{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T20:10:31Z","timestamp":1761163831020,"version":"build-2065373602"},"reference-count":44,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":396,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Mispractice by researchers\u2014plagiarism in particular\u2014is, according to the research evidence enculturated within research groups. We interview a small sample of senior academics with a clean record regarding plagiarism, to investigate what has influenced their practice, and how they in turn influence the research groups and research students that they oversee. Our aim is to understand what strategies enculturate good practice. We point to surprisingly complex interactions between technology and culture.<\/jats:p>","DOI":"10.1002\/pra2.2018.14505501006","type":"journal-article","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T16:52:19Z","timestamp":1549039939000},"page":"39-48","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Leader of the pack: On plagiarism prevention through research group enculturation"],"prefix":"10.1002","volume":"55","author":[{"given":"George","family":"Buchanan","sequence":"first","affiliation":[{"name":"University of Melbourne Australia"}]},{"given":"Dana","family":"McKay","sequence":"additional","affiliation":[{"name":"University of Melbourne Australia"}]}],"member":"311","published-online":{"date-parts":[[2019,2]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"Akers R. L.(2011).Social learning and social structure: A general theory of crime and deviance: Transaction Publishers."},{"key":"e_1_2_7_3_1","unstructured":"Allen J.(2005).Interdisciplinary Differences in Attitudes Towards Deposit in Institutional Repositories. (Masters Thesis) Manchester Metropolitan University Manchester. Retrieved fromhttp:\/\/eprints.rclis.org\/6957\/"},{"issue":"2","key":"e_1_2_7_4_1","first-page":"187","article-title":"Guilty in Whose Eyes?","volume":"22","author":"Ashworth P.","year":"1997","journal-title":"University Students\u2019 Perceptions of Cheating and Plagiarism in Academic Work and Assessment. Studies In Higher Education"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"Bardzell J.(2009).Interaction criticism and aesthetics. Paper presented SIGCHI 09 Boston MA.","DOI":"10.1145\/1518701.1519063"},{"volume-title":"Distinction: A social critique of the judgement of taste","year":"1984","author":"Bourdieu P.","key":"e_1_2_7_6_1"},{"issue":"5","key":"e_1_2_7_7_1","first-page":"1","article-title":"A Preliminary Study to Identify the Extent of Self\u2010Plagiarism in Australian Academic Research. Plagiary","volume":"2","author":"Bretag T.","year":"2007","journal-title":"Cross\u2010Disciplinary Studies in Plagiarism, Fabrication, and Falsification"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10805-009-9092-1"},{"key":"e_1_2_7_9_1","doi-asserted-by":"crossref","unstructured":"Brin S. Davis J. Garcia\u2010Molina H.(1995).Copy detection mechanisms for digital documents. Paper presented at SIGMOD 95 San Jose CA.","DOI":"10.1145\/223784.223855"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/08989621.2014.848071"},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"Buchanan G. &McKay D.(2017).The Lowest Form of Flattery: Characterising Text Re\u2010use and Plagiarism Patterns in a Digital Library Corpus. Paper presented at JCDL \u201817 Toronto Canada.","DOI":"10.1109\/JCDL.2017.7991570"},{"issue":"3","key":"e_1_2_7_12_1","first-page":"24","article-title":"A safe place","volume":"37","author":"Buranen L.","year":"2009","journal-title":"The role of librarians and writing centers in addressing citation practices and plagiarism. Knowledge Quest"},{"key":"e_1_2_7_13_1","unstructured":"Carroll J.(2004).Institutional Issues in Deterring Detecting and Dealing with Student Plagiarism. JISC Report."},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.93.1.55"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053293"},{"key":"e_1_2_7_16_1","unstructured":"Crace J.(2003).Peer Trouble. The Guardian. Retrieved fromhttps:\/\/www.theguardian.com\/education\/2003\/feb\/11\/highereducation.research"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02458393"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/07294360701310805"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/2579352"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"Ercegovac Z.(2005).What Students Say They KNOW FEEL and DO About Cyber\u2010Plagiarism and Academic Dishonesty? A Case Study. Paper presented at the 68thASIST Annual Meeting Charlotte NC.","DOI":"10.1002\/meet.1450420142"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/15391523.2006.10782477"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138403.1138407"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10805-012-9155-6"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1087\/09531519850146229"},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"Harper R. &Mentis H.(2013).The mocking gaze: the social organization of kinect use. Paper presented at thCSCW 13 San Antonio TX.","DOI":"10.1145\/2441776.2441797"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327019eb1503_2"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10805-012-9165-4"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/10282580.2010.517981"},{"key":"e_1_2_7_29_1","unstructured":"Ketchell M.(2012).Vice\u2010chancellor resigns amid claims of plagiarism. Sydney Morning Herald. Retrieved fromhttp:\/\/www.smh.com.au\/articles\/2002\/07\/11\/1026185088581.html"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306594"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220411011023607"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.5455\/aim.2012.20.208-213"},{"issue":"1","key":"e_1_2_7_33_1","doi-asserted-by":"crossref","DOI":"10.21913\/IJEI.v9i1.847","article-title":"State\u2010of\u2010the\u2010art in detecting academic plagiarism","volume":"9","author":"Meuschke N.","year":"2013","journal-title":"International Journal for Educational Integrity"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220970903567830"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/179606.179731"},{"key":"e_1_2_7_36_1","doi-asserted-by":"crossref","unstructured":"Sorokina D. Gehrke J. Warner S. &Ginsparg P.(2006).Plagiarism Detection in arXiv. Paper presented at ICDM'06 Hong Kong.","DOI":"10.1109\/ICDM.2006.126"},{"key":"e_1_2_7_37_1","doi-asserted-by":"crossref","unstructured":"Stokes P.(2015).Feeding the beast: why plagiarism rips off readers too. Retrieved fromhttps:\/\/theconversation.com\/feeding-the-beast-why-plagiarism-rips-off-readers-too-37702","DOI":"10.64628\/AA.xjmeaxrww"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2013.019"},{"key":"e_1_2_7_39_1","doi-asserted-by":"crossref","unstructured":"Tenopir C. King D. W. Edwards S. &Wu L.(2009).Electronic journals and changes in scholarly article seeking and reading patterns. Aslib Proceedings 61(1) 5\u201332.","DOI":"10.1108\/00012530910932267"},{"volume-title":"Individualism & collectivism","year":"1995","author":"Triandis H. C.","key":"e_1_2_7_40_1"},{"key":"e_1_2_7_41_1","unstructured":"University IT Systems: Managing Liability for Transmitting Caching Hosting and Linking to Copyright Material(2007). Retrieved fromhttps:\/\/www.universitiesaustralia.edu.au\/ArticleDocuments\/419\/University%20IT%20Systems%20AVCC%202007.pdf.aspx"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.304.6833.1029"},{"key":"e_1_2_7_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/03075070902912994"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/10508422.2011.653291"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2004.02.011"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2018.14505501006","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2018.14505501006","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2018.14505501006","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2018.14505501006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:41:14Z","timestamp":1761068474000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2018.14505501006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1002\/pra2.2018.14505501006"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2018.14505501006","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"type":"print","value":"2373-9231"},{"type":"electronic","value":"2373-9231"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2019-02-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}