2015
DOI: 10.29115/sp-2015-0028
|View full text |Cite
|
Sign up to set email alerts
|

Computers, Tablets, and Smart Phones: The Truth About Web-based Surveys

Abstract: The exponential increase of smart phone, tablet, and laptop use places the topic of web-based surveys at the center of survey methodology discussions. As individuals now have a variety of options for taking online surveys, researchers must understand who completes their surveys through which device as it may impact completion rates and data quality. The analysis of two national online surveys (n=487 and n=1,046) revealed that individuals utilizing smart phones to complete the studies were significantly younger… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…The type of device used to complete data collection may be associated with quality. For example, participants spend more time completing surveys on smartphones (Revilla, Toninelli, and Ochoa 2016), and younger panelists utilize mobile devices for participation (Merle et al 2015). Although limited panel/MTurk comparisons have investigated devices used for survey completion, more should be known about differences.…”
Section: Data Comparisonmentioning
confidence: 99%
“…The type of device used to complete data collection may be associated with quality. For example, participants spend more time completing surveys on smartphones (Revilla, Toninelli, and Ochoa 2016), and younger panelists utilize mobile devices for participation (Merle et al 2015). Although limited panel/MTurk comparisons have investigated devices used for survey completion, more should be known about differences.…”
Section: Data Comparisonmentioning
confidence: 99%
“…It encompasses a vast set of practices, ranging from guidelines to applications designed to protect data. With the development of digital systems including the Internet of Things (IoT) [1], Internet of Vehicles (IoV) [2], Internet of Battlefield Things (IoBT) [3], and Cyber-Physical Systems (CPS) [4], as well as technologies such as smartphones, tablets [5], autonomous vehicles, digital twins [6], cryptocurrencies [7], and smart homes [8], the scope of cyber security is expanding accordingly. The more these technologies integrate into daily life, they also widen the potential landscape for cyber threats.…”
Section: Introductionmentioning
confidence: 99%