{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:44:38Z","timestamp":1729619078244,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/jcdl.2017.7991570","type":"proceedings-article","created":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T20:40:17Z","timestamp":1501188017000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["The Lowest Form of Flattery: Characterising Text Re-Use and Plagiarism Patterns in a Digital Library Corpus"],"prefix":"10.1109","author":[{"given":"George","family":"Buchanan","sequence":"first","affiliation":[]},{"given":"Dana","family":"McKay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1070","author":"sorokina","year":"2006","journal-title":"Plagiarism Detection in arXiv In Proc ICDM'06"},{"key":"ref38","first-page":"655","volume":"6","author":"schein","year":"2001","journal-title":"Redundant surgical publications Tip of the iceberg? Surg 129"},{"key":"ref33","first-page":"197","author":"meuschke","year":"0","journal-title":"2014 Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space In Proc DL 14 (London UK) IEEE Press"},{"journal-title":"State-of-the-art in detecting academicplagiarism Int E Ed Integrity 9 1","year":"2013","author":"meuschke","key":"ref32"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"208","DOI":"10.5455\/aim.2012.20.208-213","author":"masic","year":"2012","journal-title":"Plagiarism in scientificpublishing Acta Inform Med 20 4"},{"key":"ref30","first-page":"179","volume":"66","author":"larivi\u00e8re","year":"2010","journal-title":"On the prevalence and scientificimpact of duplicate publications in different scientificfields (1980&#x2013;2007) E Doc"},{"key":"ref37","first-page":"21","volume":"37","author":"samuelson","year":"1994","journal-title":"Self-plagiarism or fair use CACM"},{"key":"ref36","first-page":"13","author":"pupovac","year":"2008","journal-title":"On academicplagiarism in Europe An analytical approach based on four studies Digithum 10"},{"key":"ref35","first-page":"183","volume":"27","author":"pearl","year":"2012","journal-title":"Detecting authorship deception a supervised machine learning approach using authorwriteprints Linguist Literary Comput"},{"key":"ref34","first-page":"169","volume":"2","author":"miller","year":"2011","journal-title":"Reasons Not to Cheat Academic-Integrity Responsibility and Frequency of Cheating E Exp Ed 79"},{"key":"ref10","first-page":"61","volume":"1","author":"carr","year":"1998","journal-title":"Implementing an open link service for the World Wide Web"},{"journal-title":"Feeding the beast why plagiarism rips off readers too In The Conversation The Conversation AU Melbourne Australia","year":"2015","author":"stokes","key":"ref40"},{"journal-title":"Institutional Issues in Deterring Detecting and Dealing with Student Plagiarism Joint Information Systems Committee","year":"2004","author":"carroll","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1073\/pnas.1415135111","article-title":"Patterns of text reuse in a scientificcorpus","author":"citron","year":"2015","journal-title":"PNAS 112 1"},{"key":"ref13","first-page":"88","volume":"48","author":"collberg","year":"2005","journal-title":"Self-plagiarism in computer science CACM"},{"key":"ref14","first-page":"418","author":"costello","year":"0","journal-title":"2009 Motivating Online Publication of Data Bioscience 59"},{"journal-title":"Peer Trouble In The Guardian Guardian News Media London UK","year":"2003","author":"crace","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/meet.1450420142"},{"key":"ref17","first-page":"133","volume":"39","author":"etter","year":"2006","journal-title":"Origins of AcademicDishonesty E Res Tech Ed"},{"journal-title":"European Science Foundation and ALLEA 2011 European Code of Conduct for Research Integrity Eurpoean Research Council Strasbourg","year":"0","key":"ref18"},{"key":"ref19","first-page":"17028","volume":"42","author":"fang","year":"2012","journal-title":"Misconduct accounts for the majority of retracted scientificpublications"},{"journal-title":"Vice-chancellor resigns amid claims of plagiarism In Sydney Morning Herald","year":"2012","author":"ketchell","key":"ref28"},{"journal-title":"Features and prevalence of plagiarism in biomedical science In MIE","year":"2014","author":"ba?dari?","key":"ref4"},{"key":"ref27","first-page":"443","volume":"4","author":"kara","year":"2010","journal-title":"Responding to academicdishonesty in universities a restorative justice approach Contemp Eustice Rev 13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/03075079712331381034"},{"key":"ref6","first-page":"493","author":"borgman","year":"0","journal-title":"1996 Why are online catalogs still hard to use? JASIS 47 7"},{"key":"ref29","first-page":"96","volume":"7","author":"kock","year":"1999","journal-title":"A case of academicplagiarism CACM 42"},{"key":"ref5","first-page":"29","volume":"1","author":"bennett","year":"2011","journal-title":"Instructor Perceptions of Plagiarism Teach Psych 38"},{"key":"ref8","first-page":"398","author":"brin","year":"0","journal-title":"1995 Copy detection mechanisms for digitaldocuments In Proc SIGMOD 95 (San Jose California USA)"},{"journal-title":"Self-Plagiarism or Appropriate Textual Reuse? E Acad Ethics 7 3 193","year":"2009","author":"bretag","key":"ref7"},{"journal-title":"Department of Information and Communications Manchester Metropolitan University Manchester","article-title":"Interdisciplinary Differences in Attitudes Towards Deposit in Institutional Repositories","year":"2005","key":"ref2"},{"key":"ref9","first-page":"176","author":"bruton","year":"0","journal-title":"2014 Self-Plagiarism and Textual Recycling Legitimate Forms of ResearchMisconduct Acoountability in Research 21 3 (2014\/05\/04)"},{"journal-title":"University IT Systems Managing Liability for Transmitting Caching Hosting and Linking to Copyright Material Australian Vice Chancellor's Committee","year":"2007","key":"ref1"},{"key":"ref46","first-page":"91","author":"williams","year":"0","journal-title":"2013 Near duplicate detection in an academicdigital library In Proc DocEng 13 (Florence Italy) ACM"},{"key":"ref20","first-page":"255","author":"gipp","year":"2011","journal-title":"Comparative evaluation of text-and citation-based plagiarism detection approaches using guttenplag In Proc JCDL 11 (Ottawa Canada) ACM"},{"key":"ref45","first-page":"41","author":"walker","year":"2010","journal-title":"Measuring plagiarism researching what students do not what they say they do Stud High Ed 35 1"},{"key":"ref48","first-page":"469","author":"yalniz","year":"0","journal-title":"2011 Partial duplicate detection for large book collections In Proc CIKM 99 (Glasgow UK) ACM"},{"key":"ref22","first-page":"299","volume":"4","author":"gray","year":"0","journal-title":"2012 Supervisors and AcademicIntegrity Supervisors as Exemplars and Mentors E Acad Ethics 10"},{"key":"ref47","first-page":"581","volume":"82","author":"williamson","year":"1995","journal-title":"announcement BES"},{"key":"ref21","first-page":"76260","author":"govermnent","year":"2000","journal-title":"Executive Office of the President Federal Policy on Research Misconduct Preamble for Research Misconduct Policy Office of Science ant Technology Policy Policy Ed Washington DC"},{"key":"ref42","first-page":"150","volume":"2","author":"supak-smol?i?","year":"2013","journal-title":"How do we handle self-plagiarism in submitted manuscripts? Biochem Med 23"},{"key":"ref24","article-title":"Comparing the Impact of OA vs. Non-OA Articles in the Same Journals","volume":"6","author":"harnad","year":"2004","journal-title":"D -Lib 10"},{"key":"ref41","first-page":"1575","volume":"28","author":"stretton","year":"0","journal-title":"2012 Publication misconduct and plagiarism retractions a systematic retrospective study Curr Med Res Opin"},{"key":"ref23","first-page":"421","article-title":"Detection of simple plagiarism in computer sciencepapers","author":"hacohen-kerner","year":"2010","journal-title":"Proc CICLing 10 (Beijing China) Association for Computational Linguistics"},{"key":"ref44","first-page":"1029","author":"waldron","year":"1992","journal-title":"Is duplicate publishing on the increase? BMJ 304 6833"},{"key":"ref26","first-page":"227","volume":"3","author":"ison","year":"0","journal-title":"2012 Plagiarism Among Prevalence at Online Institutions E Acad Ethics 10"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2013.004"},{"key":"ref25","first-page":"203","volume":"3","author":"hoad","year":"2003","journal-title":"Methods for identifying versioned and plagiarized documents JASIST 54"}],"event":{"name":"2017 ACM\/IEEE Joint Conference on Digital Libraries (JCDL)","start":{"date-parts":[[2017,6,19]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2017,6,23]]}},"container-title":["2017 ACM\/IEEE Joint Conference on Digital Libraries (JCDL)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7988694\/7990621\/07991570.pdf?arnumber=7991570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T18:29:58Z","timestamp":1569954598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7991570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/jcdl.2017.7991570","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}