Pursuing
perfection

Quality Control & Fraud Prevention

We use market leading techniques to prevent fraud

Online Screening
  • Administer detailed online surveys to collect initial participant data.
  • Analyse survey responses to identify potential candidates who meet study criteria.
Phone Follow-Up
  • Conduct follow-up phone interviews with potential participants to:
    • Verify participants' commitment and availability to take part in the study.
    • Gauge their enthusiasm and willingness to participate in the research.
  • Confirm participants' ability to easily articulate their thoughts and opinions.
  • Ensure that participants' phone responses align with their online survey answers.
  • Confirm participants' eligibility and suitability for the study.
  • Confirm to participant they will be receiving an emailed invitation or that we cannot move forward with them for this study.
Pre-Screening Questionnaires:
  • We create comprehensive pre-screening questionnaires that ask participants about their demographics, behaviours, and preferences. We include questions that are difficult for fraudulent participants to answer convincingly. For example, asking about specific products or services that don't exist or require participants to provide details about their past experiences that would be hard to fabricate.
Phone Screening:
  • We conduct phone interviews as part of the screening process. This allows us to verify the identity and authenticity of participants. Fraudulent participants are less likely to answer phone calls from us prior to research and are more likely to provide inconsistent answers when questioned.
Identity Verification:
  • Identity Verification: Depending on the sensitivity and nature of your research, we consider implementing identity verification checks. This could involve requesting participants to upload a scanned ID or providing proof of address. We are however mindful of privacy and data protection regulations when implementing such measures and will only implement them when necessary.
Cross Check Data:
  • Cross Check Data: We cross-check participant data with internal and external databases or social media profiles to verify information such as email addresses, phone numbers, and social media accounts where necessary. This can help confirm the authenticity of participants.
Monitoring Participation Patterns:
  • Monitoring Participation Patterns We keep an eye on participation patterns, such as completion times and response consistency. Fraudulent participants may rush through surveys or provide inconsistent answers, which can be red flags.
Documents and Report:
  • Documents and Report We document any instances of suspected fraudulent participation and report them internally. This can help deter fraudulent behaviour and maintain the credibility of our research.