Across
- 8. Artificial Intelligence is a computing environment where the machine makes its own autonomous decisions.
- 13. A group of people paid to complete surveys.
- 15. Intentional misrepresentation of identity or data.
- 16. Large volumes of responses to a research project in a short period
- 19. Incorrectly validated participants identified as of poor quality.
- 23. A process to confirm the agreement of participants to opt in.
- 24. An attention checking survey question.
- 25. Comparing data to a known baseline.
Down
- 1. A process to identify problematic participants from their behaviour.
- 2. Software that operates as an agent for a user or a programme or stimulates human activity.
- 3. The measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and how up to date it is.
- 4. Tending to disproportionately select a positive response.
- 5. A participant who reactively does not give an adequate level of thought to the responses they provide.
- 6. Information collected about a device for the purpose of identification of individual research participants or devices.
- 7. A process to detect participants' locations.
- 9. Refers to a branch of artificial intelligence that focuses on creating systems capable of producing new and original content.
- 10. A script or program to answer survey questions automatically.
- 11. A participant who deliberately misrepresents their identity, profiling information or responses, including organisations that use bots to impersonate participants.
- 12. A list of entities that are denied access to a part of the online ecosystem.
- 14. Incorrectly validated participants identified as of good quality.
- 17. A complete survey response recorded in a participant system and not recorded as complete in the survey data.
- 18. Business to Consumer research activities.
- 20. A supplier that provides access to participants by gathering multiple panel sources and making them all accessible via a single interface.
- 21. Business to Business research activities.
- 22. A deceptive technique/ trap used to counteract fraudulent use of information systems.
