{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:35Z","timestamp":1750307975788,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,18]],"date-time":"2007-10-18T00:00:00Z","timestamp":1192665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,18]]},"DOI":"10.1145\/1324302.1324348","type":"proceedings-article","created":{"date-parts":[[2007,12,7]],"date-time":"2007-12-07T19:19:41Z","timestamp":1197055181000},"page":"213-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A natural language processing approach to automatic plagiarism detection"],"prefix":"10.1145","author":[{"given":"Chi-Hong","family":"Leung","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Yuen-Yan","family":"Chan","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2007,10,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"8748","DOI":"10.1016\/B0-08-043076-7\/02955-7","volume-title":"International Encyclopedia of the Social and Behavioural Sciences","author":"Austin P. K.","year":"2001"},{"volume-title":"Proceedings of Tamil Internet (Chennai","year":"2003","author":"BalaSundaraRaman I. S.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","first-page":"3","article-title":"Three models for the description of language. Information Theory","volume":"2","author":"Chomsky N","year":"1956","journal-title":"IEEE Transactions"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630918"},{"volume-title":"New York: Academic Press","year":"2001","author":"Dalrymple M.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","first-page":"17","article-title":"Is honesty still the best policy?","volume":"107","author":"Fanning K","year":"2005","journal-title":"Junior Scholastic"},{"key":"e_1_3_2_1_7_1","first-page":"59","article-title":"The Case for Case Reopened","volume":"8","author":"Fillmore C. J","year":"1977","journal-title":"Studies in Syntax and Semantics"},{"key":"e_1_3_2_1_8_1","first-page":"29","volume-title":"M. Dalrymple, R. M. Kaplan, III M., John t","author":"Kaplan R. M.","year":"1995"},{"volume-title":"Academic Press","year":"1983","author":"King M.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"The problem of plagiarism","volume":"51","author":"MacDonell C","year":"2005","journal-title":"School Library Journal"},{"key":"e_1_3_2_1_11_1","first-page":"9","article-title":"Preventing digital plagiarism. Technology &amp;","volume":"22","author":"McCullen C","year":"2002","journal-title":"Learning"},{"key":"e_1_3_2_1_12_1","first-page":"3","article-title":"The emergence of texture: An analysis of the functions of the nominal demonstratives in an English interlanguage corpus, Language Learning &amp;","volume":"5","author":"Murphy T","year":"2001","journal-title":"Technology"},{"key":"e_1_3_2_1_13_1","unstructured":"Murray W. The plagiarism phenomenon. E.learning Age (Oct 2006) 22--25.  Murray W. The plagiarism phenomenon. E.learning Age (Oct 2006) 22--25."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00360802"},{"key":"e_1_3_2_1_15_1","first-page":"16","article-title":"Rutgers tests Internet plagiarism software","volume":"18","author":"Roach R","year":"2001","journal-title":"Black Issues in Higher Education"},{"key":"e_1_3_2_1_16_1","first-page":"4","article-title":"Has turnitin.com got it all wrapped up?","volume":"30","author":"Royce J","year":"2003","journal-title":"Teacher Librarian"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630917"},{"volume-title":"Ellis Horwood","year":"1983","author":"Sparck Jones K.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-005-5606-8"}],"event":{"name":"SIGITE07: ACM Special Interest Group for Information Technology Education Conference 2007","sponsor":["ACM Association for Computing Machinery","SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Destin Florida USA","acronym":"SIGITE07"},"container-title":["Proceedings of the 8th ACM SIGITE conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1324302.1324348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1324302.1324348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:26Z","timestamp":1750258706000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1324302.1324348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,18]]},"references-count":19,"alternative-id":["10.1145\/1324302.1324348","10.1145\/1324302"],"URL":"https:\/\/doi.org\/10.1145\/1324302.1324348","relation":{},"subject":[],"published":{"date-parts":[[2007,10,18]]},"assertion":[{"value":"2007-10-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}