Table 2.
Participant typology | Number of submissions | Percent of all multiple submissions (N = 627) | Number of all duplicate responders (N = 132) | Percent identical IP, % | Percent personal identifiers duplicated | ||||
---|---|---|---|---|---|---|---|---|---|
0a, % | 1a, % | 2a, % | 3a, % | 4a, % | |||||
Infrequentb | 2–5 | 36 | 86.3 | 68.4 | 20.2 | 36.8 | 25.4 | 16.7 | .9 |
Persistentb | 6–10 | 13 | 7.7 | 80.0 | 50.0 | 10.0 | 20.0 | 20.0 | 0 |
Repeaterb | 11–30 | 17 | 3.9 | 100 | 40.0 | 0 | 0 | 20.0 | 40.0 |
Hackersb | 45–67 | 34 | 2.4 | 100 | 66.7 | 0 | 0 | 33.3 | 0 |
Sum of identical detection variables (password, username, telephone, e-mail) after IP address within each fraudulent account. For example, “0” means none of the personal identifiers matched and “2” means there were two personal identifier that were the same within a multiple submission
Rows represent independent analyses for each participant typology