{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:04:38Z","timestamp":1726034678429},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030232498"},{"type":"electronic","value":"9783030232504"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23250-4_18","type":"book-chapter","created":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T03:01:17Z","timestamp":1562036477000},"page":"258-274","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Forms of Plagiarism in Digital Mathematical Libraries"],"prefix":"10.1007","author":[{"given":"Moritz","family":"Schubotz","sequence":"first","affiliation":[]},{"given":"Olaf","family":"Teschke","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Stange","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Meuschke","sequence":"additional","affiliation":[]},{"given":"Bela","family":"Gipp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,3]]},"reference":[{"key":"18_CR1","unstructured":"Aizawa, A., et al.: NTCIR-11 Math-2 task overview. In: Proceedings of NTCIR Conference on Evaluation of Information Access Technologies (2014)"},{"issue":"2","key":"18_CR2","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSMCC.2011.2134847","volume":"42","author":"Salha M. Alzahrani","year":"2012","unstructured":"Alzahrani, S.M., Salim, N., Abraham, A.: Understanding plagiarism linguistic patterns, textual features, and detection methods. IEEE Trans. Syst. Man Cybern. C Appl. Rev. 42(2) (2012). https:\/\/doi.org\/10.1109\/TSMCC.2011.2134847","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-31374-5_29","volume-title":"Intelligent Computer Mathematics","author":"JB Baker","year":"2012","unstructured":"Baker, J.B., Sexton, A.P., Sorge, V.: MaxTract: converting PDF to LaTeX, MathML and text. In: Jeuring, J., et al. (eds.) CICM 2012. LNCS, vol. 7362, pp. 422\u2013426. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31374-5_29"},{"issue":"3","key":"18_CR4","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1108\/OIR-12-2014-0315","volume":"39","author":"TAE Eisa","year":"2015","unstructured":"Eisa, T.A.E., Salim, N., Alzahrani, S.M.: Existing plagiarism detection techniques: a systematic mapping of the scholarly literature. Online Inf. Rev. 39(3), 383\u2013400 (2015)","journal-title":"Online Inf. Rev."},{"key":"18_CR5","unstructured":"Fishman, T.: \u2018We know it when we see it\u2019? is not good enough: toward a standard definition of plagiarism that transcends theft, fraud, and copyright. In: Proceedings of Asia Pacific Conference on Educational Integrity (2009)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Foltynek, T., Meuschke, N., Gipp, B.: Academic plagiarism detection: a systematic literature review. Journal article in review (2019)","DOI":"10.1145\/3345317"},{"key":"18_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-06394-8","volume-title":"Citation-Based Plagiarism Detection - Detecting Disguised and Cross-Language Plagiarism Using Citation Pattern Analysis","author":"B Gipp","year":"2014","unstructured":"Gipp, B.: Citation-Based Plagiarism Detection - Detecting Disguised and Cross-Language Plagiarism Using Citation Pattern Analysis. Springer, Wiesbaden (2014). https:\/\/doi.org\/10.1007\/978-3-658-06394-8"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Gipp, B., Meuschke, N.: Citation pattern matching algorithms for citation-based plagiarism detection: greedy citation tiling, citation chunking and longest common citation sequence. In: Proceedings of ACM Symposium on Document Engineering (DocEng) (2011). https:\/\/doi.org\/10.1145\/2034691.2034741","DOI":"10.1145\/2034691.2034741"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Gipp, B., Meuschke, N., Beel, J.: Comparative evaluation of text- and citation-based plagiarism detection approaches using GuttenPlag. In: Proceedings of ACM\/IEEE-CS Joint Conference on Digital Libraries (JCDL) (2011). https:\/\/doi.org\/10.1145\/1998076.1998124","DOI":"10.1145\/1998076.1998124"},{"issue":"8","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1002\/asi.23228","volume":"65","author":"Bela Gipp","year":"2014","unstructured":"Gipp, B., Meuschke, N., Breitinger, C.: Citation-based plagiarism detection: practicability on a large-scale scientific corpus. JASIST 65(2) (2014). https:\/\/doi.org\/10.1002\/asi.23228","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Gipp, B., et al.: Web-based demonstration of semantic similarity detection using citation pattern visualization for a cross language plagiarism case. In: Proceedings of International Conference on Enterprise Information Systems (2014). https:\/\/doi.org\/10.5220\/0004985406770683","DOI":"10.5220\/0004985406770683"},{"issue":"4","key":"18_CR12","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s11786-016-0274-0","volume":"10","author":"Ferruccio Guidi","year":"2016","unstructured":"Guidi, F., Sacerdoti Coen, C.: A survey on retrieval of mathematical knowledge. Math. Comput. Sci. 10(4) (2016). https:\/\/doi.org\/10.1007\/s11786-016-0274-0","journal-title":"Mathematics in Computer Science"},{"issue":"1","key":"18_CR13","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s11192-017-2242-0","volume":"113","author":"Judit Bar-Ilan","year":"2017","unstructured":"Halevi, G., Bar-Ilan, J.: Post retraction citations in context. In: Proceedings of BIRNDL Workshop at JCDL (2016). https:\/\/doi.org\/10.1007\/s11192-017-2242-0","journal-title":"Scientometrics"},{"issue":"5919","key":"18_CR14","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1126\/science.1167408","volume":"323","author":"T. C. Long","year":"2009","unstructured":"Long, T.C., et al.: Responding to possible plagiarism. Science 323(5919) (2009). https:\/\/doi.org\/10.1126\/science.1167408","journal-title":"Science"},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"McCabe, D.L.: Cheating among college and university students: a North American perspective. Int. J. Educ. Integrity 1(1) (2005). https:\/\/doi.org\/10.21913\/IJEI.v1i1.14","DOI":"10.21913\/IJEI.v1i1.14"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Meuschke, N., Gipp, B.: Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space. In: Proceedings of IEEE\/ACM Joint Conference on Digital Libraries (JCDL) (2014). https:\/\/doi.org\/10.1109\/JCDL.2014.6970168","DOI":"10.1109\/JCDL.2014.6970168"},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"Meuschke, N., Gipp, B.: State of the art in detecting academic plagiarism. Int. J. Educ. Integrity 9(1) (2013). https:\/\/doi.org\/10.21913\/IJEI.v9i1.847","DOI":"10.21913\/IJEI.v9i1.847"},{"key":"18_CR18","doi-asserted-by":"publisher","unstructured":"Meuschke, N., et al.: An adaptive image-based plagiarism detection approach. In: Proceedings of ACM\/IEEE-CS Joint Conference on Digital Libraries (JCDL) (2018). https:\/\/doi.org\/10.1145\/3197026.3197042","DOI":"10.1145\/3197026.3197042"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Meuschke, N., et al.: Analyzing mathematical content to detect academic plagiarism. In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM), pp. 2211\u20132214 (2017). https:\/\/doi.org\/10.1145\/3132847.3133144","DOI":"10.1145\/3132847.3133144"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Meuschke, N., et al.: Analyzing semantic concept patterns to detect academic plagiarism. In: Proceedings of WOSP Workshop held at ACM\/IEEE-CS Joint Conference on Digital Libraries (JCDL) (2017). https:\/\/doi.org\/10.1145\/3127526.3127535","DOI":"10.1145\/3127526.3127535"},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Meuschke, N., et al.: HyPlag: a hybrid approach to academic plagiarism detection. In: Proceedings of International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR) (2018). https:\/\/doi.org\/10.1145\/3209978.3210177","DOI":"10.1145\/3209978.3210177"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Meuschke, N., et al.: Improving academic plagiarism detection for STEM documents by analyzing mathematical content and citations. In: Proceedings of ACM\/IEEE-CS Joint Conference on Digital Libraries (JCDL) (2019). https:\/\/doi.org\/10.1109\/JCDL.2019.00026","DOI":"10.1109\/JCDL.2019.00026"},{"issue":"10","key":"18_CR23","first-page":"2511","volume":"67","author":"S Lurdes Pertile de","year":"2016","unstructured":"de Lurdes Pertile, S., Moreira, V.P., Rosso, P.: Comparing and combining Content- and Citation-based approaches for plagiarism detection. JASIST 67(10), 2511\u20132526 (2016)","journal-title":"JASIST"},{"key":"18_CR24","doi-asserted-by":"publisher","unstructured":"Stein, B., zu Eissen, S.M., Potthast, M.: Strategies for retrieving plagiarized documents. In: Proceedings of International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR) (2007). https:\/\/doi.org\/10.1145\/1277741.1277928","DOI":"10.1145\/1277741.1277928"},{"key":"18_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1007\/978-3-540-27817-7_97","volume-title":"Computers Helping People with Special Needs","author":"M Suzuki","year":"2004","unstructured":"Suzuki, M., Kanahori, T., Ohtake, N., Yamaguchi, K.: An integrated OCR software for mathematical documents and its output with accessibility. In: Miesenberger, K., Klaus, J., Zagler, W.L., Burger, D. (eds.) ICCHP 2004. LNCS, vol. 3118, pp. 648\u2013655. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27817-7_97"},{"issue":"6","key":"18_CR26","first-page":"542","volume":"81","author":"JP Swazey","year":"1993","unstructured":"Swazey, J.P., Anderson, M.S., Louis, K.S.: Ethical problems in academic research. Am. Sci. 81(6), 542\u2013553 (1993)","journal-title":"Am. Sci."},{"issue":"5","key":"18_CR27","doi-asserted-by":"publisher","first-page":"9","DOI":"10.25103\/jestr.095.02","volume":"9","author":"K. Vani","year":"2016","unstructured":"Vani, K., Gupta, D.: Study on extrinsic text plagiarism detection techniques and tools. J. Eng. Sci. Technol. Rev. 9(4) (2016)","journal-title":"Journal of Engineering Science and Technology Review"},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1087\/20140105","volume":"27","author":"Elizabeth Wager","year":"2014","unstructured":"Wager, E.: Defining and responding to plagiarism. Learn. Publ. 27(1) (2014). https:\/\/doi.org\/10.1087\/20140105","journal-title":"Learned Publishing"},{"key":"18_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39961-9","volume-title":"False Feathers: A Perspective on Academic Plagiarism","author":"D Weber-Wulff","year":"2014","unstructured":"Weber-Wulff, D.: False Feathers: A Perspective on Academic Plagiarism. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-39961-9"},{"key":"18_CR30","unstructured":"Weber-Wulff, D.: Portal Plagiat - Tests of Plagiarism Software. Online Source (2019). http:\/\/plagiat.htw-berlin.de\/software-en\/ . Accessed 12 Mar 2019"},{"key":"18_CR31","unstructured":"Wolska, M.: A language engineering architecture for processing informal mathematical discourse. In: Proceedings of DML WS Towards Digital Mathematics Library (2008)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23250-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T20:26:45Z","timestamp":1575232005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-23250-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030232498","9783030232504"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23250-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computer Mathematics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mkm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cicm-conference.org\/2019\/cicm.php?event=&menu=general","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}