this paper, we define a &#x201C;fraudulent record&#x201D; as any record in which false information is presumed to be purposely provided. Bot attacks comprise a subset of these fraudulent records and are distinguished by the use of software to generate a large number of responses [<xref ref-type="bibr" rid="ref11">11</xref>].</p><p>Rapid identification and mitigation of bot attacks are vital; however, there is limited guidance for survey researchers in the face of rapidly evolving and ever-more-sophisticated fraudulent attacks. We did not find any prior studies that used standard epidemiological methods to assess the effectiveness of various bot detection approaches. Standard recommendations include identifying duplicate responses or off-topic responses, inconsistencies between location stamp and location reported, similar or identical response or pattern of responses is provided across surveys, identifying inconsistencies between different survey items (eg, age and year of birth), embedding &#x201C;honeypot&#x201D; items that are visible to bots but not humans, or short survey completion time [<xref ref-type="bibr" rid="ref10">10</xref>]. Most of these recommendations are based on assumptions of manual fraud, where individuals submit multiple surveys by hand (formerly known as &#x201C;ballot box stuffing&#x201D;), or relatively unintelligent technology that uses simple strategies and does not learn how to game the survey (eg, overcome screening items).</p><p>Based on our experience and anecdotal evidence from others, researchers have already observed failures of many of these methods, which are less applicable to modern bot capabilities. Moreover, among survey researchers seeking to reach populations with limited digital literacy, some suggested methods pose the additional danger of excluding eligible but less digitally savvy participants [<xref ref-type="bibr" rid="ref6">6</xref>]. For example, we abandoned use of CAPTCHA screening (identification of images, such as motorcycles, in a matrix) on our survey platform after technologically savvy staff were consistently unable to pass the screening themselves.</p><p>Little is known about the ability of current fraud detection methods to successfully identify fraudulent records (sensitivity, in clinical epidemiological terms) or their ability to correctly identify valid records (ie, not to label a valid record as a fraudulent one, hereafter referred to as &#x201C;specificity&#x201D;). Using data from a California-wide survey and a diagnostic approach that treats bot attacks as a disease to be detected by various possible tests, we describe the ability of available tools to correctly identify &#x201C;diseased cases&#x201D; (positive predictive value) and the risk that they will miss such cases (negative predictive value). Insights from this analysis may provide guidance on how best to identify and shut down large-scale bot attacks on surveys.</p></sec><sec id="s2" sec-type="methods"><title>Methods</title><p>We conducted a secondary analysis of data from a survey of caregivers of children with chronic conditions in California. Results of the study have been previously reported [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref15">15</xref>].</p><sec id="s2-1"><title>Population and Setting</title><p>We recruited caregivers of children with chronic conditions who were clients of 17 family resource centers (FRCs) across California. FRCs are nonprofit community agencies serving families of children with developmental delays and chronic medical conditions through education and advocacy. For example, they frequently provide classes and peer support to help caregivers of children with chronic conditions to secure social and educational services, and to connect with other families of children with similar conditions. Due to restricted budgets, they often have fewer organizational resources, including paid staff, and rely on volunteer caregivers to advise and provide services to families. They frequently communicate with clients through email listservs. Eligible participants were English- or Spanish-speaking adult caregivers residing in California whose child had a visit with a new pediatric subspecialist in the previous 12 months.</p></sec><sec id="s2-2"><title>Distribution of the Survey</title><p>The study team initially proposed sharing a list of unique, single-use survey links with FRCs to be distributed to their clients, but FRCs were unable to use these unique links with their listserv software and were restricted from sharing their listservs with outside organizations, like the study team, which could have sent unique links directly to FRC clients. As a result, we generated a unique generic link for each FRC. FRCs distributed an invitation to the survey from the study team and the survey link through their email listservs of clients and printed flyers with a QR code link to the survey to post in their offices for access by families coming in for services. Data was collected between August and October 2023.</p></sec><sec id="s2-3"><title>Fraud Detection Protocol</title><p>Based on the REAL (Reflect, Expect, Analyze, Label) framework for online survey fraud [<xref ref-type="bibr" rid="ref16">16</xref>], we considered in advance how to prevent or identify fraudulent responses at each stage of the process, including pre&#x2013;data collection (eg, recruitment through community-based partners), data collection (eg, integration of fraud detection questions in the survey design), and post&#x2013;data collection (eg, a systematic review process). We also borrowed ideas from Anomaly Detection Theory, grounded in engineering sciences, which posits that detection of anomalies requires identifying data that do not follow established patterns [<xref ref-type="bibr" rid="ref17">17</xref>].</p><p>We anticipated that the distribution of the survey through an anonymous link to large groups of people could make the survey vulnerable to fraudulent responses, and in particular, to bot attacks in which an individual writes code to automatically submit multiple survey responses that appear to originate from eligible respondents. Based on sparse literature and consultation with colleagues, the team utilized 10 different fraud detection tools when the survey was fielded, including proprietary tools that can be turned on within the Qualtrics survey platform, such as invisible ReCAPTCHA technology, and other flags, like the Relevant ID Duplicate, Fraud scores, and Ballot Box Stuffing flags. In addition, we embedded questions that required internally consistent logic (eg, birth year and age), monitored open-ended questions for nonsensical or repeating responses, reviewed longitude and latitude to ensure respondent location in California, considered records based on completion times (including shorter-than-expected response time and duplicate submission times), and verified IP addresses of respondents through an external server of suspicious addresses (see <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>). The survey also included a series of 13 screening questions designed to remove ineligible participants before reaching the body of the survey, which we believed would discourage fraudulent responses.</p><p>The number of responses was monitored multiple times each day, and spikes in responses were immediately investigated. We completed a logbook entry for responses that triggered concern. Most indicators of fraudulent activity have caveats; for example, IP addresses triggering warnings from the fraudulent database could result from a previous infection of a legitimate device by malware that does not affect the survey (see <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> for additional examples). As a result, no single flag was treated as a sole determinant of fraud. Classification of all records with flags was conducted through consensus between a senior researcher and a research associate. Fraudulent responses were often confirmed through patterns of responses, such as blocks of questions with the same responses (see <xref ref-type="fig" rid="figure1">Figure 1</xref> for example). In the minority of cases in which the coding team was uncertain about a determination, the research associate followed up with the participant, requesting additional information that they could check against the survey to confirm that the response was valid.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Examples of fraudulent response patterns (repetition of blocks across multiple records) in a cross-sectional survey of caregivers of children with new pediatric subspecialty referrals (August-October 2023).</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v28i1e85161_fig01.png"/></fig></sec><sec id="s2-4"><title>Data Analysis</title><p>We cleaned datasets from each FRC and reviewed records for final disposition (eg, valid, ineligible based on various criteria, fraudulent). We examined differences in demographic characteristics and health care utilization (outcomes in the primary study) between valid and fraudulent records in order to ascertain how our results might differ if fraudulent data were not identified and removed.</p><p>To assess the validity of different fraud detection methods, we calculated the sensitivity, specificity, and positive and negative predictive value for each method (see <xref ref-type="fig" rid="figure2">Figure 2</xref>). Sensitivity is the ability of a test or method to correctly identify individuals with a disease, in this case, fraudulent records, while specificity is the ability of a test to correctly identify individuals without a disease, here, valid records [<xref ref-type="bibr" rid="ref18">18</xref>]. Epidemiologists do not define universal thresholds of acceptable sensitivity and specificity, taking into consideration the danger of having false-positive or negative findings based on the severity and prevalence of the condition, for example. However, one rule of thumb is that the sum of the two values should be between 150% and 200%, meaning that it is at least more likely than chance alone to result in a correct identification [<xref ref-type="bibr" rid="ref19">19</xref>]. We accordingly calculated the sum of sensitivity and specificity.</p><fig position="float" id="figure2"><label>Figure 2.</label><caption><p>Epidemiological measures of diagnostic test accuracy.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v28i1e85161_fig02.png"/></fig><p>Positive predictive value is the proportion of individuals testing positive (given a fraudulent study disposition) who actually have the disease (are actually fraudulent). Negative predictive value is the proportion of individuals testing negative (given a valid disposition) who truly do not have the disease (are, in fact, valid records). Both positive and negative predictive values depend not only on the sensitivity and specificity of the tests, but also on the prevalence of the condition in the population (in this case, the prevalence of bot attacks in the pool of survey records).</p></sec><sec id="s2-5"><title>Ethical Considerations</title><p>The protocol for the original study was approved by the University of California, San Francisco (UCSF) Institutional Review Board (23&#x2010;39316). The board approved implied consent for the study, whereby participants clicking on the survey link first viewed an information page approved by the board and then opted into participation by clicking on a link to take part in the survey. Data was deidentified prior to analysis. Respondents received a US $30 electronic gift card for completing the survey, once the validity of the survey was confirmed by the study team (see <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>).</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><p>Of 2220 records, 646 (29%) were valid and complete (hereafter &#x201C;valid&#x201D;), 905 (41%) were classified as fraudulent by the protocol, 263 (12%) were valid but ineligible based on the eligibility screeners, 308 (14%) were incomplete surveys, and 98 (4%) were duplicate records. Duplicate records were distinguished from fraudulent records as those that made no effort to disguise their identity or device as identical; these appeared to result from respondents being unsure if their previous response had been received. Subsequent analyses were limited to valid and fraudulent records (n=1551).</p><p>There were a number of statistically significant differences in the reported demographics of valid versus fraudulent records (<xref ref-type="table" rid="table1">Table 1</xref>). When valid responses were compared with the overall responses (for valid + fraudulent records), valid responses were more likely to report having younger children (317/646, 49.1% aged 0&#x2010;5 y vs 536/1472, 36.4% for all responses); being Asian American and Pacific Islander (106/639, 16.4% vs 125/1368, 8.1%) or Latino/a (352/639, 55.1% vs 382/1368, 27.9%); living in a big city (218/635, 34.3% vs 697/1343, 51.9%); and having commercial health insurance (226/640, 35.3% vs 344/1353, 25.4%).</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Demographic characteristics of all, valid, and fraudulent respondents to a cross-sectional survey for caregivers of children with new pediatric subspecialty referrals in California (August-October 2023).</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Characteristic</td><td align="left" valign="bottom">All (valid + fraudulent records), n/N (%)</td><td align="left" valign="bottom">Valid records, n/N (%)</td><td align="left" valign="bottom">Fraudulent records, n/N (%)</td><td align="left" valign="bottom" colspan="2">Difference between valid and fraudulent records</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom">Pearson chi-square (<italic>df</italic>)</td><td align="left" valign="bottom"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="4">Age (y)</td><td align="left" valign="top">104.12 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>0-5</td><td align="left" valign="top">536/1472 (36.4)</td><td align="left" valign="top">317/646 (49.1)</td><td align="left" valign="top">219/825 (26.5)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>6-10</td><td align="left" valign="top">527/1472 (35.8)</td><td align="left" valign="top">148/646 (22.9)</td><td align="left" valign="top">379/825 (45.9)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>11-20</td><td align="left" valign="top">408/1472 (27.7)</td><td align="left" valign="top">181/646 (28.0)</td><td align="left" valign="top">227/825 (27.7)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="4">Child&#x2019;s gender<sup><xref ref-type="table-fn" rid="table1fn1">a</xref></sup></td><td align="left" valign="top">1.41 (1)</td><td align="left" valign="top">.24</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Boy</td><td align="left" valign="top">829/1364 (60.8)</td><td align="left" valign="top">398/640 (62.2)</td><td align="left" valign="top">431/724 (59.5)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Girl</td><td align="left" valign="top">530/1364 (38.9)</td><td align="left" valign="top">237/640 (37)</td><td align="left" valign="top">293/724 (40.5)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Another gender</td><td align="left" valign="top">5/1364 (0.4)</td><td align="left" valign="top">5/640 (0.8)</td><td align="left" valign="top">0/724 (0.0)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="6">Race/ethnicity<sup><xref ref-type="table-fn" rid="table1fn2">b</xref></sup></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Black/African American</td><td align="left" valign="top">190/1368 (13.9)</td><td align="left" valign="top">38/639 (5.9)</td><td align="left" valign="top">152/728 (20.9)</td><td align="left" valign="top">63.4 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>American Indian/Alaskan Native</td><td align="left" valign="top">34/1368 (2.5)</td><td align="left" valign="top">31/639 (4.8)</td><td align="left" valign="top">3/728 (0.3)</td><td align="left" valign="top">27.7 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Asian/Pacific Islander</td><td align="left" valign="top">125/1368 (8.1)</td><td align="left" valign="top">106/639 (16.4)</td><td align="left" valign="top">19/728 (2.1)</td><td align="left" valign="top">104.2 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Hispanic/Latino</td><td align="left" valign="top">382/1368 (27.9)</td><td align="left" valign="top">352/639 (55.1)</td><td align="left" valign="top">30/728 (4.1)</td><td align="left" valign="top">439 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>White</td><td align="left" valign="top">799/1368 (58.5)</td><td align="left" valign="top">258/639 (40.4)</td><td align="left" valign="top">541/728 (74.3)</td><td align="left" valign="top">161.4 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Other</td><td align="left" valign="top">20/1368 (1.5)</td><td align="left" valign="top">18/639 (2.8)</td><td align="left" valign="top">2/728 (0.3)</td><td align="left" valign="top">&#x2014;<sup><xref ref-type="table-fn" rid="table1fn3">c</xref></sup></td><td align="left" valign="top">&#x2014;</td></tr><tr><td align="left" valign="top" colspan="4">Urbanicity</td><td align="left" valign="top">149 (2)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Big city</td><td align="left" valign="top">697/1343 (51.9)</td><td align="left" valign="top">218/635 (34.3)</td><td align="left" valign="top">479/708 (67.7)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Small city or suburb</td><td align="left" valign="top">557/1343 (41.5)</td><td align="left" valign="top">358/635 (56.4)</td><td align="left" valign="top">199/708 (28.1)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Rural area</td><td align="left" valign="top">89/1343 (6.6)</td><td align="left" valign="top">59/635 (9.3)</td><td align="left" valign="top">30/708 (4.2)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="6">Insurance<sup><xref ref-type="table-fn" rid="table1fn2">b</xref></sup></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Medicaid</td><td align="left" valign="top">986/1353 (72.9)</td><td align="left" valign="top">488/640 (76.3)</td><td align="left" valign="top">494/713 (69.9)</td><td align="left" valign="top">7 (1)</td><td align="left" valign="top">.008</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Commercial</td><td align="left" valign="top">344/1353 (25.4)</td><td align="left" valign="top">226/640 (35.3)</td><td align="left" valign="top">118/713 (16.6)</td><td align="left" valign="top">62.6 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr></tbody></table><table-wrap-foot><fn id="table1fn1"><p><sup>a</sup>Reflects caregiver-reported gender. Because of small cell sizes, &#x201C;another gender&#x201D; was excluded from testing of differences across groups.</p></fn><fn id="table1fn2"><p><sup>b</sup>May report more than 1 response, so responses may sum to more than 100%. For multiple response comparisons, used Pearson <italic>&#x03A7;</italic><sup>2</sup> analysis to compare responses for each option across valid versus fraudulent responses.</p></fn><fn id="table1fn3"><p><sup>c</sup>Not applicable.</p></fn></table-wrap-foot></table-wrap><p>With respect to health care utilization, which was the key outcome in the primary study, there were significant differences between valid versus fraudulent responses. Valid responses generally reported lower utilization than overall responses, such as having at least one hospitalization in the last year (172/639, 26.9% for valid vs 578/1352, 42.8% of overall responses; <xref ref-type="table" rid="table2">Table 2</xref>), at least one emergency department visit (324/638, 50.8% vs 799/1351, 59.1%), and at least 1 hour per week in medical visits (469/636, 73.7% vs 1139/1347, 84.6%). On the other hand, valid respondents were more likely to report 3-month waits or more for pediatric subspecialty care compared to the overall sample (156/638, 24.5% vs 271/1382, 19.6%).</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Outcomes for health care utilization of all, valid, and fraudulent respondents to a cross-sectional survey for caregivers of children with new pediatric subspecialty referrals in California (August-October 2023).</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Outcome</td><td align="left" valign="bottom">All (valid + fraudulent) records, n/N (%)</td><td align="left" valign="bottom">Valid records, n/N (%)</td><td align="left" valign="bottom">Fraudulent records, n/N (%)</td><td align="left" valign="bottom" colspan="2">Difference between valid and fraudulent records</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom">Pearson chi-square (<italic>df</italic>)</td><td align="left" valign="bottom"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="4">Hospital visits in last year</td><td align="left" valign="top">124.1 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>0 times</td><td align="left" valign="top">774/1352 (57.3)</td><td align="left" valign="top">467/639 (73.1)</td><td align="left" valign="top">307/713 (43.1)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>1 or more times</td><td align="left" valign="top">578/1352 (42.8)</td><td align="left" valign="top">172/639 (26.9)</td><td align="left" valign="top">406/713 (56.9)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="4">ED<sup><xref ref-type="table-fn" rid="table2fn1">a</xref></sup> visits in last year</td><td align="left" valign="top">34.9 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>0 times</td><td align="left" valign="top">552/1351 (40.9)</td><td align="left" valign="top">314/638 (49.2)</td><td align="left" valign="top">238/713 (33.4)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>1 or more times</td><td align="left" valign="top">799/1351 (59.1)</td><td align="left" valign="top">324/638 (50.8)</td><td align="left" valign="top">475/713 (66.6)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="4">Wait time for pediatric subspecialist</td><td align="left" valign="top">17.6 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>2 mo or less</td><td align="left" valign="top">1111/1382 (80.4)</td><td align="left" valign="top">482/638 (75.6)</td><td align="left" valign="top">629/744 (84.5)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>3 mo or more</td><td align="left" valign="top">271/1382 (19.6)</td><td align="left" valign="top">156/638 (24.5)</td><td align="left" valign="top">115/744 (15.5)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top" colspan="4">Hours per week in medical visits</td><td align="left" valign="top">108 (1)</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003C;1 h/wk</td><td align="left" valign="top">208/1347 (15.4)</td><td align="left" valign="top">167/636 (26.3)</td><td align="left" valign="top">41/711 (5.8)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>1 or more hours/week</td><td align="left" valign="top">1139/1347 (84.6)</td><td align="left" valign="top">469/636 (73.7)</td><td align="left" valign="top">670/711 (94.2)</td><td align="left" valign="top"/><td align="left" valign="top"/></tr></tbody></table><table-wrap-foot><fn id="table2fn1"><p><sup>a</sup>ED: emergency department.</p></fn></table-wrap-foot></table-wrap><p>We examined the validity of different fraud detection methods using epidemiological measures of diagnostic tests (<xref ref-type="table" rid="table3">Table 3</xref>). Most methods had low sensitivity (poor ability to detect fraudulent records), including comparisons of paired items (eg, age and y of birth), short completion time, duplicate IP addresses, and review of open-ended responses for duplicate or nonsensical answers. Even ReCAPTCHA technology, which relies on information that bots can see but humans cannot, only detected about half of fraudulent responses. The most sensitive indicators appeared to be a fraudulent IP address detection service, where a low threshold setting (ie, one that identified not only IP addresses with confirmed fraudulent activity but also those with suspicious activity) yielded a sensitivity of 88%, and the proprietary Fraud ID feature on the survey software, with a sensitivity of 67%.</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Sensitivity, specificity, positive and negative predictive value of fraud detection methods at identifying fraudulent responses in a cross-sectional survey for caregivers of children with new pediatric subspecialty referrals (August-October 2023) (n=1551).</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Method of detecting fraudulent responses</td><td align="left" valign="bottom">True positive, n</td><td align="left" valign="bottom">False positive, n</td><td align="left" valign="bottom">False negative, n</td><td align="left" valign="bottom">True negative, n</td><td align="left" valign="bottom">Sensitivity (%)</td><td align="left" valign="bottom">Specificity (%)</td><td align="left" valign="bottom">Sensitivity + specificity (%)</td><td align="left" valign="bottom">Positive predictive value (%)</td><td align="left" valign="bottom">Negative predictive value (%)</td></tr></thead><tbody><tr><td align="left" valign="top">Nonsensical open-ended responses</td><td align="left" valign="top">0</td><td align="left" valign="top">0</td><td align="left" valign="top">905</td><td align="left" valign="top">646</td><td align="left" valign="top">0</td><td align="left" valign="top">100</td><td align="left" valign="top">100</td><td align="left" valign="top">&#x2014;<sup><xref ref-type="table-fn" rid="table3fn1">a</xref></sup></td><td align="left" valign="top">41.7</td></tr><tr><td align="left" valign="top">Repeated open-ended responses</td><td align="left" valign="top">0</td><td align="left" valign="top">0</td><td align="left" valign="top">905</td><td align="left" valign="top">646</td><td align="left" valign="top">0</td><td align="left" valign="top">100</td><td align="left" valign="top">100</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">41.7</td></tr><tr><td align="left" valign="top">Qualtrics Ballot Box stuffing</td><td align="left" valign="top">0</td><td align="left" valign="top">0</td><td align="left" valign="top">905</td><td align="left" valign="top">646</td><td align="left" valign="top">0</td><td align="left" valign="top">100</td><td align="left" valign="top">100</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">41.7</td></tr><tr><td align="left" valign="top">Duplicate IP addresses</td><td align="left" valign="top">82</td><td align="left" valign="top">45</td><td align="left" valign="top">823</td><td align="left" valign="top">601</td><td align="left" valign="top">9.1</td><td align="left" valign="top">93</td><td align="left" valign="top">102.1</td><td align="left" valign="top">64.6</td><td align="left" valign="top">42.2</td></tr><tr><td align="left" valign="top">Short completion time (&#x003C;4 min)</td><td align="left" valign="top">135</td><td align="left" valign="top">1</td><td align="left" valign="top">770</td><td align="left" valign="top">645</td><td align="left" valign="top">14.9</td><td align="left" valign="top">99.8</td><td align="left" valign="top">114.7</td><td align="left" valign="top">99.3</td><td align="left" valign="top">45.6</td></tr><tr><td align="left" valign="top">Discrepancy between paired items (age and year of birth)</td><td align="left" valign="top">183</td><td align="left" valign="top">15</td><td align="left" valign="top">642</td><td align="left" valign="top">631</td><td align="left" valign="top">22.2</td><td align="left" valign="top">97.7</td><td align="left" valign="top">119.9</td><td align="left" valign="top">92.4</td><td align="left" valign="top">49.6</td></tr><tr><td align="left" valign="top">Fraudulent IP address database (lower threshold)<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup></td><td align="left" valign="top">758</td><td align="left" valign="top">337</td><td align="left" valign="top">106</td><td align="left" valign="top">309</td><td align="left" valign="top">87.7</td><td align="left" valign="top">47.8</td><td align="left" valign="top">135.5</td><td align="left" valign="top">69.2</td><td align="left" valign="top">74.5</td></tr><tr><td align="left" valign="top">Longitude/latitude</td><td align="left" valign="top">389</td><td align="left" valign="top">9</td><td align="left" valign="top">637</td><td align="left" valign="top">516</td><td align="left" valign="top">37.9</td><td align="left" valign="top">98.3</td><td align="left" valign="top">136.2</td><td align="left" valign="top">97.7</td><td align="left" valign="top">44.8</td></tr><tr><td align="left" valign="top">Fraudulent IP address database (higher threshold)<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup></td><td align="left" valign="top">422</td><td align="left" valign="top">8</td><td align="left" valign="top">442</td><td align="left" valign="top">638</td><td align="left" valign="top">48.8</td><td align="left" valign="top">98.8</td><td align="left" valign="top">147.6</td><td align="left" valign="top">98.1</td><td align="left" valign="top">59.1</td></tr><tr><td align="left" valign="top">Qualtrics ReCAPTCHA functionality</td><td align="left" valign="top">466</td><td align="left" valign="top">0</td><td align="left" valign="top">439</td><td align="left" valign="top">646</td><td align="left" valign="top">51.5</td><td align="left" valign="top">100</td><td align="left" valign="top">151.5</td><td align="left" valign="top">100</td><td align="left" valign="top">59.5</td></tr><tr><td align="left" valign="top">Qualtrics Fraud ID</td><td align="left" valign="top">609</td><td align="left" valign="top">27</td><td align="left" valign="top">296</td><td align="left" valign="top">619</td><td align="left" valign="top">67.3</td><td align="left" valign="top">95.8</td><td align="left" valign="top">163.1</td><td align="left" valign="top">95.8</td><td align="left" valign="top">67.7</td></tr><tr><td align="left" valign="top">Combination: Qualtrics ReCAPTCHA or Fraud ID</td><td align="left" valign="top">675</td><td align="left" valign="top">37</td><td align="left" valign="top">230</td><td align="left" valign="top">609</td><td align="left" valign="top">74.6</td><td align="left" valign="top">94.3</td><td align="left" valign="top">168.9</td><td align="left" valign="top">94.8</td><td align="left" valign="top">72.6</td></tr></tbody></table><table-wrap-foot><fn id="table3fn1"><p><sup>a</sup>Not available.</p></fn><fn id="table3fn2"><p><sup>b</sup>The service used to look up fraudulent IP addresses had two thresholds: a lower threshold indicating that the IP address had been used in suspicious activity, and a higher threshold, indicating that it had been used in fraudulent activity.</p></fn></table-wrap-foot></table-wrap><p>Sensitivity is typically balanced against specificity, the ability of a diagnostic test to accurately predict which people do not have a disease (in this case, to identify valid records). Almost all individual indicators yielded relatively high specificity, suggesting that they correctly identified the valid records in the sample, even as most of these methods could not identify the fraudulent ones well (<xref ref-type="table" rid="table3">Table 3</xref>).</p><p>When we examined the sum of sensitivity and specificity and used the proportional threshold of 150% or greater as an indicator of the ability of a test to identify cases, only fraud detection tools embedded in the survey software (ReCAPTCHA and Fraud ID within the Qualtrics system) met the criteria of being more useful than chance alone in identifying fraudulent records. Notably, each of these methods used alone would have missed between 33% and 48% of fraudulent records, based on their modest sensitivity. Using the two measures together (ie, flagging if either was positive) would have resulted in a sensitivity of 75% and a specificity of 94%, with a combined total of 168.9%.</p><p>When we calculated predictive values for each method, we found that several had positive predictive values in excess of 90%, meaning that if they were activated (a positive test), it was a fairly good indicator that a record was indeed fraudulent, but negative predictive power less than 60%, indicating that the failure of a record to activate one of these indicators was not assurance that the record was valid. For example, activation of the survey software&#x2019;s ReCAPTCHA indicators was strongly suggestive of a fraudulent record (positive predictive values of 100%), but its negative predictive value (59.5%) suggests that it would miss around 40% of fraudulent records.</p></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><p>Similar to past studies [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref10">10</xref>], in this large statewide survey, we observed a high rate of fraudulent records compared to valid ones (1.4 fraudulent records for every valid record) that would have significantly altered the characterization of the sample and study findings if undetected. Strategies recommended for survey fraud detection performed poorly as judged by epidemiological standards for detecting the &#x201C;disease&#x201D; of fraud. These included a number of tried-and-true methods, such as the use of paired items (age and year of birth) at opposite ends of the survey [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref8">8</xref>-<xref ref-type="bibr" rid="ref10">10</xref>], which detected only 1 in 5 fraudulent records, or looking for duplicate IP addresses, which detected only 1 in 10 fraudulent records. Only 2 methods, both proprietary survey software technologies, performed better than chance alone in identifying fraudulent surveys, but even the combination of the 2 methods failed to detect about a quarter of fraudulent survey responses.</p><p>Fraudulent responses, if undetected, would have significantly altered the characterization of the sample as well as the study findings. For example, the responses from bot attacks indicated greater health care utilization and shorter wait times for pediatric subspecialty care compared to valid responses. Thus, failure to remove bot responses would have resulted in the incorrect conclusion that Californian families have greater access to pediatric subspecialty care than they actually do.</p><p>None of the 10 recommended fraud detection methods used in this study was effective as a stand-alone method capable of identifying fraudulent records, even those that other studies have reported to be highly effective. Moreover, our study represents a small number of bot attacks, and comparison to past literature suggests that bot attacks can have highly individualized signatures. For example, MacKinnon et al [<xref ref-type="bibr" rid="ref20">20</xref>] were able to identify that over 31% of responses were fraudulent based on nonsensical open-ended questions, duplicate IP addresses, geocoding, and short completion time. In our study, these combined methods would have detected only 43% of fraudulent cases. Rather than use our results to suggest discarding or prioritizing particular measures, we echo the call of Dewitt et al [<xref ref-type="bibr" rid="ref6">6</xref>] for the use of dynamic protocols, which use as many methods as possible to flag suspicious cases and human reviewers to manually review flagged records. The method is analogous to installing motion sensors, alarms at entry points, and safe meddling safeguards at a bank, but activating human guards to investigate if any of these detection mechanisms are activated.</p><p>Combating fraudulent survey responses poses a fundamental tension between data quality, inclusion, and resources. Manual review of responses and follow-up with suspect cases was highly labor-intensive in this study. Yet fraud detection protocols that require prior authentication of participants (eg, through requiring participants to upload documents [<xref ref-type="bibr" rid="ref3">3</xref>]) or seek to expeditiously classify cases based on a priori algorithms risk exclusion of legitimate respondents. Populations with lower income, racial and ethnic minorities, and older adults are already underrepresented in internet research [<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref23">23</xref>]. Adding additional barriers may pose not only an inconvenience but also a threat to the inclusion of historically marginalized voices [<xref ref-type="bibr" rid="ref3">3</xref>]. In the short term, combating bot attacks will require greater allocation of resources. Developing strategies to improve bot detection, reviewing results in real time, and following up with participants when the authenticity of responses is in question are time-consuming and raise the cost of research. Ultimately, the field must invest in developing more cost-effective strategies for identifying and removing fraudulent records.</p><p>Advances in artificial intelligence (AI) will likely increase the frequency and sophistication of bot attacks, including mimicking human response biases, in an effort to evade detection. On the other hand, they may also contribute to the development of important bot detection tools that can co-evolve with bot attacks. Machine learning models may be well equipped over time to identify newly emerging patterns of fraudulent activity and to adapt as fraudulent tactics evolve. However, the emerging tool of AI does not make current research on patterns of fraudulent survey activity irrelevant, because development of technology for detecting bot attacks will initially rely on existing datasets, such as the one used for this study, using human classification of responses as valid or fraudulent. Anomaly Detection Theory advances a number of approaches to identify problem cases, such as a search for outliers [<xref ref-type="bibr" rid="ref17">17</xref>]; however, when there are more fraudulent than valid responses to a survey, as was the case with our survey and has been with others, fraudulent cases may cease to be outliers. The need for accurate data for learning models may, therefore, lend even greater urgency to accurate identification within the datasets that are fed to the AI models.</p><p>Limitations of this study include a lack of a true gold standard for identifying fraudulent responses, which meant that we relied on manual review and consensus determination of case dispositions as reflective of the correct disposition of fraudulent or valid. On the other hand, we employed a high-effort strategy to distinguish valid from fraudulent responses, reviewing each response manually and following up with respondents when the validity of the response was in doubt, and we observed patterns unlikely to have occurred through true responses. Because fraud detection technologies such as Qualtrics ReCAPTCHA are proprietary, we cannot offer insight into the mechanisms of their ability to detect some fraudulent attacks or their failure to detect others. We collected data in August&#x2013;October 2023, and bot-facilitating technology and methods may have evolved since that time. This study was conducted through web-based surveys using anonymous links shared through community-based organizations serving families of children with chronic conditions. Further study is needed to generalize findings to understand patterns of response as bot attacks become more sophisticated.</p><p>The incidence of fraudulent responses to web-based surveys using bots has been rapidly increasing in survey research and threatens the integrity of important research. Our study identified two methods that performed better than chance alone in identifying fraudulent cases; the combination of these two tools, both proprietary tools of the survey software, identified 75% of fraudulent cases. Literature suggests that bot attacks may have diverse phenotypes, and our findings support calls for &#x201C;dynamic protocols&#x201D; that capture as many potential markers of fraud as possible for review and follow-up. To avoid the need to expend intensive human resources in future research, it is imperative that researchers begin to employ more sophisticated technology, investing in AI-enabled bot detection approaches that can evolve along with fraudulent attacks. As such, interdisciplinary collaborations with computer scientists and tech entrepreneurs who currently solve security problems could be fruitful to elevate the voices of real people within policy and programmatic discussions.</p></sec></body><back><ack><p>We acknowledge the caregiver participants who generously shared their time and expertise to take part in this study. We extend special thanks to the 17 family resource centers across California that took part in the study, as well as Dr Yvette Baptiste, Robert Rochin, Jacqui Knudsen, and Ana Seda from the Family Resource Center Network of California for helping to coordinate data collection. Alicia DiGiammarino provided invaluable support with copyediting.</p></ack><notes><sec><title>Funding</title><p>Funding for data collection for the original study was provided by the Lucile Packard Foundation for Children&#x2019;s Health (grant 2023-09171). This secondary analysis was conducted without additional funding. Foundation staff contributed to the design of the original study but were not involved in design of this secondary analysis. Foundation staff AG and HH contributed to the manuscript revision and are listed as coauthors.</p></sec><sec><title>Data Availability</title><p>Requests for deidentified study data will be reviewed by the authors and made available where appropriate.</p></sec></notes><fn-group><fn fn-type="con"><p>This analysis was conceptualized and carried out by RW-G. The fraud detection protocol described herein was designed by TK and RW-G. AG, HH, TK, and RW-G contributed to instrument design and interpretation of analyses. RW-G and MD guided data collection and cleaning, with assistance from EL and AN. RW-G drafted the manuscript. All authors reviewed and provided feedback on the manuscript.</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">AI</term><def><p>artificial intelligence</p></def></def-item><def-item><term id="abb2">FRC</term><def><p>family resource center</p></def></def-item><def-item><term id="abb3">REAL</term><def><p>Reflect, Expect, Analyze, Label</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zuniga</surname><given-names>C</given-names> </name><name name-style="western"><surname>Ragosta</surname><given-names>S</given-names> </name><name name-style="western"><surname>Thompson</surname><given-names>TA</given-names> </name></person-group><article-title>Recruiting foreign-born individuals who have sought an abortion in the United States: lessons from a feasibility study</article-title><source>Front Glob Womens Health</source><year>2023</year><volume>4</volume><fpage>1114820</fpage><pub-id pub-id-type="doi">10.3389/fgwh.2023.1114820</pub-id><pub-id pub-id-type="medline">37143605</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Myers</surname><given-names>KJ</given-names> </name><name name-style="western"><surname>Jaffe</surname><given-names>T</given-names> </name><name name-style="western"><surname>Kanda</surname><given-names>DA</given-names> </name><etal/></person-group><article-title>Reaching the &#x201C;hard-to-reach&#x201D; sexual and gender diverse communities for population-based research in cancer prevention and control: methods for online survey data collection and management</article-title><source>Front Oncol</source><year>2022</year><volume>12</volume><fpage>841951</fpage><pub-id pub-id-type="doi">10.3389/fonc.2022.841951</pub-id><pub-id pub-id-type="medline">35756657</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Campbell</surname><given-names>CK</given-names> </name><name name-style="western"><surname>Ndukwe</surname><given-names>S</given-names> </name><name name-style="western"><surname>Dub&#x00E9;</surname><given-names>K</given-names> </name><name name-style="western"><surname>Sauceda</surname><given-names>JA</given-names> </name><name name-style="western"><surname>Saberi</surname><given-names>P</given-names> </name></person-group><article-title>Overcoming challenges of online research: measures to ensure enrollment of eligible participants</article-title><source>JAIDS, J Acquired Immune Defic Syndr</source><year>2022</year><volume>91</volume><issue>2</issue><fpage>232</fpage><lpage>236</lpage><pub-id pub-id-type="doi">10.1097/QAI.0000000000003035</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pratt-Chapman</surname><given-names>M</given-names> </name><name name-style="western"><surname>Moses</surname><given-names>J</given-names> </name><name name-style="western"><surname>Arem</surname><given-names>H</given-names> </name></person-group><article-title>Strategies for the identification and prevention of survey fraud: data analysis of a web-based survey</article-title><source>JMIR Cancer</source><year>2021</year><month>07</month><day>16</day><volume>7</volume><issue>3</issue><fpage>e30730</fpage><pub-id pub-id-type="doi">10.2196/30730</pub-id><pub-id pub-id-type="medline">34269685</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Choi</surname><given-names>SH</given-names> </name><name name-style="western"><surname>Mitchell</surname><given-names>J</given-names> </name><name name-style="western"><surname>Lipkus</surname><given-names>I</given-names> </name></person-group><article-title>Lessons learned from an online study with dual-smoker couples</article-title><source>Am J Health Behav</source><year>2017</year><month>01</month><volume>41</volume><issue>1</issue><fpage>61</fpage><lpage>66</lpage><pub-id pub-id-type="doi">10.5993/ajhb.41.1.6</pub-id><pub-id pub-id-type="medline">27935791</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dewitt</surname><given-names>J</given-names> </name><name name-style="western"><surname>Capistrant</surname><given-names>B</given-names> </name><name name-style="western"><surname>Kohli</surname><given-names>N</given-names> </name><etal/></person-group><article-title>Addressing participant validity in a small internet health survey (the restore study): protocol and recommendations for survey response validation</article-title><source>JMIR Res Protoc</source><year>2018</year><month>04</month><day>24</day><volume>7</volume><issue>4</issue><fpage>e96</fpage><pub-id pub-id-type="doi">10.2196/resprot.7655</pub-id><pub-id pub-id-type="medline">29691203</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Griffin</surname><given-names>M</given-names> </name><name name-style="western"><surname>Martino</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>LoSchiavo</surname><given-names>C</given-names> </name><etal/></person-group><article-title>Ensuring survey research data integrity in the era of internet bots</article-title><source>Qual Quant</source><year>2022</year><volume>56</volume><issue>4</issue><fpage>2841</fpage><lpage>2852</lpage><pub-id pub-id-type="doi">10.1007/s11135-021-01252-1</pub-id><pub-id pub-id-type="medline">34629553</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mournet</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Kleiman</surname><given-names>EM</given-names> </name></person-group><article-title>Internet-based mental health survey research: navigating internet bots on Reddit</article-title><source>Cyberpsychol Behav Soc Netw</source><year>2023</year><month>02</month><volume>26</volume><issue>2</issue><fpage>73</fpage><lpage>79</lpage><pub-id pub-id-type="doi">10.1089/cyber.2022.0173</pub-id><pub-id pub-id-type="medline">36724303</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pekarsky</surname><given-names>C</given-names> </name><name name-style="western"><surname>Skiffington</surname><given-names>J</given-names> </name><name name-style="western"><surname>Leijser</surname><given-names>LM</given-names> </name><name name-style="western"><surname>Slater</surname><given-names>D</given-names> </name><name name-style="western"><surname>Metcalfe</surname><given-names>A</given-names> </name></person-group><article-title>Social media recruitment strategies to recruit pregnant women into a longitudinal observational cohort study: usability study</article-title><source>J Med Internet Res</source><year>2022</year><month>12</month><day>12</day><volume>24</volume><issue>12</issue><fpage>e40298</fpage><pub-id pub-id-type="doi">10.2196/40298</pub-id><pub-id pub-id-type="medline">36508244</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pozzar</surname><given-names>R</given-names> </name><name name-style="western"><surname>Hammer</surname><given-names>MJ</given-names> </name><name name-style="western"><surname>Underhill-Blazey</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Threats of bots and other bad actors to data quality following research participant recruitment through social media: cross-sectional questionnaire</article-title><source>J Med Internet Res</source><year>2020</year><month>10</month><day>7</day><volume>22</volume><issue>10</issue><fpage>e23021</fpage><pub-id pub-id-type="doi">10.2196/23021</pub-id><pub-id pub-id-type="medline">33026360</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Storozuk</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ashley</surname><given-names>M</given-names> </name><name name-style="western"><surname>Delage</surname><given-names>V</given-names> </name><name name-style="western"><surname>Maloney</surname><given-names>EA</given-names> </name></person-group><article-title>Got bots? Practical recommendations to protect online survey data from bot attacks</article-title><source>Quant Meth Psych</source><year>2020</year><volume>16</volume><issue>5</issue><fpage>472</fpage><lpage>481</lpage><pub-id pub-id-type="doi">10.20982/tqmp.16.5.p472</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="report"><person-group person-group-type="author"><name name-style="western"><surname>Klima</surname><given-names>T</given-names> </name><name name-style="western"><surname>Dedhia</surname><given-names>M</given-names> </name><name name-style="western"><surname>Willard-Grace</surname><given-names>R</given-names> </name></person-group><article-title>A survey of caregivers of children and youth with special health care needs: family perspectives on peer support</article-title><year>2024</year><access-date>2026-02-17</access-date><publisher-name>Lucile Packard Foundation for Children&#x2019;s Health</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://lpfch.org/wp-content/uploads/2024/06/20240520-ES-ATC-P2P-JT7.pdf">https://lpfch.org/wp-content/uploads/2024/06/20240520-ES-ATC-P2P-JT7.pdf</ext-link></comment></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="report"><article-title>Access to care in California: the CYSHCN family experience</article-title><year>2024</year><access-date>2026-02-17</access-date><publisher-name>Lucile Packard Foundation for Children&#x2019;s Health</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://childrens-coalition.org/wp-content/uploads/2024/02/Access-to-Care-in-California-The-CYSHCN-Family-Experience.pdf">https://childrens-coalition.org/wp-content/uploads/2024/02/Access-to-Care-in-California-The-CYSHCN-Family-Experience.pdf</ext-link></comment></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="report"><article-title>Travel time and family preferences for in-person care</article-title><year>2024</year><access-date>2026-02-17</access-date><publisher-name>Lucile Packard Foundation for Children&#x2019;s Health</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://lpfch.org/wp-content/uploads/2024/06/FINAL-Travel-Time_1pgr_JT5.pdf">https://lpfch.org/wp-content/uploads/2024/06/FINAL-Travel-Time_1pgr_JT5.pdf</ext-link></comment></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="web"><article-title>Delays to access in pediatric subspecialty care in California</article-title><source>University of California San Francisco, Center for Excellence in Primary Care</source><access-date>2026-02-19</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://cepc.ucsf.edu/delays-access-pediatric-subspecialty-care-california">https://cepc.ucsf.edu/delays-access-pediatric-subspecialty-care-california</ext-link></comment></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lawlor</surname><given-names>J</given-names> </name><name name-style="western"><surname>Thomas</surname><given-names>C</given-names> </name><name name-style="western"><surname>Guhin</surname><given-names>AT</given-names> </name><etal/></person-group><article-title>Suspicious and fraudulent online survey participation: introducing the REAL framework</article-title><source>Methodol Innov</source><year>2021</year><month>09</month><volume>14</volume><issue>3</issue><fpage>20597991211050467</fpage><pub-id pub-id-type="doi">10.1177/20597991211050467</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dogo</surname><given-names>EM</given-names> </name><name name-style="western"><surname>Nwulu</surname><given-names>NI</given-names> </name><name name-style="western"><surname>Twala</surname><given-names>B</given-names> </name><name name-style="western"><surname>Aigbavboa</surname><given-names>C</given-names> </name></person-group><article-title>A survey of machine learning methods applied to anomaly detection on drinking-water quality data</article-title><source>Urban Water J</source><year>2019</year><month>03</month><day>16</day><volume>16</volume><issue>3</issue><fpage>235</fpage><lpage>248</lpage><pub-id pub-id-type="doi">10.1080/1573062X.2019.1637002</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Trevethan</surname><given-names>R</given-names> </name></person-group><article-title>Sensitivity, specificity, and predictive values: foundations, pliabilities, and pitfalls in research and practice</article-title><source>Front Public Health</source><year>2017</year><volume>5</volume><fpage>307</fpage><pub-id pub-id-type="doi">10.3389/fpubh.2017.00307</pub-id><pub-id pub-id-type="medline">29209603</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Power</surname><given-names>M</given-names> </name><name name-style="western"><surname>Fell</surname><given-names>G</given-names> </name><name name-style="western"><surname>Wright</surname><given-names>M</given-names> </name></person-group><article-title>Principles for high-quality, high-value testing</article-title><source>Evid Based Med</source><year>2013</year><month>02</month><volume>18</volume><issue>1</issue><fpage>5</fpage><lpage>10</lpage><pub-id pub-id-type="doi">10.1136/eb-2012-100645</pub-id><pub-id pub-id-type="medline">22740357</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>MacKinnon</surname><given-names>KR</given-names> </name><name name-style="western"><surname>Khan</surname><given-names>N</given-names> </name><name name-style="western"><surname>Newman</surname><given-names>KM</given-names> </name><etal/></person-group><article-title>Introducing novel methods to identify fraudulent responses (sampling with Sisyphus): web-based LGBTQ2S+ mixed-methods study</article-title><source>J Med Internet Res</source><year>2025</year><month>03</month><day>17</day><volume>27</volume><fpage>e63252</fpage><pub-id pub-id-type="doi">10.2196/63252</pub-id><pub-id pub-id-type="medline">40096683</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jang</surname><given-names>M</given-names> </name><name name-style="western"><surname>Vorderstrasse</surname><given-names>A</given-names> </name></person-group><article-title>Socioeconomic status and racial or ethnic differences in participation: web-based survey</article-title><source>JMIR Res Protoc</source><year>2019</year><month>04</month><day>10</day><volume>8</volume><issue>4</issue><fpage>e11865</fpage><pub-id pub-id-type="doi">10.2196/11865</pub-id><pub-id pub-id-type="medline">30969173</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kelfve</surname><given-names>S</given-names> </name><name name-style="western"><surname>Kivi</surname><given-names>M</given-names> </name><name name-style="western"><surname>Johansson</surname><given-names>B</given-names> </name><name name-style="western"><surname>Lindwall</surname><given-names>M</given-names> </name></person-group><article-title>Going web or staying paper? The use of web-surveys among older people</article-title><source>BMC Med Res Methodol</source><year>2020</year><month>10</month><day>8</day><volume>20</volume><issue>1</issue><fpage>252</fpage><pub-id pub-id-type="doi">10.1186/s12874-020-01138-0</pub-id><pub-id pub-id-type="medline">33032531</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Corey</surname><given-names>KL</given-names> </name><name name-style="western"><surname>McCurry</surname><given-names>MK</given-names> </name><name name-style="western"><surname>Sethares</surname><given-names>KA</given-names> </name><name name-style="western"><surname>Bourbonniere</surname><given-names>M</given-names> </name><name name-style="western"><surname>Hirschman</surname><given-names>KB</given-names> </name><name name-style="western"><surname>Meghani</surname><given-names>SH</given-names> </name></person-group><article-title>Utilizing internet-based recruitment and data collection to access different age groups of former family caregivers</article-title><source>Appl Nurs Res</source><year>2018</year><month>12</month><volume>44</volume><fpage>82</fpage><lpage>87</lpage><pub-id pub-id-type="doi">10.1016/j.apnr.2018.10.005</pub-id><pub-id pub-id-type="medline">30389065</pub-id></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Literature review, including methods tested, and proportion of fraudulent responses.</p><media xlink:href="jmir_v28i1e85161_app1.docx" xlink:title="DOCX File, 35 KB"/></supplementary-material><supplementary-material id="app2"><label>Multimedia Appendix 2</label><p>Approaches to detecting fraudulent responses.</p><media xlink:href="jmir_v28i1e85161_app2.docx" xlink:title="DOCX File, 22 KB"/></supplementary-material><supplementary-material id="app3"><label>Multimedia Appendix 3</label><p>Sample language in institutional review board/consent form.</p><media xlink:href="jmir_v28i1e85161_app3.docx" xlink:title="DOCX File, 19 KB"/></supplementary-material></app-group></back></article>