{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:25:05Z","timestamp":1768991105250,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10639-023-11718-4","type":"journal-article","created":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T10:03:04Z","timestamp":1679652184000},"page":"13287-13321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Testing of support tools to detect plagiarism in academic Japanese texts"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2074-427X","authenticated-orcid":false,"given":"Tolga","family":"\u00d6z\u015fen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6426-9178","authenticated-orcid":false,"given":"\u0130rem","family":"Saka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0300-9073","authenticated-orcid":false,"given":"\u00d6zg\u00fcr","family":"\u00c7elik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2136-4391","authenticated-orcid":false,"given":"Salim","family":"Raz\u0131","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0324-4118","authenticated-orcid":false,"given":"Senem \u00c7ente","family":"Akkan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6316-3750","authenticated-orcid":false,"given":"Dita Henek","family":"Dlabolova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,24]]},"reference":[{"key":"11718_CR1","unstructured":"Abdelhamid, M., Azouaou, F., & Batata, S. (2022). A survey of plagiarism detection systems: Case of use with English, French and Arabic Languages. arXiv preprint arXiv:2201.03423."},{"issue":"10","key":"11718_CR2","first-page":"1","volume":"2","author":"RKA Ahmed","year":"2015","unstructured":"Ahmed, R. K. A. (2015). Overview of different plagiarism detection tools. International Journal of Futuristic Trends in Engineering and Technology, 2(10), 1\u20133.","journal-title":"International Journal of Futuristic Trends in Engineering and Technology"},{"key":"11718_CR3","unstructured":"Ali, A. M. E. T., Abdulla, H. M. D., & Snasel, V. (2011, May 13). Overview and comparison of plagiarism detection tools [Poster presentation]. Annual International Workshop on DAtabases, TExts, Specifications and Objects (Dateso), 161\u2013172, Pisek, Czech Republic. https:\/\/ceur-ws.org\/Vol-706\/poster22.pdf"},{"key":"11718_CR4","doi-asserted-by":"publisher","unstructured":"Alotaibi, N., & Joy, M. (2021). English-Arabic cross-language plagiarism detection. Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021) (pp. 44\u201352). https:\/\/doi.org\/10.26615\/978-954-452-072-4_006","DOI":"10.26615\/978-954-452-072-4_006"},{"key":"11718_CR5","unstructured":"Birki\u0107, T., Celjak, D., Cundekovi\u0107, M., & Rako, S. (2016). Analysis of software for plagiarism detection in science and education. University of Zagreb. Retrieved January, 2022, from https:\/\/www.srce.unizg.hr\/files\/srce\/docs\/CEU\/analysis_of_software_for_plagiarism_detection_in_science_and_education.pdf"},{"key":"11718_CR6","volume-title":"Technical review of plagiarism detection software report","author":"J Bull","year":"2001","unstructured":"Bull, J., Collins, C., Coughlin, E., Sharp, D., & Square, P. (2001). Technical review of plagiarism detection software report. University of Luton."},{"key":"11718_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-287-098-8_32","volume-title":"Handbook of Academic Integrity","author":"S Chen","year":"2016","unstructured":"Chen, S., & Macfarlane, B. (2016). Academic integrity in China. In T. Bretag (Ed.), Handbook of Academic Integrity (pp. 99\u2013105). Springer Reference."},{"key":"11718_CR8","doi-asserted-by":"publisher","unstructured":"Chowdhury, H. A., & Bhattacharyya, D. K. (2018). Plagiarism: Taxonomy, tools and detection techniques. arXiv:1801.06323. https:\/\/doi.org\/10.48550\/arXiv.1801.06323","DOI":"10.48550\/arXiv.1801.06323"},{"issue":"2","key":"11718_CR9","first-page":"73","volume":"44","author":"I-A Condurache","year":"2022","unstructured":"Condurache, I.-A., & Bolboac\u0103, S. D. (2022). Comparison of plagiarism detection performance between some commercial and free software. Applied Medical Informatics, 44(2), 73\u201386. https:\/\/ami.info.umfcluj.ro\/index.php\/AMI\/article\/view\/904","journal-title":"Applied Medical Informatics"},{"issue":"2","key":"11718_CR10","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1080\/03075079.2014.927850","volume":"41","author":"J Ehrich","year":"2016","unstructured":"Ehrich, J., Howard, S. J., Mu, C., & Bokosmaty, S. (2016). A comparison of Chinese and Australian university students\u2019 attitudes towards plagiarism. Studies in Higher Education, 41(2), 231\u2013246.","journal-title":"Studies in Higher Education"},{"key":"11718_CR11","doi-asserted-by":"publisher","unstructured":"El Bachir Menai, M., & Bagais, M. (2011). APlag: A plagiarism checker for Arabic texts. 2011 6th International Conference on Computer Science & Education (ICCSE) (pp.1379\u20131383). IEEE. https:\/\/doi.org\/10.1109\/ICCSE.2011.6028888","DOI":"10.1109\/ICCSE.2011.6028888"},{"issue":"3","key":"11718_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3233\/HIS-200284","volume":"16","author":"M Elamine","year":"2020","unstructured":"Elamine, M., Mechti, S., & Belguith, L. H. (2020). Hybrid plagiarism detection method for French language. International Journal of Hybrid Intelligent Systems, 16(3), 163\u2013175. https:\/\/doi.org\/10.3233\/HIS-200284","journal-title":"International Journal of Hybrid Intelligent Systems"},{"key":"11718_CR13","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-030-49342-4_21","volume-title":"Intelligent systems design and applications","author":"M Elamine","year":"2021","unstructured":"Elamine, M., Bougares, F., Mechti, S., & HadrichBelguith, L. (2021). Extrinsic plagiarism detection for French language with Word embeddings. In A. Abraham, P. Siarry, K. Ma, & A. Kaklauskas (Eds.), Intelligent systems design and applications (pp. 217\u2013224). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-49342-4_21"},{"issue":"1","key":"11718_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40979-021-00082-w","volume":"17","author":"AM Elkhatat","year":"2021","unstructured":"Elkhatat, A. M., Elsaid, K., & Almeer, S. (2021). Some students plagiarism tricks, and tips for effective check. International Journal for Education Integrity, 17(1), 1\u201312. https:\/\/doi.org\/10.1007\/s40979-021-00082-w","journal-title":"International Journal for Education Integrity"},{"issue":"1","key":"11718_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41239-020-00192-4","volume":"17","author":"T Folt\u00fdnek","year":"2020","unstructured":"Folt\u00fdnek, T., Dlabolov\u00e1, D., Anohina-Naumeca, A., Raz\u0131, S., Kravjar, J., Kamzola, L., Guerrero-Dib, J., \u00c7elik, \u00d6., & Weber-Wulff, D. (2020). Testing of support tools for plagiarism detection. International Journal of Educational Technology in Higher Education, 17(1), 1\u201331. https:\/\/doi.org\/10.1186\/s41239-020-00192-4","journal-title":"International Journal of Educational Technology in Higher Education"},{"key":"11718_CR16","first-page":"73","volume":"153","author":"R Fukaya","year":"2003","unstructured":"Fukaya, R., Yamamura, T., Kud\u014d, H., Matsumoto, T., Takeuchi, Y., & Ohnishi, N. (2003). Hindo t\u014dkei to gainen jisho wo mochiita bunsh\u014d no ruijisei no teiry\u014dka [Measuring similarity between documents using term frequency and concept dictionary]. J\u014dh\u014d Shori Gakkai Kenky\u016b H\u014dkoku [IPSJ SIG Notes], 153, 73\u201379.","journal-title":"J\u014dh\u014d Shori Gakkai Kenky\u016b H\u014dkoku [IPSJ SIG Notes]"},{"issue":"2","key":"11718_CR17","first-page":"233","volume":"11","author":"RM Howard","year":"1992","unstructured":"Howard, R. M. (1992). A plagiarism pentimento. Journal of Teaching Writing, 11(2), 233\u2013245.","journal-title":"Journal of Teaching Writing"},{"key":"11718_CR18","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-319-11310-4_47","volume-title":"Intelligent Systems\u20192014","author":"AS Hussein","year":"2015","unstructured":"Hussein, A. S. (2015). A plagiarism detection system for Arabic documents. In D. Filev, J. Jab\u0142kowski, J. Kacprzyk, M. Krawczak, I. Popchev, L. Rutkowski, V. Sgurev, E. Sotirova, P. Szynkarczyk, & S. Zadrozny (Eds.), Intelligent Systems\u20192014 (pp. 541\u2013552). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-11310-4_47"},{"key":"11718_CR19","unstructured":"Jadhav Sunayana, D., & Lihitkar Shalini, R. (2021). Plagiarism detection software: A comparative evaluation. Library Philosophy and Practice (e-journal), 6206. https:\/\/digitalcommons.unl.edu\/libphilprac\/6206\/"},{"key":"11718_CR20","unstructured":"Japan Foundation. (2018). Survey report on Japanese-Language education abroad 2018. Retrieved May, 2022, from https:\/\/www.jpf.go.jp\/j\/project\/japanese\/survey\/result\/dl\/survey2018\/text.pdf"},{"key":"11718_CR21","unstructured":"Japan Statistical Yearbook. (2022). Chapter 25 Education. Retrieved September, 2022, from https:\/\/www.stat.go.jp\/english\/data\/nenkan\/71nenkan\/1431-25.html"},{"issue":"2","key":"11718_CR22","first-page":"124","volume":"14","author":"B Kahloula","year":"2016","unstructured":"Kahloula, B., & Berri, J. (2016). Plagiarism detection in arabic documents: Approaches, architecture and systems. Journal of Digital Information Management, 14(2), 124\u2013135.","journal-title":"Journal of Digital Information Management"},{"issue":"2","key":"11718_CR23","doi-asserted-by":"publisher","first-page":"135","DOI":"10.2190\/EC.42.2.a","volume":"42","author":"T Kakkonen","year":"2010","unstructured":"Kakkonen, T., & Mozgovoy, M. (2010). Hermetic and web plagiarism detection systems for student essays\u2014An evaluation of the State-of-the-Art. Journal of Educational Computing Research, 42(2), 135\u2013159. https:\/\/doi.org\/10.2190\/EC.42.2.a","journal-title":"JOurnal of Educational Computing Research"},{"issue":"1","key":"11718_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.25256\/PAAL.23.1.5","volume":"18","author":"T Kamimura","year":"2014","unstructured":"Kamimura, T. (2014). Citation behaviors observed in Japanese EFL students\u2019 argumentative writing. Journal of Pan-Pacific Association of Applied Linguistics, 18(1), 85\u2013101.","journal-title":"Journal of Pan-Pacific Association of Applied Linguistics"},{"key":"11718_CR25","doi-asserted-by":"publisher","unstructured":"Kier, C.A., & Ives, C. (2022) Recommendations for a balanced approach to supporting academic integrity: perspectives from a survey of students, faculty, and tutors. International Journal for Educational Integrity, 18(22). https:\/\/doi.org\/10.1007\/s40979-022-00116-x","DOI":"10.1007\/s40979-022-00116-x"},{"key":"11718_CR26","doi-asserted-by":"publisher","unstructured":"Krizkova, S., Tomaskova, H., & Gavalec, M. (2016). Preference comparison for plagiarism detection systems. 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp.1760\u20131767). IEEE. https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2016.7737903","DOI":"10.1109\/FUZZ-IEEE.2016.7737903"},{"key":"11718_CR27","doi-asserted-by":"publisher","unstructured":"Kulkarni, S., Govilkar, S., & Amin, D. (2021). Analysis of plagiarism detection tools and methods. Proceedings of the 4th International Conference on Advances in Science & Technology (ICAST2021). International Conference on Advances in Science & Technology, Bahir Dar, Ethiopia. https:\/\/doi.org\/10.2139\/ssrn.3869091","DOI":"10.2139\/ssrn.3869091"},{"issue":"2","key":"11718_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11120\/ital.2005.04020006","volume":"4","author":"T Lancaster","year":"2005","unstructured":"Lancaster, T., & Culwin, F. (2005). Classifications of plagiarism detection engines. Innovation in Teaching and Learning in Information and Computer Sciences, 4(2), 1\u201316. https:\/\/doi.org\/10.11120\/ital.2005.04020006","journal-title":"Innovation in Teaching and Learning in Information and Computer Sciences"},{"issue":"4","key":"11718_CR29","doi-asserted-by":"publisher","first-page":"208","DOI":"10.5455\/aim.2012.20.208-213","volume":"20","author":"I Masic","year":"2012","unstructured":"Masic, I. (2012). Plagiarism in scientific publishing. Acta Informatica Medica, 20(4), 208\u2013213. https:\/\/doi.org\/10.5455\/aim.2012.20.208-213","journal-title":"Acta Informatica Medica"},{"issue":"8","key":"11718_CR30","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.3217\/JUCS-012-08-1050","volume":"12","author":"H Maurer","year":"2006","unstructured":"Maurer, H., Kappe, F., & Zaka, B. (2006). Plagiarism\u2014A survey. Journal of Universal Computer Science, 12(8), 1050\u20131084. https:\/\/doi.org\/10.3217\/JUCS-012-08-1050","journal-title":"Journal of Universal Computer Science"},{"key":"11718_CR31","unstructured":"McGowan, U. (2005). Plagiarism detection and prevention: Are we putting the cart before the horse. In A. Brew & C. Asmar (Eds), Proceedings of Higher Education Research and Development Society of Australasia (HERDSA) conference\u00a0(pp. 287\u2013293).\u00a0HERDSA. https:\/\/www.herdsa.org.au\/publications\/conference-proceedings\/research-and-development-higher-education-higher-education-82"},{"issue":"3","key":"11718_CR32","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1108\/DLP-10-2020-0100","volume":"37","author":"SKM Mostofa","year":"2021","unstructured":"Mostofa, S. K. M., Tabassum, M., & Ahmed, S. M. Z. (2021). Researchers\u2019 awareness about plagiarism and impact of plagiarism detection tools \u2013 does awareness effect the actions towards preventing plagiarism? Digital Library Perspectives, 37(3), 257\u2013274. https:\/\/doi.org\/10.1108\/DLP-10-2020-0100","journal-title":"Digital Library Perspectives"},{"key":"11718_CR33","unstructured":"Nadhri, S., Elamine, M., & Belguith, L. H. (2021, December). Automatic evaluation of existing plagiarism detection tools [Paper presentation]. In Tunisian Algerian Conference on Applied Computing (TACC).\u00a0Tabarka, Tunisia:\u00a0TACC. https:\/\/ceur-ws.org\/Vol-3067\/paper17.pdf"},{"issue":"1","key":"11718_CR34","doi-asserted-by":"publisher","first-page":"124","DOI":"10.2478\/cait-2018-0011","volume":"18","author":"EMB Nagoudi","year":"2018","unstructured":"Nagoudi, E. M. B., Khorsi, A., Cherroun, H., & Schwab, D. (2018). A two-level plagiarism detection system for Arabic documents. Cybernetics and Information Technologies, 18(1), 124\u2013138.","journal-title":"Cybernetics and Information Technologies"},{"issue":"2","key":"11718_CR35","doi-asserted-by":"publisher","first-page":"50","DOI":"10.11648\/j.ajdmkd.20170202.12","volume":"2","author":"MN Nahas","year":"2017","unstructured":"Nahas, M. N. (2017). Survey and comparison between plagiarism detection tools. American Journal of Data Mining and Knowledge Discovery, 2(2), 50\u201353. https:\/\/doi.org\/10.11648\/j.ajdmkd.20170202.12","journal-title":"American Journal of Data Mining and Knowledge Discovery"},{"issue":"11","key":"11718_CR36","doi-asserted-by":"publisher","first-page":"16","DOI":"10.5120\/ijca2015906113","volume":"125","author":"RR Naik","year":"2015","unstructured":"Naik, R. R., Landge, M. B., & Mahender, C. N. (2015). A review on plagiarism detection tools. International Journal of Computer Applications, 125(11), 16\u201322.","journal-title":"International Journal of Computer Applications"},{"issue":"9","key":"11718_CR37","first-page":"702","volume":"J86-D-1","author":"T Odaka","year":"2003","unstructured":"Odaka, T., Murata, T., Gao, J., Suwa, I., Kuroiwa, J., & Ogura, H. (2003). n-gram wo mochiita gakusei repooto hy\u014dkashuh\u014dnoteisatsu [A proposal on student report scoring system using n-gram text analysis method]. IEICE, J86-D-1(9), 702\u2013705.","journal-title":"IEICE"},{"issue":"1","key":"11718_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40979-020-00052-8","volume":"16","author":"M Perkins","year":"2020","unstructured":"Perkins, M., Gezgin, U. B., & Roe, J. (2020). Reducing plagiarism through academic misconduct education. International Journal for Educational Integrity, 16(1), 1\u201315.","journal-title":"International Journal for Educational Integrity"},{"issue":"10","key":"11718_CR39","doi-asserted-by":"publisher","first-page":"2511","DOI":"10.1002\/asi.23593","volume":"67","author":"S de L Pertile","year":"2016","unstructured":"Pertile, S. de L., Moreira, V. P., & Rosso, P. (2016). Comparing and combining Content- and Citation-based approaches for plagiarism detection. Journal of the Association for Information Science and Technology, 67(10), 2511\u20132526. https:\/\/doi.org\/10.1002\/asi.23593","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"2","key":"11718_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2158244015590162","volume":"5","author":"S Raz\u0131","year":"2015","unstructured":"Raz\u0131, S. (2015). Development of a rubric to assess academic writing incorporating plagiarism detectors. SAGE Open, 5(2), 1\u201313. https:\/\/doi.org\/10.1177\/2158244015590162","journal-title":"SAGE Open"},{"issue":"11","key":"11718_CR41","first-page":"2072","volume":"92","author":"K Suzuki","year":"2009","unstructured":"Suzuki, K., Takahashi, I., Shirai, H., Kuroiwa, J., Odaka, T., & Ogura, H. (2009). Hy\u014dsetsu repooto hakkenn ni riy\u014d suru 1 buntan`I de no kensaku kuerisakuseishush\u014d [Web search query in detecting plagiarism reports]. IEICE, 92(11), 2072\u20132076.","journal-title":"IEICE"},{"issue":"11","key":"11718_CR42","first-page":"2989","volume":"90","author":"I Takahashi","year":"2007","unstructured":"Takahashi, I., Miyakawa, K., Odaka, T., Shirai, H., Kuroiwa, J., & Ogura, H. (2007). Web saito karano hy\u014dsetsurepooto hakken shien shisutemu [A Computer Aided Detection System for Learners` Reports Plagiarism from Web-site]. IEICE, 90(11), 2989\u20132999.","journal-title":"IEICE"},{"issue":"1","key":"11718_CR43","doi-asserted-by":"publisher","first-page":"95","DOI":"10.5539\/elt.v8n1p95","volume":"8","author":"J Teeter","year":"2014","unstructured":"Teeter, J. (2014). Deconstructing attitudes towards plagiarism of Japanese undergraduates in EFL academic writing classes. English Language Teaching, 8(1), 95\u2013109.","journal-title":"English Language Teaching"},{"key":"11718_CR44","first-page":"41","volume":"87","author":"S Ueno","year":"2006","unstructured":"Ueno, S., Takahashi, I., Kuroiwa, J., Shirai, H., Odaka, T., & Ogura, H. (2006). Fukusuu no web peeji kara hy\u014dsetsu shita repooto no hakken shien shisutemu no jiss\u014d [Implementation of a support system to find out of the report plagiarized from several web pages]. J\u014ch\u014d Shori Gakkai Kenky\u016b H\u014dkoku [IPSJ SIG Notes], 87, 41\u201346.","journal-title":"J\u014ch\u014d Shori Gakkai Kenky\u016b H\u014dkoku [IPSJ SIG Notes]"},{"key":"11718_CR45","first-page":"363","volume":"2010","author":"K Ueta","year":"2010","unstructured":"Ueta, K., & Tominaga, H. (2010). A development and application of similarity detection methods for plagiarism of online reports. Proceedings of ITHET, 2010, 363\u2013371.","journal-title":"Proceedings of ITHET"},{"issue":"4","key":"11718_CR46","doi-asserted-by":"publisher","first-page":"150","DOI":"10.25103\/jestr.094.23","volume":"9","author":"K Vani","year":"2016","unstructured":"Vani, K., & Gupta, D. (2016). Study on extrinsic text plagiarism detection techniques and tools. Journal of Engineering Science and Technology Review, 9(4), 150\u2013164. https:\/\/doi.org\/10.25103\/jestr.094.23","journal-title":"Journal of Engineering Science and Technology Review"},{"issue":"5","key":"11718_CR47","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3390\/info11050241","volume":"11","author":"T Vrbanec","year":"2021","unstructured":"Vrbanec, T., & Me\u0161trovi\u0107, A. (2021). Corpus-based paraphrase detection experiments and review. Information, 11(5), 241.","journal-title":"Information"},{"key":"11718_CR48","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-030-96957-8_34","volume-title":"Information for a better World: Shaping the Global future","author":"JP Wahle","year":"2022","unstructured":"Wahle, J. P., Ruas, T., Folt\u00fdnek, T., Meuschke, N., & Gipp, B. (2022). Identifying machine-paraphrased plagiarism. In M. Smits (Ed.), Information for a better World: Shaping the Global future (pp. 393\u2013413). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-96957-8_34"},{"key":"11718_CR49","unstructured":"Weber-Wulff, D., M\u00f6ller, C., Touras, J., & Zincke, E. (2013). Plagiarism detection software test 2013. Retrieved March, 2022, from http:\/\/plagiat.htw-berlin.de\/software\/2013\/"},{"key":"11718_CR50","unstructured":"Weber-Wulff, D. (2010). Plagiarism detection test 2010. Retrieved March, 2022, from https:\/\/plagiat.htw-berlin.de\/software-en\/2010-2\/"},{"issue":"1","key":"11718_CR51","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jslw.2008.09.004","volume":"18","author":"G Wheeler","year":"2009","unstructured":"Wheeler, G. (2009). Plagiarism in the Japanese universities: Truly a cultural matter? Journal of Second Language Writing, 18(1), 17\u201329.","journal-title":"Journal of Second Language Writing"},{"issue":"2","key":"11718_CR52","doi-asserted-by":"publisher","first-page":"44","DOI":"10.21913\/IJEI.v10i2.1006","volume":"10","author":"G Wheeler","year":"2014","unstructured":"Wheeler, G. (2014). Culture of minimal influence: A study of Japanese university students\u2019 attitudes toward plagiarism. The International Journal for Educational Integrity, 10(2), 44\u201359.","journal-title":"The International Journal for Educational Integrity"},{"key":"11718_CR53","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-981-287-098-8_7","volume-title":"Handbook of Academic Integrity","author":"G Wheeler","year":"2016","unstructured":"Wheeler, G. (2016). Perspectives from Japan. In T. Bretag (Ed.), Handbook of Academic Integrity (pp. 107\u2013112). Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-287-098-8_7"},{"key":"11718_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jbi.2021.103683","volume":"115","author":"Z Wu","year":"2021","unstructured":"Wu, Z., Liang, J., Zhang, Z., & Lei, J. (2021). Exploration of text matching methods in Chinese disease Q&A systems: A method using ensemble based on BERT and boosted tree models. Journal of Biomedical Informatics, 115, 1\u201310. https:\/\/doi.org\/10.1016\/j.jbi.2021.103683","journal-title":"Journal of Biomedical Informatics"},{"key":"11718_CR55","first-page":"117","volume":"6","author":"F Yamamoto","year":"2016","unstructured":"Yamamoto, F. (2016). Ronbun no \u2018itoteki dehanai hy\u014dsetsu\u2019 no mondai: Modaritii no kond\u014d to kaishaku no nai in`y\u014d [Unintentional plagiarism in Japanese writing: Confusion of modalities and citation without interpretation]. Global Communication, 6, 117\u2013132.","journal-title":"Global Communication"},{"key":"11718_CR56","first-page":"94","volume":"160","author":"F Yamamoto","year":"2015","unstructured":"Yamamoto, F., & Nits\u016b, N. (2015). Ronbun no in`y\u014d \u2013 k\u014dz\u014d: Jinbun & shakaikagakukei ronbun shid\u014d no tame no kisoteki kenky\u016b [Quotation and interpretation structure of literature-analysis papers: Basic research on instruction for writing papers in humanities and social science]. Nihongo Ky\u014diku [journal of Japanese Language Teaching], 160, 94\u2013109.","journal-title":"Nihongo Ky\u014diku [journal of Japanese Language Teaching]"},{"key":"11718_CR57","unstructured":"Yamamoto, F., Nits\u016b, N., Ohshima, Y., & Sat\u014d, S. (2014). In`y\u014d kara kaishaku ni itaru in`y\u014dbun no tay\u014dsei [Varieties of citations from quoting to interpreting in the \u201cliterature-analysis-type\u201d papers in humanity and social science]. Dai 16 kai Senmon Nihongo Ky\u014diku Gakkai Ronsh\u016b [Conference proceeding of 16th conference of the society for technical Japanese education], 2\u201323."},{"issue":"1","key":"11718_CR58","first-page":"37","volume":"40","author":"F Yoshimura","year":"2015","unstructured":"Yoshimura, F. (2015). Japanese university students\u2019 experience with and perceptions of citations in academic writing. Journal of Institute for Research in English Language and Literature, 40(1), 37\u201362.","journal-title":"Journal of Institute for Research in English Language and Literature"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-023-11718-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-023-11718-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-023-11718-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T10:15:43Z","timestamp":1695982543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-023-11718-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":58,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["11718"],"URL":"https:\/\/doi.org\/10.1007\/s10639-023-11718-4","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"28 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Several authors of this article are involved in organizing the European Network for Academic Integrity annual conferences. The Academic Integrity Ph.D. Summer Schools receive funding from text-matching software vendors. This did not influence our research in any phase.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}