Academia.eduAcademia.edu

Outline

Citation-based Plagiarism Detection

2014

https://doi.org/10.1007/978-3-658-06394-8

Abstract
sparkles

AI

This doctoral thesis introduces Citation-based Plagiarism Detection (CbPD), a novel approach to identifying heavily disguised plagiarism in academic texts by leveraging citation patterns as semantic fingerprints. Unlike traditional methods that primarily focus on text similarity, CbPD effectively captures narrative and structural similarities in paraphrased works by analyzing citations, enabling the detection of various forms of disguised plagiarism, which conventional systems often miss. The effectiveness of CbPD is evidenced through evaluations on multiple datasets, including significant real-world cases, demonstrating its superiority in reducing false positives and enhancing detection capabilities when used in conjunction with existing plagiarism detection tools.

References (442)

  1. CRS92_Art.V Guttenberg06 CRS92_Art.V Guttenberg06 Citation Pattern 30 39 223 224 240 - 242 242 - 244 225 246 - 247 267 - 268 242 - 244 242 - 244 229 - 231 232 - 233 234 235 - 239 Legend: Boxes of the same color represent in-text citations to identical sources. Intermediate blank boxes indicate one or more citations to non-shared sources. Figure 29: Citation Patterns for Translated Plagiarism Quelle Unser 1999 S. 156-158
  2. Plagiat Hehn 2007 S. 145-146
  3. Raaij, W. F. v. (1988)
  4. Kozielecki, J. (1975) Payne, J.W. (1980)
  5. Pitz, G. F./Sachs, N. J. (1984)
  6. Harte, J. M./Westenberg, M. R. Hogarth, R. M. (1981) Kirsch, W. (1971)
  7. Schneider, S. L. (1992)
  8. Casey, J. T./Delquie, P. (1995) Dörner, D. (1986)
  9. Fürstenau, B. (1994) Svenson, O. (1988)
  10. Pitz, G. F./Leung, L. S. ...
  11. Gentner, D./Stevens, A. L. (1983) McCain, R. A. (1992)
  12. Anderson, N. H. (1986) Simon, H. A. (1991)
  13. Johnson-Laird, P. N. (1983) Johnson-Laird, P. N. (1995) Opwis, K. (1985) Reason, J. (1990) Seel, N. M. (1991)
  14. Dutke, S. (1994)
  15. Kluwe, R. H. (1990)
  16. Kluwe, R H (1995)
  17. Richter, A. (1996)
  18. Tergan, S.-O. (1986)
  19. Fürstenau, B. (1994) Kluwe, R. (1979)
  20. Zimbardo, P. G. (1992) Fürstenau, B. (1994)
  21. Wessels, M. G. (1984) Dörner, D. (1987) Dörner, D. (1988)
  22. Zimbardo, P. G. (1992) Pervin, L. A. (1987)
  23. Oldenbürger, H.-A. (1981) Simon, H. A. (1979a)
  24. Slovic, P./Fischhoff, Tergan, S.-O. (1986)
  25. Seel, N. M. (1991)
  26. Sternberg, R. J. (1996a) Banyard, P. (1995)
  27. Kluwe, R. H. (1990) Kluwe, R. H. (1995)
  28. Newell, Simon (1972) Kirsch, W. (1988) Schwarz, N. (1982) Dörner, D. (1986)
  29. Dörner, D. (1990)
  30. Forkel, M. (1995)
  31. Hastie /Pennington (1995) References
  32. Vgl. Kahneman, Slovic und Tversky (1982).
  33. Vgl. Anderson (1986), S. 83-88;
  34. Berens (1992);
  35. Groner, Groner und Bischof (1983);
  36. Hogarth (1981);
  37. Lopes (1991); Pitz und Sachs (1984), S. 140;
  38. van Raaij (1988), S. 79; Schaefer (1979), S. 398 sowie Tversky und Kahneman (1974). Die Anwendung von Heuristiken führt in (Simulations-) Experimenten häufig zu nahezu optimalen Ergebnissen;
  39. Cason (1994); Gigerenzer und Goldstein (1996), S. 666; Thorn-gate (1980) sowie Schoemaker und Hershey (1996), S. 199. References
  40. Vgl. Kahneman, D./Slovic, P./Tversky, A. (1982)
  41. Vgl. Anderson, N. H. (1986) S. 83- 88;
  42. Berens, W. (1992);
  43. Groner, R./Groner, M./Bischof, W. F. (1983);
  44. Hogarth, R. M. (1981);
  45. Lopes, L. L. (1991);
  46. Pitz, G. F./Sachs, N. J. (1984) S.
  47. ; Raaij, W. F. v. (1988) S. 79;
  48. Schaefer, R. E. (1979) S. 398; Tversky, A./Kahneman, D. (1974). ln (Simulations-) Experimenten konnte darüber hinaus gezeigt werden, daß die Anwendung von Heuristiken häufig zu nahezu optimalen Ergebnissen fuhrt;
  49. Cason, T. N. (1994); Gigerenzer, G./ Goldstein, D. G. (1996) S. 666;
  50. Thomgate, W. S. (1980);
  51. Schoemaker, P.
  52. Vgl. etwa Einhorn und Hogarth (1981) sowie Klein (1983).
  53. Vgl. Aschenbrenner, Böckenholt, Albert und Schmalhofer (1986), S. 68;
  54. Grunert (1982), S. 38-41 und S. 105;
  55. Tyszka (1986), S. 159; Payne (1976), S. 384; Unser (1999), S. 152 sowie Wedeil und Senter (1997), S. 61.
  56. Vgl. Russo et al. (1996), S. 107; Gilad et al. (1987), S. 67; Gilovich (Hrsg.) (1991), S. 62 sowie Hofacker (1985), S. 47.
  57. Vgl. Aarts, Verplanken und van Knippenberg (1997).
  58. Vgl. Ben Zur und Breznitz (1981), S. 102; Kuß (1991), S. 58 sowie Hofacker (1985), S. 47. J. H./Hershey, J. C. (1996) S. 199.
  59. Vgl. Einhorn, H.J./Hogarth, R.M. (1981);
  60. Klein, N.M. (1983).
  61. Vgl. Aschenbrenner, K. M./Bökenholt, U./Albert, D./Schmalhofer, F. (1986) S. 68;
  62. Grunert, K. G. (1982) S. 38-41, 105;
  63. Tyszka, T. (1986) S. 159; Payne, J. W. (1976) S. 384; Wedell, D. H./Senter, S. M. (1997) S. 61
  64. Vgl. Russo, J. E./Husted Medvec, V./Meloy, M. G. (1996) S.107; Gilad, B./Kaish, S./Loeb, P. D. (1987) S.67;
  65. Gilovic, T. (1991) S. 62; Hofacker, T. (1985) S. 46.
  66. Vgl. Aarts, H./Verplanken, B./Knippenberg, A. v. (1997)
  67. Vgl. Ben Zur, H./Breznitz, S. J. (1981) S. 102; Kuß, A. (1991) S. 58, Hofacker, T. (1985) S. 47.
  68. Case studies [325] [112] http://citeplag.org/compare/13278/92969
  69. Ablamunits V (2005) The importance of APC. Journal of Autoimmune Disease 2:3, doi: 10.1186/1740-2557-2-3, PMC1087870
  70. ACNP Software (2011) Plagiarism Detection Software. Online Source, retrieved Oct. 28, 2011 from: http://www.anticutandpaste.com
  71. Ahlgren P, Colliander C (2009) Document-document Similarity Approaches and Science Mapping: Experimental Comparison of Five Approaches. Journal of Informetrics 3(1):49-63, doi: 10.1016/j.joi.2008.11.003
  72. Ahlgren P, Jarneving B (2008) Bibliographic Coupling, Common Abstract Stems and Clustering: A Comparison of Two Document- document Similarity Approaches in the Context of Science Mapping. Scientometrics 76:273-290, 10.1007/s11192-007-1935-1
  73. Ahtiainen A, Surakka S, Rahikainen M (2006) Plaggie: Gnu-licensed Source Code Plagiarism Detection Engine for Java Exercises. In: Proceedings of the 6th Baltic Sea Conference on Computing Education Research, pp 141-142, doi: 10.1145/1315803.1315831
  74. Ali R, Beg SMM (2011) An overview of Web search evaluation methods. Computers and Electrical Engineering 37(6):835-848, doi: 10.1016/j.compeleceng.2011.10.005
  75. Alkureishi LW, Burak Z, Alvarez JA, Ballinger J, Bilde A, Britten AJ, Calabrese L, Chiesa C, Chiti A, de Bree R, Gray HW, Hunter K, Kovacs AF, Lassmann M, Leemans CR, Mamelle G, McGurk M, Mortensen J, Poli T, Shoaib T, Sloan P, Sorensen JA, Stoeckli SJ, Thomsen JB, Trifiro G, Werner J, Ross GL (2009) Joint Practice Guidelines for Radionuclide Lymphoscintigraphy for Sentinel Node Localization in Oral/Oropharyngeal Squamous Cell Carcinoma. Ann Surg Oncol 16:3190-3210, PMID19795174, PMC2766455
  76. Alkureishi LW, Burak Z, Alvarez JA, Ballinger J, Bilde A, Britten AJ, Calabrese L, Chiesa C, Chiti A, de Bree R, Gray HW, Hunter K, Kovacs AF, Lassmann M, Leemans CR, Mamelle G, McGurk M, Mortensen J, References
  77. Poli T, Shoaib T, Sloan P, Sorensen JA, Stoeckli SJ, Thomsen JB, Trifiro G, Werner J, Ross GL (2009) Joint Practice Guidelines for Radionuclide Lymphoscintigraphy for Sentinel Node Localization in Oral/Oropharyngeal Squamous Cell Carcinoma. Eur J Nucl Med Mol Imaging 36:1915-1936, PMID19784646, PMC2764079
  78. Aller MA, Arias JL, Arias J (2007) The Mast Cell Integrates the Splanchnic and Systemic Inflammatory Response in Portal Hypertension. Journal of Translational Medicine 5:44, PMID17892556, PMC2034541
  79. Aller MA, Arias JL, Cruz A, Arias J (2007) Inflammation: a Way to Understanding the Evolution of Portal Hypertension. Theoretical Biology and Medical Modelling 4:44, PMID17999758, PMC2206015
  80. American Diabetes Association (2009) Diagnosis and classification of diabetes mellitus. Diabetes Care 32(Suppl. 1):62-67, doi: 10.2337/dc09- S062
  81. American Diabetes Association (2010) Diagnosis and classification of diabetes mellitus. Diabetes Care 33(Suppl. 1):9-62, doi: 10.2337/dc10- S062
  82. Amsler RA (1972) Applications of Citation-based Automatic Classification. Tech. rep., Linguistics Research Center, University of Texas at Austin, Austin, TX
  83. Apache Software Foundation (2010) Apache OpenNLP. Online Source, retrieved May 29, 2012 from: http://incubator.apache.org/opennlp/ 15. arXivorg (2007) 65 Admin Withdrawals. Online Source, retrieved Oct. 28, 2011 from: http://arxiv.org/new/withdrawals.aug.07.html
  84. Associated Press (2006) Disgraced Korean Cloning Scientist Indicted. The New York Times, retrieved Oct. 31, 2012 from: http://- www.nytimes.com/2006/05/12/world/asia/12korea.html
  85. Autodesk Research (2012) Citeology: Visualizing Paper Genealogy. References 225 2011 from http://evidencenet.pbworks.com/Dealing-with-plagiarism-in- the-digital-age
  86. Baker BS (1992) A Program for Identifying Duplicated Code. In: Proceedings of the 24th Symposium on the Interface, College Station, TX, USA, pp 49-57
  87. Baker BS (1993) On Finding Duplication in Strings and Software. Online Source, retrieved Jun. 16, 2010 from: http://cm.bell-labs.com/cm/cs/doc/- 93/2-bsb-1.ps.gz
  88. Ballard B (1989) Mutual Misconceptions: the Intellectual Problems of Overseas Students in Australia. Directions, Journal of Educational Studies 11(1):48-60
  89. Bao J, Lyon C, Lane PCR, Wei J, Malcolm JA (2007) Comparing Different Text Similarity Methods. Tech. rep., Technical Report 461, Science and Technology Research Institute, University of Hertfordshire
  90. Barrett R, Malcolm J (2006) Embedding Plagiarism Education in the Assessment Process. International Journal for Educational Integrity 2(1):38-45
  91. Basile C, Benedetto D, Caglioti E, Cristadoro G, Esposti MD (2009) A Plagiarism Detection Procedure in Three Steps: Selection, Matches and "Squares". In: Proceedings of the 3rd PAN Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse
  92. Beel J, Gipp B (2009) Google Scholar's Ranking Algorithm: An Introductory Overview. In: Larsen B, Leta J (eds) Proceedings of the 12th International Conference on Scientometrics and Informetrics (ISSI'09), International Society for Scientometrics and Informetrics, Rio de Janeiro (Brazil), vol 1, pp 230-241
  93. Beel J, Gipp B (2009) Google Scholar's Ranking Algorithm: The Impact of Citation Counts (An Empirical Study). In: Flory A, Collard M (eds) Proceedings of the 3rd IEEE International Conference on Research Challenges in Information Science (RCIS'09), IEEE, Fez, Morocco, pp 439-446, doi: 10.1109/RCIS.2009.5089308 References
  94. Beel J, Gipp B (2010) Academic Search Engine Spam and Google Scholar's Resilience Against it. Journal of Electronic Publishing 13(3), doi: 10.3998/3336451.0013.305
  95. Beel J, Gipp B (2010) Detection of a similarity of documents by Citation Proximity Analysis. Patent Application, wO/2010/078857
  96. Beel J, Gipp B, Shaker A, Friedrich N (2010) SciPlore Xtract: Extracting Titles from Scientific PDF Documents by Analyzing Style Information (Font Size). In: Lalmas M, Jose J, Rauber A, Sebastiani F, Frommholz I (eds) Research and Advanced Technology for Digital Libraries, Proceedings of the 14th European Conference on Digital Libraries (ECDL'10), Springer, Glasgow (UK), Lecture Notes of Computer Science (LNCS), vol 6273, pp 413-416
  97. Beel J, Gipp B, Wilde E (2010) Academic Search Engine Optimization (ASEO): Optimizing Scholarly Literature for Google Scholar and Co. Journal of Scholarly Publishing 41(2):176-190, doi: 10.3138/jsp.41.2.176, university of Toronto Press
  98. Beel J, Gipp B, Langer S, Genzmehr M, Wilde E, Nürnberger A, Pitman J (2011) Introducing Mr. DLib, a Machine-readable Digital Library. In: Proceedings of the 11th ACM/IEEE Joint Conference on Digital Libraries (JCDL'11)
  99. Beel J, Gipp B, Stiller JO (2011) Method for determining a similarity of objects. Patent Application, wO/2011/044865
  100. Bernstein Y, Zobel J (2004) A Scalable System for Identifying Co- derivative Documents. In: String Processing and Information Retrieval, Lecture Notes in Computer Science, vol 3246, Springer, pp 1-11, doi: 10.1007/978-3-540-30213-1_6
  101. Blackboard Inc (2011) Safe Assign. Online Source, retrieved Oct. 28, 2011 from: http://www.safeassign.com/
  102. Bloomfield LA (2009) Software to detect plagiarism: WCopyfind. Online Source, retrieved Oct. 1, 2010 from: http://plagiarism.phys.virginia.edu/- Wsoftware.html
  103. Stegemann Boehl S (1994) Fehlverhalten von Forschern. Thieme 37. Boekel MAv, Vossenaar ER, van den Hoogen FH, van Venrooij WJ (2002) Autoantibody Systems in Rheumatoid Arthritis: Specificity, Sensitivity and Diagnostic Value. Arthritis Res 4:87-93, PMID11879544, PMC128920
  104. Boyack KW, Newman D, Duhon RJ, Klavans R, Patek M, Biberstine JR, Schijvenaars B, Skupin A, Ma N, Börner K (2011) Clustering More than Two Million Biomedical Publications: Comparing the Accuracies of Nine Text-Based Similarity Approaches. PLoS ONE 6(3):e18,029, doi: 10.1371/journal.pone.0018029
  105. Braam RR, Moed HF, van Raan AFJ (1991) Mapping of Science by Combined Co-Citation and Word Analysis. I. Structural Aspects. Journal of the American Society for Information Science 42(4):233-251
  106. Bretag T, Mahmud S (2009) Self-Plagiarism or Appropriate Textual Re- use? Journal of Academic Ethics 7:193-205, doi: 10.1007/s10805-009- 9092-1
  107. Brin S, Davis J, Garcia Molina H (1995) Copy Detection Mechanisms for Digital Documents. In: Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, ACM, pp 398-409, doi: 10.1145/223784.223855
  108. Broder AZ, Glassman SC, Manasse MS, Zweig G (1997) Syntactic Clustering of the Web. Computer Networks and ISDN Systems 29(8- 13):1157-1166, doi: 10.1016/S0169-7552(97)00031-7
  109. Brooks T (1986) Evidence of complex citer motivations. Journal of the American Society for Information Science 37(1):34-36
  110. Brown BS (2001) Explaining Variations in the Level of Academic Dishonesty in Studies of College Students: Some New Evidence. College Student Journal 35(4):529-538
  111. Brown BS, Abramson J (1999) The Academic Ethics of Undergraduate Marketing Majors. Academy of Marketing Studies Journal 3(1):62-71
  112. Brown BS, Weible R (2006) Changes in Academic Dishonesty among MIS Majors between 1999 and 2004. Journal of Computing in Higher Education 18:116-134 References
  113. Brown KA, Aakre ME, Gorska AE, Price JO, Eltom SE, Pietenpol JA, Moses HL (2004) Induction by Transforming Growth Factor-beta1 of Epithelial to Mesenchymal Transition is a Rare Event in Vitro. Breast Cancer Res 6:215-231, PMID11250748, PMC13902
  114. Bruhn A, Hernandez G, Bugedo G, Castillo L (2004) Effects of positive end-expiratory pressure on gastric mucosal perfusion in acute respiratory distress syndrome. Critical Care 8(5):306-311, doi: 10.1186/cc2905, PMID15469573, PMC1065018
  115. Buckley C, Dimmick D, Soboroff I, Voorhees E (2007) Bias and the Limits of Pooling for Large Collections. Inf Retr 10(6):491-508, doi: 10.1007/s10791-007-9032-x
  116. Bull J, Colins C, Coughlin E, Sharp D (2000) Technical Review of Plagiarism Detection Software Report. Tech. rep., Joint Information System Committee
  117. Butakov S, Scherbinin V (2009) The Toolbox for Local and Global Plagiarism Detection. Computers & Education 52(4):781-788, doi: 10.1016/j.compedu.2008.12.001
  118. Buyko E, Wermter J, Poprat M, Hahn U (2006) Automatically Adapting an NLP Core Engine to the Biology Domain. In: Proceedings of the Joint BioLINK-Bio-Ontologies Meeting. A Joint Meeting of the ISMB Special Interest Group on Bio-Ontologies and the BioLINK Special Interest Group on Text Data Mining in Association with ISMB, pp 65-68
  119. Calado P, Cristo M, Moura E, Ziviani N, Ribeiro Neto B, Gonçalves MA (2003) Combining Link-based and Content-based Methods for Web Document Classification. In: Proceedings of the 12th international conference on Information and knowledge management, ACM, pp 394- 401, doi: 10.1145/956863.956938
  120. Calado P, Cristo M, Gonçalves MA, de Moura ES, Ribeiro Neto B, Ziviani N (2006) Link-based Similarity Measures for the Classification of Web Documents. Journal of the American Society for Information Science and Technology 57:208-221, doi: 10.1002/asi.v57:2
  121. Callahan A, Hockema S, Eysenbach G (2010) Contextual Cocitation: Augmenting Cocitation Analysis and its Applications. Journal of the American Society for Information Science and Technology 61:1130- 1143, doi: 0.1002/asi.21313
  122. Campbell DM, Chen WR, Smith RD (2000) Copy Detection Systems for Digital Documents. In: Tester T, Hubertus Tv (eds) Proceedings of the Conference on Advances in Digital Libraries, IEEE, Los Alamitos, CA, USA, LNS, vol 64654, pp 78-88, doi: 10.1109/ADL.2000.848372
  123. Barrón Cedeño A, Rosso P (2009) On Automatic Plagiarism Detection Based on n-Grams Comparison. In: Advances in Information Retrieval, Lecture Notes in Computer Science, vol 5478, Springer, pp 696-700, doi: 10.1007/978-3-642-00958-7_69
  124. Barrón Cedeño A, Rosso P, Pinto D, Juan A (2008) On Cross-lingual Plagiarism Analysis using a Statistical Model. In: Proceedings of the ECAI08 Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse, CEUR-WS.org, CEUR Workshop Proceedings, vol 377
  125. Ceska Z (2008) Plagiarism Detection Based on Singular Value Decomposition. In: Advances in Natural Language Processing, Lecture Notes in Computer Science, vol 5221, Springer, pp 108-119, doi: 10.1007/978-3-540-85287-2_11
  126. CFL Software Ltd (2011) CopyCatch. Online Source, retrieved Oct. 1, 2011 from: http://cflsoftware.com/
  127. Chan B, Koren G (2003) Pharmacological Treatment for Pregnant Women who Smoke Cigarettes. Tobacco Induced Diseases 1:165-174, PMID19570257, PMC2671545
  128. Chan B, Koren G (2003) Pharmacological Treatment for Pregnant Women who Smoke Cigarettes. Tobacco Induced Diseases 1:165-174, PMID19570257, PMC2669555
  129. Chang WI, Lawler EL (1994) Sublinear Approximate String Matching and Biological Applications. Algorithmica 12:327-344, doi: 10.1007/BF01185431
  130. Chatzimarkakis G (2000) Informationeller Globalismus: Kooperationsmodell globaler Ordnungspolitik am Beispiel des elektronischen Geschäftsverkehrs. Dissertation, Faculty of Philosophy, University of Bonn, retracted as plagiarism by the University of Bonn on Jul. 13, 2011.
  131. Chen Y, Liu C, Xu X, Zhang X, Shen W (2012) Simple Mental Arithmetic is not so Simple: An ERP Study of the Split and Odd-even Effects in Mental Arithmetic. Neuroscience Letters 510, Issue 1:62-66, retraction notice: http://www.sciencedirect.com/science/article/pii/- S0304394012000201
  132. Chennagiri RJ, Critchley P, Giele H (2004) Duplicate publication in the Journal of Hand Surgery. British Journal of Hand Surgery 29:625-628, doi: 10.1016/j.jhsb.2004.04.005, PMID15542228
  133. Chong M, Specia L, Mitkov R (2010) Using Natural Language Processing for Automatic Detection of Plagiarism. In: Proceedings of the 4th International Plagiarism Conference 2010, Newcastle upon Tyne, UK
  134. Chowdhury A, Frieder O, Grossman D, McCabe M (2002) Collection Statistics for Fast Duplicate Document Detection. ACM Transactions on Information Systems (TOIS) 20(2):171-191, doi: 10.1145/506309.506311
  135. Clarke R (2006) Plagiarism by Academics: More Complex Than It Seems. Journal of the Association for Information Systems 7(2):91-121
  136. Clarke SJ, Willett P (1997) Estimating the recall performance of Web search engines. Aslib Proceedings 49(7):184-189, doi: 10.1108/eb051463
  137. Clough P (2000) Plagiarism in Natural and Programming Languages an Overview of Current Tools and Technologies. Tech. rep., Department of Computer Science, University of Sheffield
  138. Clough P, Stevenson M (2011) Developing a Corpus of Plagiarised Short Answers. Language Resources and Evaluation 45:5-24, 10.1007/s10579- 009-9112-1
  139. Cohen MB (2006) The Best in CytoJournal: 2005. Cytojournal 2006(3:21), doi: 10.1186/1742-6413-3-21, PMC1570476
  140. Cole CA (2002) Academic Dishonesty among College Students: Themes of the Professional Literature, 1950-1997. Phd. thesis, The University of Texas at Austin
  141. Cole SL, Vassar R (2007) The Alzheimer's Disease Beta-secretase Enzyme, BACE1. Mol Neurodegener 2:22, PMID18005427, PMC2211305
  142. Cole SL, Vassar R (2007) The Basic Biology of BACE1: a Key Therapeutic Target for Alzheimer's Disease. Current Genomics 8:509- 530, PMID19415126, PMC2647160
  143. Collberg C, Kobourov S (2005) Self-plagiarism in Computer Science. Commununications of the ACM 48(4):88-94, doi: 10.1145/1053291.1053293
  144. Cooper WS (1968) Expected search length: a single measure of retrieval effectiveness based on the weak ordering action of retrieval systems. Journal of the American Society for Information Science and Technology 19(1):30-41, doi: 10.1002/asi.5090190108
  145. Couto T, Cristo M, Gonçalves MA, Calado P, Ziviani N, Moura E, Ribeiro Neto B (2006) A Comparative Study of Citations and Links in Document Classification. In: Proceedings of the 6th ACM/IEEE-CS Joint Conference on Digital Libraries, ACM, pp 75-84, doi: 10.1145/1141753.1141766
  146. Cristo M, Calado P, de Moura E, Ziviani N, Ribeiro Neto B (2003) Link Information as a Similarity Measure in Web Classification. In: String Processing and Information Retrieval, Lecture Notes in Computer Science, vol 2857, Springer, pp 43-55
  147. Crochemore M, Rytter W (2002) Jewels of Stringology. World Scientific Publishing
  148. Crown DF, Spiller MS (1998) Learning from the Literature on Collegiate Cheating: A Review of Empirical Research. Journal of Business Ethics 17:683-700, doi: 10.1023/A:1017903001888 References
  149. Culwin F (2006) An Active Introduction to Academic Misconduct and the Measured Demographics of Misconduct. Assessment & Evaluation in Higher Education 31(2):167-182, doi: 10.1080/02602930500262478
  150. Culwin F (2009) The Efficacy of Turnitin and Google. In: Proceedings of the 10th Annual Conference of the Subject Centre for Information and Computer Sciences, HE Academy, Subject Centre for ICS
  151. Culwin F, Warwick J, Child M (2008) An Empirical Investigation of Student Behaviour when Non-originality Detection is Made Available before Submission. In: Proceedings of the 3rd International Plagiarism Conference, Newcastle upon Tyne, UK
  152. Dean J, Henzinger MR (1999) Finding Related Pages in the World Wide Web. Computer Networks 31:1467-1479, doi: 10.1016/S1389- 1286(99)00022-5
  153. Deer B (2004) Revealed: MMR Research Scandal. The Sunday Times, retrieved Oct. 31, 2012 from: http://briandeer.com/mmr/lancet-deer-1.htm
  154. Devi SL, Rao PRK, Ram VS, Akilandeswari A (2010) External Plagiarism Detection -Lab Report for PAN at CLEF 2010. In: Notebook Papers of CLEF 2010 LABs and Workshops
  155. Devlin M (2002) Plagiarism Detection Software: How Effective is it? In: Assessing Learning in Australian Universities, Centre for the Study of Higher Education, University of Melbourne and the Australian Universities Teaching Committee
  156. Dickinson HO, Hrisos S, Eccles MP, Francis J, Johnston M (2010) Statistical Considerations in a Systematic Review of Proxy Measures of Clinical Behaviour. Implementation Science 5:20, PMID20187923, PMC2846869
  157. Divita G, Browne A, Loane R (2006) dTagger: a POS Tagger. In: Proceedings of the Annual AMIA Symposium, pp 200-203
  158. Déjà Vu (2011) A Study of Scientific Publication Ethics. Online Source, retrieved May 29, 2012 from: http://dejavu.vbi.vt.edu/dejavu/
  159. Docoloc UG & Co KG (2011) Docoloc. Online Source, retrieved Aug. 8, 2011 from: http://www.docoloc.com
  160. Dreher H (2007) Automatic Conceptual Analysis for Plagiarism Detection. Information and Beyond: The Journal of Issues in Informing Science and Information Technology 4:601-614
  161. Durani P (2006) Duplicate publications: redundancy in plastic surgery literature. Journal of Plastic, Reconstructive & Aesthetic Surgery 59:975- 7, doi: 10.1016/j.bjps.2005.11.039, PMID16920591
  162. Egghe L, Rousseau R (1990) Introduction to Informetrics : Quantitative Methods in Library, Documentation and Information Science. Elsevier Science Publishers, http://hdl.handle.net/10760/6011
  163. Meyer zu Eissen S, Stein B (2006) Intrinsic Plagiarism Detection. In: Proceedings of the 28th European Conference on IR Research, Springer, London, UK, Lecture Notes in Computer Science, vol 3936, pp 565-569, doi: 10.1007/11735106_66
  164. Meyer zu Eissen S, Stein B, Kulig M (2007) Plagiarism Detection without Reference Collections. In: Proceedings of the 30th Annual Conference of the Gesellschaft für Klassifikation e.V., Springer, Berlin, Germany, pp 359-366, doi: 10.1007/978-3-540-70981-7_40
  165. Aaron Elkiss, Siwei Shen, Anthony Fader, Günes¸ Erkan, David States, Dragomir Radev (2008) Blind Men and Elephants: What Do Citation Summaries Tell Us About a Research Article? Journal of the American Society for Information Science and Technology 59(1):51-62, doi: 10.1002/asi.20707
  166. Ephorus BV (2011) Ephorus. Online Source, retrieved Aug. 8, 2011 from: https://www.ephorus.com/en/home
  167. Epstein SK (2004) Extubation failure: an outcome to be avoided. Critical Care 8(5):310-312, doi: 10.1186/cc2927, PMID15469587, PMC1065026
  168. Ercegovac Z, Richardson Jr JV (2004) Academic Dishonesty, Plagiarism Included, in the Digital Age: a Literature Review. College and Research Libraries 65(4):301-318
  169. Ernst H (1959) Design and Evaluation of a Literature Retrieval Scheme. Master's thesis, Massachusetts Institute of Technology, cited according to: E. Garfield. Science Citation Index -A New Dimension in Indexing. References
  170. Science, 144 (3619): 649-654, May 1964. doi: 10.1126/science.144.3619.649.
  171. Errami M, Hicks JM, Fisher W, Trusty D, Wren JD, Long TC, Garner HR (2008) Déjà Vu -a Study of Duplicate Citations in Medline. Bioinformatics 24(2):243-249, doi: 10.1093/bioinformatics/btm574, http://bioinformatics.oxfordjournals.org/content/24/2/243.full.pdf+html
  172. Errami M, Sun Z, Long TC, George AC, Garner HR (2009) Déjà Vu: a Database of Highly Similar Citations in the Scientific Literature. Nucleic Acids Research 37(Suppl. 1):D921-D924, doi: 10.1093/nar/gkn546, http://nar.oxfordjournals.org/content/37/suppl_1/D921.full.pdf+html
  173. Eto M (2012) Evaluations of Context-based Co-Citation Searching. Scientometrics 94(2):651-673, doi: 10.1007/s11192-012-0756-z
  174. Fang FC, Steen RG, Casadevall A (2012) Misconduct Accounts for the Majority of Retracted Scientific Publications. Proceedings of the National Academy of Sciences 109(42):17,028-17,033, doi: 10.1073/pnas.1212247109
  175. Fano RM (1956) Documentation in Action, Reinhold Publ. Co., New York, chap Information Theory and the Retrieval of Recorded Information, pp 238-244
  176. Fellbaum C (1998) WordNet: an Electronic Lexical Database (Language, Speech, and Communication). The MIT Press
  177. Ferrini F, Salio C, Lossi L, Merighi A (2009) Ghrelin in central neurons. Current Neuropharmacology 7(1):37-49, doi: 10.2174/157015909787602779, PMID19721816, PMC2724662
  178. Finkel RA, Zaslavsky AB, Monostori K, Schmidt HW (2002) Signature Extraction for Overlap Detection in Documents. In: Proceedings of the 25th Australasian Computer Science Conference, Australian Computer Society Inc., Melbourne, Australia, Conferences in Research and Practice in Information Technology, vol 4, pp 59-64
  179. Fiori R, Chiappa R, Gaspari E, Simonetti G (2010) A Rare Case of Popliteal Venous Aneurysm. Case Reports in Medicine 2010(Artuicle ID 579256), doi: 10.1155/2010/579256, PMID20224754, PMC2836132
  180. Fishman T (2009) "We know it when we see it" is not good enough: toward a standard definition of plagiarism that transcends theft, fraud, and copyright. In: Proceedings of the 4th Asia Pacific Conference on Educational Integrity, http://www.bmartin.cc/pubs/09-4apcei/4apcei- Fishman.pdf
  181. Couzin Frankel J, Grom J (2009) Plagiarism Sleuths. Science 324(5930):1004-1007, doi: 10.1126/science.324_1004, http://www.sciencemag.org/content/324/5930/1004.full.pdf
  182. Fraser GE, Franke AA, Jaceldo-Siegl K, Bennett H (2010) Reliability of Serum and Urinary Isoflavone Estimates. Biomarkers 15:135-139
  183. Fröhlich G (2006) Plagiate und unethische Autorenschaften. Information - Wissenschaft & Praxis 57(2):81--89
  184. Garfield E (1964) Science Citation Index -a New Dimension in Indexing. Science 144(3619):649-654, doi: 10.1126/science.144.3619.649
  185. Garfield E, Sher I (1963) New factors in the evaluation of scientific literature through citation indexing. American Documentation 14(3):195- 201
  186. Garfield E, Sher IH, Torpie RJ (1964) The Use of Citation Data in Writing the History of Science. Institute for Scientific Information
  187. Garner BA (2011) Garner's Dictionary of Legal Usage, 3rd edn. Oxford University Press
  188. Ghafouri M, Amini S, Khalili K, Sawaya BE (2006) HIV-1 Associated Dementia: Symptoms and Causes. Retrovirology 3:28, PMID16712719, PMC1513597
  189. Gipp B (2006) (Co-)Citation Proximity Analysis -A Measure to Identify Related Work. Doctoral Proposal, otto-von-Guericke University, Germany, Supervisor: Prof. Claus Rautenstrauch
  190. Gipp B (2009) Very Large Business Applications (VLBA): Systemlandschaften der Zukunft, Shaker Verlag, Magdeburg, chap Entwicklung neuer Verfahren zur Bestimmung von Dokumentenähnlichkeiten mittels Referenz-und Zitationsanalyse, pp References 163-173. 3. Workshop des Centers for Very Large Business Applications (CVLBA)
  191. Gipp B (2010) Measuring Document Relatedness by Citation Proximity Analysis and Citation Order Analysis. In: Lalmas M, Jose J, Rauber A, Sebastiani F, Frommholz I (eds) Proceedings of the 14th European Conference on Digital Libraries (ECDL'10): Research and Advanced Technology for Digital Libraries, Springer, Lecture Notes of Computer Science (LNCS), vol 6273
  192. Gipp B (2011) Identifying Related Work and Plagiarism by Citation Analysis. Bulletin of IEEE Technical Committee on Digital Libraries (TCDL) 7(1)
  193. Gipp B, Beel J (2009) Citation Proximity Analysis (CPA) -A new approach for identifying related work based on Co-Citation Analysis. In: Larsen B, Leta J (eds) Proceedings of the 12th International Conference on Scientometrics and Informetrics (ISSI'09), International Society for Scientometrics and Informetrics, Rio de Janeiro (Brazil), vol 2, pp 571- 575, iSSN 2175-1935
  194. Gipp B, Beel J (2010) Citation Based Plagiarism Detection -a New Approach to Identify Plagiarized Work Language Independently. In: Proceedings of the 21st ACM Conference on Hypertext and Hypermedia, ACM, pp 273-274, doi: 10.1145/1810617.1810671
  195. Gipp B, Beel J (2011) Method and System for Detecting a Similarity of Documents. Patent Application, http://www.patentlens.net/patentlens/- patent/US_2011_0264672_A1/en/, uS 2011/0264672 A1
  196. Gipp B, Meuschke N (2011) Citation Pattern Matching Algorithms for Citation-based Plagiarism Detection: Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. In: Proceedings of the 11th ACM Symposium on Document Engineering, ACM, Mountain View, CA, USA, pp 249-258, doi: 10.1145/2034691.2034741
  197. Gipp B, Beel J, Hentschel C (2009) Scienstein: A Research Paper Recommender System. In: Proceedings of the International Conference on Emerging Trends in Computing (ICETiC'09), Kamaraj College of References 237 Engineering and Technology India, IEEE, Virudhunagar (India), pp 309- 315
  198. Gipp B, Taylor A, Beel J (2010) Link Proximity Analysis -Clustering Websites by Examining Link Proximity. In: Lalmas M, Jose J, Rauber A, Sebastiani F, Frommholz I (eds) Proceedings of the 14th European Conference on Digital Libraries (ECDL'10): Research and Advanced Technology for Digital Libraries, Springer, Lecture Notes of Computer Science (LNCS), vol 6273, pp 449-452
  199. Gipp B, Meuschke N, Beel J (2011) Comparative Evaluation of Text-and Citation-based Plagiarism Detection Approaches using GuttenPlag. In: Proceedings of 11th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'11), ACM, Ottawa, Canada, pp 255-258, doi: 10.1145/1998076.1998124
  200. Gipp B, Meuschke N, Breitinger C, Lipinski M, Nürnberger A (2013) Demonstration of the First Citation-based Plagiarism Detection Prototype. In: Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, ACM, Dublin, Ireland, pp 1119-1120, doi: 10.1145/2484028.2484214
  201. Gipp B, Meuschke N, Lipinski M, Nürnberger A (2013) CITREC: An Evaluation Framework for Citation-Based Similarity Measures Based on TREC Genomics and PMC, to be published
  202. Gipp B, Meuschke N, Breitinger C (2014) Citation-based Plagiarism Detection: Practicability on a Large-scale Scientific Corpus. Journal of the American Society for Information Science and Technology
  203. Glänzel W (2003) Bibliometrics as a Research Field -a Course on Theory and Application of Bibliometric Indicators. Course Handout, retrieved Jul. 13, 2010 from: http://nsdl.niscair.res.in/bitstream/123456789/968/1/
  204. Goan T, Fujioka E, Kaneshiro R, Gasch L (2006) Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection. In: Intelligence and Security Informatics, Lecture Notes in Computer Science, vol 3975, Springer, pp 692-693, doi: 10.1007/11760146_93 References
  205. Goldbach-Mansky R, Lee J, McCoy A, Hoxworth J, Yarboro C, Smolen JS, Steiner G, Rosen A, Zhang C, Ménard HA, Zhou Zhi Jie, Palosuo T, Van Venrooij aWR Walther J, Klippel SRH John H, Gabalawy Sani H E (2000) Rheumatoid Arthritis Associated Autoantibodies in Patients with Synovitis of Recent Onset. Arthritis Research 2:236-243, PMID11056669, PMC17811
  206. Griffith BC, Small HG, Stonehill JA, Dey S (1974) The Structure of Scientific Literatures II: toward a Macro-and Microstructure for Science. Science Studies 4(4):339-365
  207. Grman J, Ravas R (2011) Improved Implementation for Finding Text Similarities in Large Collections of Data. In: Notebook Papers of CLEF 2011 LABs and Workshops, Amsterdam, Netherlands
  208. Grose R (2004) Common Ground in the Transcriptional Profiles of Wounds and Tumors. Genome Biology 5:228, PMID15186486, PMC463068
  209. Grozea C, Popescu M (2010) Encoplot -Performance in the Second International Plagiarism Detection Challenge. In: Notebook Papers of CLEF 2010 LABs and Workshops, Padua, Italy
  210. Grozea C, Gehl C, Popescu M (2009) ENCOPLOT: Pairwise Sequence Matching in Linear Time Applied to Plagiarism Detection. In: Proceedings of the 3rd PAN Workshop. Uncovering Plagiarism, References 239 University of Bayreuth, retracted as plagiarism by the University of Bayreuth on May 5, 2011.
  211. GuttenPlag Wiki (2011) Eine kritische Auseinandersetzung mit der Dissertation von Karl-Theodor Freiherr zu Guttenberg: Verfassung und Verfassungsvertrag. Konstitutionelle Entwicklungsstufen in den USA und der EU. Online Source, retrieved Apr. 25, 2012 from: http://- de.guttenplag.wikia.com/wiki/GuttenPlag_Wiki
  212. Gyan S, Sushma S, Maneesh S, Rajesh S, Misra M (2010) Successful microsurgical penile replantation following self amputation in a schizophrenic patient. Indian Journal of Urology 26(3):434-437, doi: 10.4103/0970-1591.70589
  213. Haller S (2003) Das Sanierungsgebiet Hemshof in Ludwigshafen am Rhein: Eine Bilanz von 30 Jahren baulicher Erneuerung und sozialer Veränderung. Dissertation, Faculty of Philosophy III: Educational Science, University of Halle, http://sundoc.bibliothek.uni-halle.de/diss- online/03/06H158/prom.pdf, retracted as plagiarism by the Martin- Luther-University Halle-Wittenberg on Apr. 18, 2012.
  214. Hariharan S, Kamal S, Faisal AVM, Azharudheen SM, Raman B (2010) Detecting Plagiarism in Text Documents. In: Proceedings of the International Conference on Recent Trends in Business Administration and Information Processing, Springer, Trivandrum, Kerala, India, Communications in Computer and Information Science, vol 70, pp 497- 500, doi: 10.1007/978-3-642-12214-9_86
  215. Heather J (2010) Turnitoff: Identifying and Fixing a Hole in Current Plagiarism Detection Software. Assessment & Evaluation in Higher Education 35(6):647-660, doi: 10.1080/02602938.2010.486471
  216. Heinrich-Heine University of Düsseldorf (2013) Der Fakultätsrat der Philosophischen Fakultät. Online, retrieved Apr. 3, 2013 from: http://- www.phil-fak.uni-duesseldorf.de/organisation/fakultaetsrat/
  217. Heinrich-Heine University of Düsseldorf (2013)
  218. Promotionsprüfungsverfahren Prof. Dr. Schavan -Aktuelle Sitzung des Fakultätsrats der Philosophischen Fakultät und Presseerklärung vom References
  219. 02.2013. Press Release, retrieved Feb. 25, 2013 from: http://www.uni- duesseldorf.de/home/startseite/news-detailansicht/article/aktuelle-sitzung- des-fakultaetsrats-der-philosophischen-fakultaet-und-presseerklaerung- vom-0502.html
  220. Heintze N (1996) Scalable Document Fingerprinting. In: 1996 USENIX Workshop on Electronic Commerce
  221. Hetzner E (2008) A Simple Method for Citation Metadata Extraction using Hidden Markov Models. In: Proceedings of the 8th ACM/IEEE-CS Joint Conference on Digital Libraries, ACM, pp 280-284, doi: 10.1145/1378889.1378937
  222. Heun M (2007) Finanzmarktsimulation mit Multiagentensystemen: Entwicklung eines methodischen Frameworks. Deutscher Universitäts- Verlag
  223. Hill JD, Page EF (2009) An Empirical Research Study of the Efficacy of Two Plagiarism-Detection Applications. Journal of Web Librarianship 3(3):169-181, doi: 10.1080/19322900903051011
  224. Hoad TC, Zobel J (2003) Methods for Identifying Versioned and Plagiarised Documents. Journal of the American Society for Information Science and Technology 54(3):203-215, doi: 10.1002/asi.10170
  225. Hohenester S, Oude Elferink RPJ, Beuers U (2009) Primary Biliary Cirrhosis. Seminars in Immunopathology 31:283-307, PMID19603170, PMC2758170
  226. Holmes DI (1998) The Evolution of Stylometry in Humanities Scholarship. Literary and Linguistic Computing 13(3):111-117, doi: 10.1093/llc/13.3.111, http://llc.oxfordjournals.org/content/13/3/111.full.pdf+html
  227. Howard RM (2007) Understanding "Internet plagiarism". Computers and Composition 24(1):3-15, doi: 10.1016/j.compcom.2006.12.005
  228. Hrisos S, Eccles MP, Francis JJ, Dickinson HO, Kaner EF, Beyer F, Johnston M (2009) Are There Valid Proxy Measures of Clinical Behaviour? A Systematic Review. Implementation Science 4:37, PMID19575790, PMC2713194
  229. Integru (2012) Review 6: Aurelia Cristina Nechifor, Ecaterina Andronescu (minister of research), 2003 -plagiarism and falsification of data. Online Source, retrieved Feb. 28, 2013 from: http://integru.org/- reviews/andronescu-2003
  230. iParadigms LLC (2013) Turnitin Webpage -Content. Online Source, retrieved Feb. 28, 2013 from: http://turnitin.com/en_us/products/- originalitycheck/content
  231. Jalel A, Soumaya GS, Hamdaoui MH (2009) Dermatology Life Quality Index Scores in Vitiligo: Reliability and Validity of the Tunesian Version. Indian Journal of Dermatology 54(4):3-330, doi: 10.4103/0019- 5154.57607, PMID20101332, PMC2807707
  232. Janssens F, Tran Quoc V, Glänzel W, De Moor B (2006) Integration of Textual Content and Link Information for Accurate Clustering of Science Fields. In: Proceedings of the I International Conference on Multidisciplinary Information Sciences & Technologies, pp 615-619
  233. Janssens F, Zhang L, De Moor B, Glänzel W (2009) Hybrid Clustering for Validation and Improvement of Subject-classification Schemes. Information Processing and Management 45:683-702, doi: 10.1016/j.ipm.2009.06.003
  234. Jarneving B (2005) A Comparison of Two Bibliometric Methods for Mapping of the Research Front. Scientometrics 65(2):245-263
  235. Juola P (2008) Authorship Attribution. Foundations and Trends Information Retrieval 1:233-334, doi: 10.1561/1500000005
  236. Kakkonen T, Mozgovoy M (2010) Hermetic and Web Plagiarism Detection Systems for Student Essays -an Evaluation of the State-of- the-Art. Journal of Educational Computing Research 42(2):135-159, doi: 10.2190/EC.42.2.a
  237. Kang N, Gelbukh A, Han S (2006) PPChecker: Plagiarism Pattern Checker in Document Copy Detection. In: Text, Speech and Dialogue, Lecture Notes in Computer Science, vol 4188, Springer, pp 661-667, doi: 10.1007/11846406_83
  238. Kasprzak J, Brandejs M (2010) Improving the Reliability of the Plagiarism Detection System -Lab Report for PAN at CLEF 2010. In: Notebook Papers of CLEF 2010 LABs and Workshops, Padua, Italy
  239. Kasprzak J, Brandejs M, Kripac M (2009) Finding Plagiarism by Evaluating Document Similarities. In: Proceedings of the 3rd PAN Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse
  240. Kessler MM (1963) An Experimental Study of Bibliographic Coupling Between Technical Papers. IEEE Transactions on Information Theory 9:49-51
  241. Khmelev DV, Teahan WJ (2003) A Repetition Based Measure for Verification of Text Collections and for Text Categorization. In: Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, pp 104-110, doi: 10.1145/860435.860456
  242. Kidwell LA, Wozniak K, Laurel JP (2003) Student Reports and Faculty Perceptions of Academic Dishonesty. Teaching Business Ethics 7:205- 214, doi: 10.1023/A:1025008818338
  243. Ko P, Aluru S (2003) Space Efficient Linear Time Construction of Suffix Arrays. Journal of Discrete Algorithms 2676:200-210, doi: 10.1007/3- 540-44888-8_15
  244. Koppel M, Schler J, Argamon S (2011) Authorship Attribution in the Wild. Language Resources and Evaluation 45(1):83-94, doi: 10.1007/s10579-009-9111-2
  245. Kreider R, Almada A, Antonio J, Broeder C, Earnest C, Greenwood M, Incledon T, Kalman D, Kleiner S, Leutholtz B, Lowery L, Mendel R, Stout J, Willoughby D, Ziegenfuss T (2004) ISSN Exercise & Sport Nutrition Review: Research & Recommendations. Journal of the International Society of Sports Nutrition 1(1):1-44, doi: 10.1186/1550- 2783-1-1-1, PMC2129137
  246. Kreider RB, Wilborn CD, Taylor L, Campbell B, Almada AL, Collins R, Cooke M, Earnest CP, Greenwood M, Kalman DS, Kerksick CM, Kleiner SM, Leutholtz B, Lopez H, Lowery LM, Mendel R, Smith A, Spano M, Wildman R, Willoughby DS, Ziegenfuss TN, Antonio J (2010) ISSN Exercise & Sport Nutrition Review: Research & Recommendations. Journal of the International Society of Sports Nutrition 7:7, PMID20181066, PMC2853497
  247. Kulkarni AP, Agarwal V (2008) Extubation failure in intensive care unit: Predictors and management. Indian Journal of Critical Care Medicine 12(1):1-9, doi: 10.4103/0972-5229.40942, PMID19826583, PMC2760915
  248. Kumagi T, Heathcote EJ (2008) Primary Biliary Cirrhosis. Orphanet Journal of Rare Diseases 3:1
  249. Kurtz S (1999) Reducing the Space Requirement of Suffix Trees. Software-Practice and Experience 29(13):1149-1171, doi: 10.1002/(SICI)1097-024X(199911)29:13<1149::AID-SPE274>3.0.CO;2- O
  250. Lachlan P (2012) The Sherlock Plagiarism Detector. Online Source, retrieved Jul. 11, 2012 from: http://sydney.edu.au/engineering/it/~scilect/- sherlock/
  251. Lancaster T (2003) Effective and Efficient Plagiarism Detection. Phd thesis, School of Computing, Information Systems and Mathematics, South Bank University, retrieved on Jul. 9, 2013 from http://- academia.edu/168972/Effective_and_Efficient_Plagiarism_Detection
  252. Lane P (2011) Ferret Copy Detection Software. Online Source, retrieved Oct. 1, 2011 from: http://homepages.feis.herts.ac.uk/~comqpcl/ferret.html
  253. Larsen B (2004) References and citations in automatic indexing and retrieval systems -experiments with the boomerang effect. PhD thesis, Department of Information Studies, Royal School of Library and Information Science, Copenhagen
  254. LeBaron B (2005) Agent-based Computational Finance. In: Handbook of Computational Economics, International Business School, Brandeis University, retrieved May 28, 2013 from: people.brandeis.edu/~blebaron/- wps/hbook.pdf References
  255. Leucht S, Kissling W, Davis JM (2009) How to Read and Understand and Use Systematic Reviews and Meta-analyses. Acta Psychiatrica Scandinavica 119(6):443-450, doi: 10.1111/j.1600-0447.2009.01388.x
  256. Leung CH, Chan YY (2007) A Natural Language Processing Approach to Automatic Plagiarism Detection. In: Proceedings of the 8th ACM SIGITE Conference on Information Technology Education, ACM, pp 213-218, doi: 10.1145/1324302.1324348
  257. Lewis J, Ossowski S, Hicks J, Errami M, Garner HR (2006) Text Similarity: an Alternative Way to Search Medline. Bioinformatics 22(18):2298-2304, doi: 10.1093/bioinformatics/btl388
  258. Liberati A, Altman DG, Tetzlaff J, Mulrow C, Gøtzsche PC, Ioannidis JP, Clarke M, Devereaux PJ, Kleijnen J, Moher D (2009) The Prisma Statement for Reporting Systematic Reviews and Meta-analyses of Studies that Evaluate Healthcare Interventions: Explanation and Elaboration. BMJ 339:1-27, PMID19189221, PMC2764094
  259. Liberati A, Altman DG, Tetzlaff J, Mulrow C, Gøtzsche PC, Ioannidis JP, Clarke M, Devereaux PJ, Kleijnen J, Moher D (2009) The Prisma Statement for Reporting Systematic Reviews and Meta-analyses of Studies that Evaluate Health Care Interventions: Explanation and Elaboration. PLoS Medicine 6:1-28, doi: e1000100. doi:10.1371/journal.pmed.1000100, PMID19192942, PMC2634792
  260. Lim VKG, See SKB (2001) Attitudes toward, and Intentions to Report, Academic Cheating among Students in Singapore. Ethics & Behavior 11(3):261-274, doi: 10.1207/S15327019EB1103_5
  261. Lipinski M, Yao K, Breitinger C, Beel J, Gipp B (2013) Evaluation of Header Metadata Extraction Approaches and Tools for Scientific PDF Documents. In: Proceedings of the 13th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL), ACM, New York, NY, USA, pp 385-386, doi: 10.1145/2467696.2467753, http://doi.acm.org/10.1145/- 2467696.2467753
  262. Little J, Higgins JP, Ioannidis JP, Moher D, Gagnon F, von Elm E, Khoury MJ, Cohen B, Davey Smith G, Grimshaw J, Scheet P, Gwinn M, Williamson RE, Zou GY, Hutchings K, Johnson CY, Tait V, Wiens M, Golding J, van Duijn C, McLaughlin J, Paterson A, Wells G, Fortier I, Freedman M, Zecevic M, King R, Infante Rivard C, Stewart A, Birkett N (2009) Strengthening the Reporting of Genetic Association Studies (STREGA): an Extension of the STROBE Statement. PLoS Med 6:1-13, doi: 10.1371/journal.pmed.1000022, PMID19192942, PMC2634792
  263. Little J, Higgins JP, Ioannidis JP, Moher D, Gagnon F, von Elm E, Khoury MJ, Cohen B, Davey Smith G, Grimshaw J, Scheet P, Gwinn M, Williamson RE, Zou GY, Hutchings K, Johnson CY, Tait V, Wiens M, Golding J, van Duijn C, McLaughlin J, Paterson A, Wells G, Fortier I, Freedman M, Zecevic M, King R, Infante Rivard C, Stewart A, Birkett N (2009) Strengthening the Reporting of Genetic Association Studies (STREGA): an Extension of the STROBE Statement. Eur J Epidemiol 24:37-55, PMID19189221, PMC2764094
  264. Liu S, Chen C (2011) The Effects of Co-citation Proximity on Co-citation Analysis. In: Proceedings of the Conference of the International Society for Scientometrics and Informetrics
  265. Liu S, Chen C (2012) The Proximity of Co-Citation. Scientometrics 91(2):495-511, doi: 10.1007/s11192-011-0575-7
  266. Liu X, Yu S, Moreau Y, De Moor B, Glänzel W, Janssens FAL (2009) Hybrid Clustering of Text Mining and Bibliometrics Applied to Journal Sets. In: Proceedings of the SIAM International Conference on Data Mining, Sparks, NV, USA, pp 49-60
  267. Liu X, Yu S, Janssens FAL, Glänzel W, Moreau Y, De Moor B (2010) Weighted Hybrid Clustering by Combining Text Mining and Bibliometrics on a Large-Scale Journal Database. Journal of the American Society for Information Science and Technology 61(6):1105- 1119, doi: 10.1002/asi.21312
  268. Long TC, Errami M, George AC, Sun Z, Garner HR (2009) Responding to Possible Plagiarism. Science 323(5919):1293-1294, doi: 10.1126/science.1167408, http://www.sciencemag.org/content/323/5919/1293.full.pdf References
  269. Lyon C, Malcolm J, Dickerson B (2001) Detecting Short Passages of Similar Text in Large Document Collections. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp 118-125
  270. Lyon C, Barrett R, Malcolm J (2003) Experiments in Electronic Plagiarism Detection Computer Science Department. Tech. Rep. TR 388, School of Computer Science, University of Hertfordshire
  271. MacPherson H, Altman DG, Hammerschlag R, Li Y, Wu T, White A, Moher D, Altman DG, Moher D, MacPherson H, Hammerschlag R, Li Y, Wu T, Birch S, Boutron I, Bovey M, Fei Y, Gagnier J, Hopewell S, Hopwood V, Jena S, Linde K, Liu J, Trinh K, Veitch E, White A, Yamashita H (2010) Revised Standards for Reporting Interventions in Clinical Trials of Acupuncture (STRICTA): Extending the CONSORT Statement. Acupunct Med 28:83-93, PMID20615861, PMC3002761
  272. MacPherson H, Altman DG, Hammerschlag R, Youping L, Taixiang W, White A, Moher D, Burton A, Hopton A, Jenna S, Prady S, Stuardi T, Altman D, Moher D, MacPherson H, Hammerschlag R, Youping L, Taixiang W, Bovey M, Hopwood V, White A, Anastasi J, Birch S, Bosco J, Citkovitz C, Coeytaux R, Cohen M, Colbert A, Elden H, Filho RdeC, Forbes A, Foster N, Gagnier J, Goldby M, Gronlund M, Harris R, Irnich D, Langevin H, Lixing L, Lee A, Hyangsook L, Myeongsoo L, Sanghoon L, Lewith G, Linde K, Liu J, Milley R, Mist S, Melchart D, Molsberger A, Napadow V, Niemtzow R, Jongbae P, Saghaei M, Saputra K, Schnyer R, Shang C, Sherman K, Byung Cheul S, Smith C, Stener Victorin E, Trinh K, Vas J, Vickers A, White P, Witt C, Yamashita H, Zaslawski C, Birch S, Boutron I, Bovey M, Yutong F, Gagnier J, Hopewell S, Hopwood V, Jena S, Linde K, Jianping L, Trinh K, Veitch E, White A, Yamashita H (2010) Revised Standards for Reporting Interventions in Clinical Trials of Acupuncture (STRICTA): Extending the CONSORT Statement. PLoS Medicine 7:1-11, doi: 10.1371/journal.pmed.1000261, PMID20543992, PMC2882429
  273. Malthan D (2011) PlagAware. Online Source, retrieved Oct. 1, 2011 from: http://www.plagaware.com
  274. Manber U (1994) Finding Similar Files in a Large File System. In: Proceedings of the USENIX Winter Technical Conference, USENIX Association, Berkeley, CA, USA, pp 2-11
  275. Manning CD, Raghavan P, Schütze H (2009) An Introduction to Information Retrieval, online edition edn. Cambridge University Press, Cambridge, England
  276. Markram H, Rinaldi T, Markram K (2007) The Intense World Syndrome -an Alternative Hypothesis for Autism. Frontiers in Neuroscience 1:77- 96
  277. Markram K, Markram H (2010) The Intense World Theory -a Unifying Theory of the Neurobiology of Autism. Frontiers in Human Neuroscience 4:224, PMID21191475, PMC3010743
  278. Marsden H, Carroll M, Neill JT (2005) Who Cheats At University? a Self-report Study of Dishonest Academic Behaviours in a Sample of Australian University Students. Australian Journal of Psychology 57(1):1-10, doi: 10.1080/00049530412331283426
  279. Marshakova-Shaikevich I (1973) System of Document Connections Based on References. Scientific and Technical Information Serial of VINITI 6(2):3-8
  280. Martin B (2007) Obstacles to Academic Integrity. In: Proceedings of the 3rd Asia-Pacific Conference on Educational Integrity, University of South Australia, Adelaide, pp 21-26
  281. Martinson BC, Anderson MS (2005) Scientists Behaving Badly. Nature 435(7043):737-738, doi: 10.1038/435737a
  282. Martyn J (1964) Bibliographic coupling. Journal of Documentation 20(4):236, doi: 10.1108/eb026352
  283. Mathers C, Murray C (2003) Introduction of article-processing charges for Population Health Metrics. Population Health Metrics 1(1:8), doi: 10.1186/1478-7954-1-8, PMID14613521, PMC272941 References
  284. Maurer H, Zaka B (2007) Plagiarism -a Problem and How to Fight It. In: Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications, AACE, Vancouver, Canada, pp 4451-4458
  285. Maurer H, Kappe F, Zaka B (2006) Plagiarism -a Survey. Journal of Universal Computer Science 12(8):1050-1084, doi: 10.3217/jucs-012-08- 1050
  286. McCabe DL (2005) Cheating among College and University Students: A North American Perspective. International Journal for Academic Integrity 1(1):1-11
  287. McCabe DL, Trevino LK (1993) Academic Dishonesty: Honor Codes and Other Contextual Influences. The Journal of Higher Education 64(5):522- 538
  288. McCabe DL, Trevino LK (1996) What We Know about Cheating in College: Longitudinal Trends and Recent Developments. Change 28(1):28-33
  289. McCabe DL, Butterfield KD, Trevino LK (2006) Academic Dishonesty in Graduate Business Programs: Prevalence, Causes, and Proposed Action. Academy of Management Learning and Education 5(3):294
  290. Mcnamee P, Mayfield J (2004) Character N-Gram Tokenization for European Language Text Retrieval. Information Retrieval 7:73-97, doi: 10.1023/B:INRT.0000009441.78971.be
  291. Meho L, Yang K (2007) Impact of data sources on citation counts and rankings of LIS faculty: Web of Science vs. Scopus and Google Scholar. Journal of the American Society for Information Science and Technology 58(13):2105-25
  292. Koch Mehrin S (2001) Historische Währungsunion zwischen Wirtschaft und Politik : die Lateinische Münzunion 1865 -1927. Dissertation, Faculty of Philosophy, University of Heidelberg, retracted as plagiarism by the University of Heidelberg on Jun. 15, 2011.
  293. Merton RK (1968) The Matthew Effect in Science. Science 159(3810):56-63, doi: 10.1126/science.159.3810.56
  294. Meuschke N, Gipp B (2013) State of the Art in Detecting Academic Plagiarism. International Journal for Educational Integrity 9(1):50-71
  295. Meuschke N, Gipp B, Breitinger C (2012) CitePlag: A Citation-based Plagiarism Detection System Prototype. In: Proceedings of the 5th International Plagiarism Conference, Newcastle upon Tyne, UK
  296. Micol D, Ferrández Ó, Llopis F, Muñoz R (2010) A Textual-Based Similarity Approach for Efficient and Scalable External Plagiarism Analysis -Lab Report for PAN at CLEF 2010. In: CLEF (Notebook Papers/LABs/Workshops)
  297. Miller G, Charles W (1991) Contextual correlates of semantic similarity. Language and cognitive processes 6(1):1-28
  298. Monostori K, Zaslavsky A, Schmidt H (2000) Document Overlap Detection System for Distributed Digital Libraries. In: Proceedings of the 5th ACM Conference on Digital Libraries, ACM, pp 226-227, doi: 10.1145/336597.336667
  299. Monostori K, Zaslavsky A, Bia A (2001) Using the MatchDetectReveal System for Comparative Analysis of Texts. In: Proceedings of the 6th Australasian Document Computing Symposium, Coffs Harbour, Australia, pp 51-58
  300. Monostori K, Zaslavsky A, Schmidt H (2001) Efficiency of Data Structures for Detecting Overlaps in Digital Documents. Australian Computer Science Communications 23:140-147
  301. Monostori K, Finkel R, Zaslavsky A, Hodász G, Pataki M (2002) Comparison of Overlap Detection Techniques. In: Proceedings of the International Conference on Computational Science, Springer, Amsterdam, Netherlands, Lecture Notes in Computer Science, vol 2329, pp 51-60
  302. Monostori K, Zaslavsky A, Schmidt H (2002) Suffix Vector: Space-and Time-efficient Alternative to Suffix Trees. Australian Computer Science Communications 24(1):157-165, doi: 10.1145/563857.563820
  303. Garnacho Montero J, Amaya Villar R (2006) A validated clinical approach for the management of aspergillosis in critically ill patients: References ready, steady, go! Critical Care 10(2):132-133, doi: 10.1186/cc4860, PMID16584528, PMC1550917
  304. Muhr M, Zechner R Mario Kern, Granitzer M (2009) External and Intrinsic Plagiarism Detection Using Vector Space Models. In: Proceedings of the 3rd PAN Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse, pp 47-55
  305. Muhr M, Kern R, Zechner M, Granitzer M (2010) External and Intrinsic Plagiarism Detection Using a Cross-Lingual Retrieval and Segmentation System -Lab Report for PAN at CLEF 2010. In: Notebook Papers of CLEF 2010 LABs and Workshops, Padua, Italy
  306. Neville LM, O'Hara B, Milat AJ (2009) Computer-tailored Dietary Behaviour Change Interventions: A Systematic Review. Health Education Research 24:699-720, PMID19286893, PMC2706490
  307. Neville LM, O'Hara B, Milat AJ (2009) Computer-tailored Physical Activity Behavior Change Interventions Targeting Adults: a Systematic Review. The International Journal of Behavioral Nutrition and Physical Activity 6:30, PMID19490649, PMC2700068
  308. Nikolaou C, Althammer S, Beato M, Guigo R (2010) Structural Constraints Revealed in Consistent Nucleosome Positions in the Genome of S. Cerevisiae. Epigenetics Chromatin 3:20, PMID21073701, PMC2994855
  309. Norwegian Board of Health Supervision (2007) Case involving scientific fraud 2005-2006. Press Release, retrieved Oct. 31, 2012 from: http://- www.helsetilsynet.no/no/Norwegian-Board-of-Health-Supervision/- Decisions-in-individual-cases/Case-involving-scientific-fraud-2005-2006/
  310. Noyons E, van Raan A (1994) Bibliometric Cartography of Scientific and Technological Developments of an R & D Field. Scientometrics 30:157- 173, doi: 10.1007/BF02017220
  311. Oberreuter G, L'Huillier G, Ríos SA, Velásquez JD (2010) FastDocode: Finding Approximated Segments of N-Grams for Document Copy Detection. In: Notebook Papers of CLEF 2010 LABs and Workshops, Padua, Italy
  312. Oberreuter G, L'Huillier G, Ríos SA, Velásquez JD (2011) Approaches for Intrinsic and External Plagiarism Detection. In: Notebook Papers of CLEF 2011 LABs and Workshops, Amsterdam, Netherlands
  313. O'Shea J, Bandar Z, Crockett K, McLean D (2008) A Comparative Study of Two Short Text Semantic Similarity Measures. In: Proceedings of the 2nd KES International Conference on Agent and Multi-agent Systems, Springer, pp 172-181
  314. Palkovskii Y (2009) "Counter Plagiarism Detection Software" and "Counter Counter Plagiarism Detection" Methods. In: Proceedings of the 3rd Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse and 1st International Competition on Plagiarism Detection
  315. Papadakis MA, Wofsy D (2010) Plagiarism on Personal Statements: a Disturbing Symptom of a Broader Trend. Annals of Internal Medicine 153(2):128-129
  316. Park C (2003) In Other Peoples Words: Plagiarism by University Students -Literature and Lessons. Assessment Evaluation in Higher Education 28(5):471-488, doi: 10.1080/02602930301677
  317. Pawelzik B (2005) Algorithmen zur Plagiaterkennung. Student research project, Technische Universität Braunschweig Institut für Betriebssysteme und Rechnerverbund
  318. Pera MS, Ng YK (2011) SimPaD: a Word-Similarity Sentence-Based Plagiarism Detection Tool on Web Documents. Web Intelligence and Agent Systems 9(1):24-41, doi: 10.3233/WIA-2011-0203
  319. Pereira ARJ, Ziviani N (2004) Retrieving Similar Documents from the Web. Journal of Web Engineering 2(4):247-261
  320. Pertsemlidis A, Garner H (2004) Engineering in Genomics: Text Comparison Based on Dynamic Programming. IEEE Engineering in Medicine and Biology Magazine 23(6):66-71, doi: 10.1109/MEMB.2004.1378640
  321. Phelan T (1999) A Compendium of Issues for Citation Analysis. Scientometrics 45:117-136, doi: 10.1007/BF02458472 References
  322. Piao S, Tsuruoka Y (2008) A Highly Accurate Sentence and Paragraph Breaker. Online Source, retrieved Jan. 28, 2011 from: http://- text0.mib.man.ac.uk:8080/scottpiao/sent_detector
  323. Pinto D, Civera J, Barrón Cedeño A, Juan A, Rosso P (2009) A Statistical Approach to Crosslingual Natural Language Tasks. Journal of Algorithms 64(1):51-60, doi: 10.1016/j.jalgor.2009.02.005
  324. Potsdamer Neuste Nachrichten Online (2012) Plagiatsstreit an der BTU um Vattenfall-Chef. Online Source, retrieved Aug. 2, 2012 from http://- www.pnn.de/brandenburg-berlin/663296/
  325. Potthast M, Stein B, Anderka M (2008) A Wikipedia-based Multilingual Retrieval Model. In: Proceedings of the 30th European Conference on Advances in Information Retrieval, Springer, pp 522-530
  326. Potthast M, Stein B, Eiselt A, Barrón Cedeño A, Rosso P (2009) Overview of the 1st International Competition on Plagiarism Detection. In: Proceedings of the 3rd Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse and 1st International Competition on Plagiarism Detection, vol 502, pp 1-9
  327. Potthast M, Barrón Cedeño A, Eiselt A, Stein B, Rosso P (2010) Overview of the 2nd International Competition on Plagiarism Detection. In: Notebook Papers of CLEF 2010 LABs and Workshops, Padua, Italy
  328. Potthast M, Stein B, Barrón Cedeño A, Rosso P (2010) An Evaluation Framework for Plagiarism Detection. In: Proceedings of the 23rd International Conference on Computational Linguistics, Association for Computational Linguistics, Beijing, China, pp 997-1005
  329. Potthast M, Barrón Cedeño A, Stein B, Rosso P (2011) Cross-language Plagiarism Detection. Language Resources and Evaluation 45(1):45-62, doi: 10.1007/s10579-009-9114-z
  330. Potthast M, Eiselt A, Barrón-Cedeño A, Stein B, Rosso P (2011) Overview of the 3rd International Competition on Plagiarism Detection. In: Notebook Papers of CLEF 2011 LABs and Workshops, Amsterdam, Netherlands
  331. Potthast M, Gollub T, Hagen M, Kiesel J, Michel M, Oberländer A, Tippmann M, Barrón Cedeño A, Gupta P, Rosso P, Stein B (2012) Overview of the 4th International Competition on Plagiarism Detection. In: CLEF 2012 Evaluation Labs and Workshop -Working Notes Papers, http://www.uni-weimar.de/medien/webis/research/events/pan-12/pan12- web/index.html
  332. Pouliquen B, Steinberger R, Ignat C (2003) Automatic Identification of Document Translations in Large Multilingual Document Collections. In: Proceedings of the International Conference Recent Advances in Natural Language Processing, pp 401-408
  333. Prechelt L, Philippsen M, Malpohl G (2000) JPlag: Finding Plagiarisms among a Set of Programs. Technical Report 2000-1, Universität Karlsruhe, Fakultät für Informatik, Germany
  334. Oxford University Press (2009) A Dictionary of Psychology [electronic resource]. Oxford Reference Online, Oxford University Press, http://- www.oxfordreference.com/
  335. Price AR (2006) Cases of Plagiarism Handled by the United States Office of Research Integrity 1992-2005. Plagiary: Cross-Disciplinary Studies in Plagiarism, Fabrication, and Falsification 1:46-56
  336. Solla Price DJd (1965) Networks of Scientific Papers. Science 149(3683):510-515, doi: 10.1126/science.149.3683.510
  337. PrioInfo AB (2011) URKUND. Online Source, retrieved Oct. 1, 2011 from: http://www.urkund.com
  338. Project SAX (2004) Simple API for XML (SAX). Online Source, retrieved May 29, 2012 from: http://www.saxproject.org/
  339. Rakovski CC, Levy ES (2007) Academic Dishonesty: Perceptions of Business Students. College Student Journal 41(2):466
  340. Ran EY, Mordechai N (2007) Optimal Single-Class Classification Strategies. In: Proceedings of the 20th Annual Conference on Neural Information Processing Systems, MIT Press, Vancouver, Canada, pp 377-384 References
  341. Razera D, Verhagen H, Cerratto Pargman T, Ramberg R (2010) Plagiarism Awareness, Perception, and Attitudes among Students and Teachers in Swedish Higher Education -A Case Study. In: Proceedings of the 4th International Plagiarism Conference, Newcastle upon Tyne, UK
  342. Resnik P (1999) Semantic Similarity in a Taxonomy: An Information- Based Measure and its Application to Problems of Ambiguity in Natural Language. Journal of Artificial Intelligence Research 11:95-130
  343. Roberts P, Anderson J, Yanish P (1997) Academic Misconduct: Where Do We Start? Paper presented at the Annual Conference of the Northern Rocky Mountain Educational Research Association, retrieved Oct. 25, 2010 from: http://www.eric.ed.gov/ERICWebPortal/search/- permalinkPopup.jsp?accno=ED415781
  344. Rossaint R, Bouillon B, Cerny V, Coats TJ, Duranteau J, Fernandez Mondejar E, Hunt BJ, Komadina R, Nardi G, Neugebauer E, Ozier Y, Riddez L, Schultz A, Stahel PF, Vincent JL, Spahn DR (2010) Management of bleeding following major trauma: an updated European guideline. Critical Care 14:R52, PMID20370902, PMC2887168
  345. Rudman J (1997) The State of Authorship Attribution Studies: Some Problems and Solutions. Computers and the Humanities 31:351-365, doi: 10.1023/A:1001018624850
  346. Saß V (2009) Regulierung im Mobilfunk. Dissertation, Department of Law, University of Konstanz, http://d-nb.info/99505147X, retracted as plagiarism by the University of Konstanz on May 11, 2011.
  347. Sarkar S, Bhattacharya P, Kumar I, Mandal K (2009) Changes of splanchnic perfusion after applying positive end expiratory pressure in patients with acute respiratory distress syndrome. Indian Journal of Critical Care Medicine 13(1):12-16, doi: 10.4103/0972-5229.53109, PMID19881173, PMC2772258
  348. Scaife B (2007) IT Consultancy Plagiarism Detection Software Report for JISC Plagiarism Advisory Service. Tech. rep., Joint Information System Committee
  349. Scanlon PM, Neumann DR (2002) Internet Plagiarism among College Students. Journal of College Student Development 43(3):374-385
  350. Scheers NJ, Dayton CM (1987) Improved Estimation of Academic Cheating Behavior Using the Randomized Response Technique. Research in Higher Education 26:61-69, doi: 10.1007/BF00991933
  351. Scherbinin V, Butakov S (2009) Using Microsoft SQL Server Platform for Plagiarism Detection. In: Proceedings of the 3rd PAN Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse
  352. Schleimer S, Wilkerson DS, Aiken A (2003) Winnowing: Local Algorithms for Document Fingerprinting. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, ACM, pp 76-85, doi: 10.1145/872757.872770
  353. Scott D, Palmer R (2003) The Influence of Tobacco Smoking on Adhesion Molecule Profiles. Tobacco Induced Diseases 1:7-25, PMID19570245, PMC2669563
  354. Scott D, Palmer R (2003) The Influence of Tobacco Smoking on Adhesion Molecule Profiles. Tobacco Induced Diseases 1:7-25, PMID19570245, PMC2671531
  355. Scott JE (2004) The Pulmonary Surfactant: Impact of Tobacco Smoke and Related Compounds on Surfactant and Lung Development. Tobacco Induced Diseases 2:3-25, PMID19570267, PMC2669453
  356. Scott JE (2004) The Pulmonary Surfactant: Impact of Tobacco Smoke and Related Compounds on Surfactant and Lung Development. Tobacco Induced Diseases 2(1):3-25, PMID19570267, PMC2671518
  357. Seglen PO (1997) Why the Impact Factor of Journals Should Not Be Used for Evaluating Research. BMJ 314(7079):497
  358. Semmelweis University of Budapest (2012) University Senate Revokes Pál Schmitt's Doctoral (Dr. Univ.) Title. Press Release, retrieved Mar. 30, 2012 from: http://www.semmelweis-univ.hu/news/2556/university- senate-revokes-pal-schmitt%E2%80%99s-doctoral-dr-univ-title/
  359. Shen Y, Li SC, Tian CG, Cheng M (2009) Research on Anti-Plagiarism System and the Law of Plagiarism. In: Proceedings of the 1st References International Workshop on Education Technology and Computer Science, pp 296-300, doi: 10.1109/ETCS.2009.327
  360. Sher IH, Garfield E (1966) New Tools for Improving and Evaluating the Effectiveness of Science. In: Proceedings of the Conference on Research Program Effectiveness, Gordon and Breach, Washington, D.C., USA, pp 135-146
  361. Shibata N, Kajikawa Y, Takeda Y, Matsushima K (2009) Comparative Study on Methods of Detecting Research Fronts Using Different Types of Citation. Journal of the American Society for Information Science and Technology 60:571-580, doi: 10.1002/asi.v60:3
  362. Shidham VB, Pitman MB, Demay RM, Atkinson BF (2008) CytoJournal's move to the new platform: More on financial model to the support open-access charter in cytopathology, publication quality indicators, and other issues. Cytojournal 5(15), doi: 10.4103/1742- 6413.44572, PMID19495401, PMC2669682
  363. Shivakumar N, Garcia Molina H (1995) SCAM a Copy Detection Mechanism for Digital Documents. In: Proceedings of the 2nd Annual Conference on the Theory and Practice of Digital Libraries, Austin, TX, USA
  364. Shivakumar N, Garcia Molina H (1996) Building a Scalable and Accurate Copy Detection Mechanism. In: Proceedings of the 1st ACM International Conference on Digital Libraries, ACM, pp 160-168, doi: 10.1145/226931.226961
  365. Si A, Leong V Hong, Lau RWH (1997) CHECK: a Document Plagiarism Detection System. In: Proceedings of the ACM Symposium on Applied Computing, ACM, pp 70-77, doi: 10.1145/331697.335176
  366. SkyLine Inc (2011) Plagiarism Detector. Online Source, retrieved Oct. 1, 2011 from: http://www.plagiarism-detector.com
  367. Small H (1973) Co-citation in the Scientific Literature: A New Measure of the Relationship Between Two Documents. Journal of the American Society for Information Science 24:265-269
  368. Small H, Griffith BC (1974) The Structure of Scientific Literatures I: Identifying and Graphing Specialties. Science Studies 4(1):17-40
  369. Smith H, Ridgway J (2008) Why Students Cheat (In Their Own Words as Well as those of Others). In: Proceedings of the 3rd International Plagiarism Conference, Newcastle upon Tyne, UK
  370. Smith LC (1981) Citation Analysis. Library Trends 30(1):83-106
  371. Smyth B (2003) Computing Patterns in Strings. Pearson Addison-Wesley, Harlow, England; New York
  372. Snapper JW (1999) On the Web, Plagiarism Matters More Than Copyright Piracy. Ethics and Information Technology 1:127-135, doi: 10.1023/A:1010083703905
  373. Sorokina D, Gehrke J, Warner S, Ginsparg P (2006) Plagiarism Detection in arXiv. Technical report computer science, Cornell University, TR2006- 2046
  374. Spahn DR, Cerny V, Coats TJ, Duranteau J, Fernandez Mondejar E, Gordini G, Stahel PF, Hunt BJ, Komadina R, Neugebauer E, Ozier Y, Riddez L, Schultz A, Vincent JL, Rossaint R (2007) Management of Bleeding Following Major Trauma: a European Guideline. Critical Care 11:R17, PMID17298665, PMC2151863
  375. Spiegel Online (2013) Titelentzug vor Gericht: Schavan hat Klage eingereicht. Online Source, retrieved Feb. 21, 2013 from: http://- www.spiegel.de/unispiegel/studium/schavan-reichte-klage-gegen-entzug- des-doktortitels-ein-a-884435.html
  376. Stamatatos E (2009) A Survey of Modern Authorship Attribution Methods. Journal of the American Society for Information Science and Technology 60(3):538-556, doi: 10.1002/asi.21001
  377. Stamatatos E (2009) Intrinsic Plagiarism Detection Using Character n- gram Profiles. In: Proceedings of the 3rd PAN Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse
  378. Stamatatos E (2011) Plagiarism Detection Using Stopword N-grams. Journal of the American Society for Information Science and Technology 62(12):2512-2527, doi: 10.1002/asi.21630 References
  379. Standler RB (2001) Plagiarism in Colleges in USA. Online Source, retrieved Oct. 27, 2011 from: http://www.rbs2.com/plag.htm
  380. Stanford Natural Language Processing Group (2010) Stanford CoreNLP - a Suite of Core NLP Tools. Online Source, retrieved May 29, 2011 from: http://nlp.stanford.edu/software/corenlp.shtml
  381. Steen RG (2011) Retractions in the Medical Literature: How Many Patients are Put at Risk by Flawed Research? Journal of Medical Ethics 37:688-692, doi: 10.1136/jme.2011.043133
  382. Stein B, Meyer zu Eissen S (2006) Near Similarity Search and Plagiarism Analysis. In: Proceedings of the 29th Annual Conference of the Gesellschaft für Klassifikation e.V., Springer, Magdeburg, pp 430-437, doi: 10.1007/3-540-31314-1_52
  383. Stein B, Meyer zu Eissen S, Potthast M (2007) Strategies for Retrieving Plagiarized Documents. In: Proceedings of the 30th Annual International ACM SIGIR Conference, ACM, pp 825-826, doi: 10.1145/1277741.1277928
  384. Stein B, Koppel M, Stamatatos E (eds) (2007) Plagiarism Analysis Authorship Identification, and Near Duplicate Detection, CEUR Workshop Proceedings, vol 276, CEUR-WS.org, in Proceedings of the SIGIR 2007 International Workshop, held in conjunction with the 30th Annual International ACM SIGIR Conference, Amsterdam, Netherlands
  385. Stein B, Lipka N, Prettenhofer P (2011) Intrinsic Plagiarism Analysis. Language Resources and Evaluation 45(1):63-82, doi: 10.1007/s10579- 010-9115-y
  386. Steinberger R, Pouliquen B, Hagman J (2002) Document Similarity Calculation Using the Multilingual Thesaurus EUROVOC. In: Proceedings of the 3rd International Conference on Computational Linguistics and Intelligent Text Processing, Springer, London, UK, pp 415-424
  387. Sun Z, Errami M, Long T, Renard C, Choradia N, Garner H (2010) Systematic Characterizations of Text Similarity in Full Text Biomedical References of the Annyual AMIA Symposium, pp 650-654, http://- www.ncbi.nlm.nih.gov/pmc/articles/PMC2815371/
  388. Trof RJ, Beishuizen A, Debets Ossenkopp YJ, Girbes ARJ, Groeneveld ABJ (2007) Management of invasive pulmonary aspergillosis in non- neutropenic critically ill patients. Intensive Care Medicine 33(10):1694- 1703, doi: 10.1007/s00134-007-0791-z, PMID17646966, PMC2039828
  389. Trost K (2009) Psst, Have You Ever Cheated? A Study of Academic Dishonesty in Sweden. Assessment & Evaluation in Higher Education 34(4):367-376, doi: 10.1080/02602930801956067
  390. Tsatsaronis G, Varlamis I, Giannakoulopoulos A, Kanellopoulos N (2010) Identifying Free Text Plagiarism Based on Semantic Similarity. In: Proceedings of the 4th International Plagiarism Conference, Newcastle upon Tyne, UK
  391. Tsatsaronis G, Varlamis I, Vazirgiannis M (2010) Text Relatedness Based on a Word Thesaurus. Journal of Artificial Intelligence Research 37(1):1- 40
  392. U S National Library of Medicine (2011) Medline® Bibliographic Database. Online Source, retrieved Sep. 29, 2011 from: http://- www.nlm.nih.gov/pubs/factsheets/medline.html
  393. Ukkonen E (1992) Constructing Suffix Trees On-Line in Linear Time. In: Proceedings of the IFIP 12th World Computer Congress on Algorithms, Software, Architecture -Information Processing, North-Holland Publishing Co., Amsterdam, Netherlands, vol 1, pp 484-492
  394. Unser M (1999) Behavioral Finance am Aktienmarkt. Uhlenbruch
  395. US National Center for Biotechnology Information (2011) PubMed Central. Online Source, retrieved Sep. 27, 2011 from: http://- www.ncbi.nlm.nih.gov/pmc/
  396. Uzuner Ö, Katz B, Nahnsen T (2005) Using Syntactic Information to Identify Plagiarism. In: Proceedings of the 2nd Workshop on Building Educational Applications Using Natural Language Processing, Ann Arbor, MI, USA
  397. Veldhuis JD, Bowers CY (2010) Integrating GHS into the Ghrelin System. International Journal of Peptides 2010(Article ID 879503), doi: 10.1155/2010/879503, PMID20798846, PMC2925380
  398. Ventura LM (2009) Erratum: Psychoneuroimmunology: Application to Ocular Diseases. Journal of Ocular Biology, Diseases, and Informatics 2:109-118, PMID20046843, PMC2798981
  399. Ventura LM (2009) Psychoneuroimmunology: Application to Ocular Diseases. Journal of Ocular Biology, Diseases, and Informatics 2:84-93, PMID19672468, PMC2723676
  400. Verma AS, Singh UP, Dwivedi PD, Singh A (2010) Contribution of CNS Cells in Neuroaids. Journal of Pharmacy And Bioallied Sciences 2:300- 306, PMID21180461, PMC2996080
  401. Vile JR (1991) American Views of the Constitutional Amending Process: An Intellectual History of Article V. The American Journal of Legal History 35(1):44-69, http://www.jstor.org/stable/845582
  402. Virk MS, Lieberman JR (2007) Tumor Metastasis to Bone. Arthritis Research and Therapy 9 Suppl. 1:S5, PMID17634144, PMC1924520
  403. Vladutz J G & Cook (1984) Bibliographic coupling and subject relatedness. Proceedings of the American Society for Information Science 21:204-207
  404. Vohra A, Vohra D (2006) Pro XML Development with Java Technology. Apress, Berkeley, CA, USA
  405. Volk D (2003) Die Begrenzung kriegerischer Konflikte durch das moderne Völkerrecht. Dissertation, Faculty of Law, University of Würzburg
  406. von Elm E, Poglia G, Walder B, Tramèr MR (2004) Different Patterns of Duplicate Publication: an Analysis of Articles Used in Systematic Reviews. JAMA: The Journal of the American Medical Association 291(8):974-980, doi: 10.1001/jama.291.8.974
  407. VroniPlag Wiki (2012) VroniPlag -Collaborative Documentation of Plagiarism. Online Source, retrieved May 9, 2012 from: http://- de.vroniplag.wikia.com References
  408. Kevin W Boyack, Henry Small, Richard Klavans (2012) Improving the Accuracy of Co-citation Clustering Using Full Text. In: Proceedings of 17th International Conference on Science and Technology Indicators
  409. Wang Y, Kitsuregawa M (2002) Evaluating Contents-link Coupled Web Page Clustering for Web Search Results. In: Proceedings of the 11th International Conference on Information and Knowledge Management, ACM, pp 499-506, doi: 10.1145/584792.584875
  410. Weber-Wulff D (2004) Portal Plagiat -Softwaretest 2004. Online Source, retrieved May 29, 2012 from: http://plagiat.htw-berlin.de/ff-alt/05hilfen/- programme.html
  411. Weber-Wulff D (2008) On the Utility of Plagiarism Detection Software. In: Proceedings of the 3rd International Plagiarism Conference, Newcastle upon Tyne, UK
  412. Weber-Wulff D (2008) Portal Plagiat -Softwaretest 2008. Online Source, retrieved May 29, 2012 from: http://plagiat.htw-berlin.de/software/2008/
  413. Weber-Wulff D (2010) Portal Plagiat -Softwaretest 2010. Online Source, retrieved May 29, 2012 from: http://plagiat.htw-berlin.de/software/2010- 2/
  414. Weber-Wulff D (2010) Test Cases for Plagiarism Detection Software. In: Proceedings of the 4th International Plagiarism Conference, Newcastle upon Tyne, UK
  415. Weber-Wulff D (2011) Copy, Shake, and Paste -a Blog about Plagiarism written by a Professor for Media and Computing at the HTW. Online Source, retrieved Oct. 28, 2011 from: http://copy-shake- paste.blogspot.com
  416. Weber-Wulff D (2012) Cottbus Refuses to Rescind Doctorate. Online Source, retrieved Jul. 27, 2012 from http://copy-shake- paste.blogspot.com/2012/06/cottbus-refuses-to-rescind-doctorate.html
  417. Weber-Wulff D (2012) Portal Plagiat -Softwaretest Report 2012. Online Source, retrieved Nov. 27, 2012 from: http://plagiat.htw-berlin.de/- collusion-test-2012/
  418. Weber-Wulff D, Köhler K (2011) Kopienjäger -Cloud-Software vs. menschliche Crowd in der Plagiaterkennung. iX Magazin für Professionelle Informationstechnik 6:78
  419. Weber-Wulff D, Wohnsdorf G (2006) Strategien der Plagiatsbekämpfung. Information: Wissenschaft & Praxis 57:90-98, doi: ISSN 1434-4653, https://www.uni-hohenheim.de/fileadmin/einrichtungen/agrar/Studium/- Plagiate/strategien_plagiate.pdf
  420. Weinberg BH (1974) Bibliographic Coupling: a Review. Information Storage and Retrieval 10:189-196
  421. Whitley BE (1998) Factors Associated with Cheating among College Students: A Review. Research in Higher Education 39:235-274, doi: 10.1023/A:1018724900565
  422. Wikipedia (2011) Suffix Tree. Online Source, retrieved Aug. 30, 2011 from: http://en.wikipedia.org/wiki/Suffix_tree
  423. Williams D (2010) Academic Integrity: Pots and Kettles? In: Proceedings of the 4th International Plagiarism Conference, Newcastle upon Tyne, UK
  424. Wise MJ (1993) String Similarity via Greedy String Tiling and Running Karp-Rabin Matching. Online Preprint, retrieved May 29, 2012 from: http://vernix.org/marcel/share/RKR_GST.ps.
  425. Yoon SH, Kim SW, Park S (2010) A Link-based Similarity Measure for Scientific Literature. In: Proceedings of the 19th International Conference on World Wide Web, ACM, pp 1213-1214, doi: 10.1145/1772690.1772880
  426. Yoon SH, Kim SW, Park S (2011) C-Rank: a Link-based Similarity Measure for Scientific Literature Databases. arXivorg Computing Research Repository abs/1109.1059:1-11
  427. Zhan S, Byung Ryul A, Ki Yol E, Min Koo K, Jin Pyung K, Moon Kyun K (2008) Plagiarism Detection Using the Levenshtein Distance and Smith-Waterman Algorithm. In: Proceedings of the 3rd International Conference on Innovative Computing Information and Control, pp 569- 569, doi: 10.1109/ICICIC.2008.422 References
  428. Zou D, Long WJ, Ling Z (2010) A Cluster-Based Plagiarism Detection Method. In: Notebook Papers of CLEF 2010 LABs and Workshops, 22- 23 September, Padua, Italy
  429. Zujewski J, Vaughn Cooke A, Flanders KC, Eckhaus MA, Lubet RA, Wakefield LM (2001) Transforming Growth Factors-beta Are Not Good Biomarkers of Chemopreventive Efficacy in a Preclinical Breast Cancer Model System. Breast Cancer Research 3:66-75, PMID11250748, PMC13902
  430. B. Gipp, J. Beel, and C. Hentschel. Scienstein: A Research Paper Recommender System. In Proceedings of the International Conference on Emerging Trends in Computing (ICETiC'09), pages 309-315, Virudhunagar (India), 2009. Kamaraj College of Engineering and Technology India, IEEE.
  431. CPA / CbPD Approach [123]: See Section 3.2.5 and Chapter 4 B. Gipp. Very Large Business Applications (VLBA): Systemlandschaften der Zukunft, chapter Entwicklung neuer Verfahren zur Bestimmung von Dokumentenaehnlichkeiten mittels Referenz-und Zitationsanalyse, pages 163-173. 3. Workshop des Centers for Very Large Business Applications (CVLBA). Shaker Verlag, Magdeburg, October 2009.
  432. Link-Proximity Analysis [131]: See Chapter 7.
  433. B. Gipp, A. Taylor, and J. Beel. Link Proximity Analysis -Clustering Websites by Examining Link Proximity. In M. Lalmas, J. Jose, A. Rauber, F. Sebastiani, and I. Frommholz, editors, Proceedings of the 14th European Conference on Digital Libraries (ECDL'10): Research and Advanced Technology for Digital Libraries, volume 6273 of Lecture Notes of Computer Science (LNCS). Springer, September 2010. 2011. URL http://- www.patentlens.net/patentlens/patent/US_2011_0264672_A1/en/. US 2011/0264672 A1. Indirectly Related Publications: CitRec [134]: See Chapter 7.3
  434. B. Gipp, N. Meuschke, M. Lipinski, and A. Nürnberger. CITREC: An Evaluation Framework for Citation-Based Similarity Measures based on TREC Genomics and PMC. To be published.
  435. SciPlore Xtract: Extracting Titles from Scientific PDF Documents by Analyzing Style Information [29]: See Chapter 7.
  436. J. Beel, B. Gipp, A. Shaker, and N. Friedrich. SciPlore Xtract: Extracting Titles from Scientific PDF Documents by Analyzing Style Information (Font Size). In M. Lalmas, J. Jose, A. Rauber, F. Sebastiani, and I. Frommholz, editors, Research and Advanced Technology for Digital Libraries, Proceedings of the 14th European Conference on Digital Libraries (ECDL'10), volume 6273 of Lecture Notes of Computer Science (LNCS), pages 413-416, Glasgow (UK), Sept. 2010. Springer.
  437. MrDLib [31]: See Chapter 7.
  438. J. Beel, B. Gipp, S. Langer, M. Genzmehr, E. Wilde, A. Nürnberger, and J. Pitman. Introducing Mr. DLib, a Machine-readable Digital Library. In Proceedings of the 11th ACM/IEEE Joint Conference on Digital Libraries (JCDL'11), 2011. Impact of Citations in Google Scholar [25, 27, 30]: See Chapter 7.3
  439. J. Beel and B. Gipp. Google Scholar's Ranking Algorithm: An Introductory Overview. In B. Larsen and J. Leta, editors, Proceedings of the 12th International Conference on Scientometrics and Informetrics (ISSI'09), volume 1, pages 230-241, Rio de Janeiro (Brazil), July 2009. International Society for Scientometrics and Informetrics.
  440. J. Beel and B. Gipp. Academic search engine spam and Google Scholar's resilience against it. Journal of Electronic Publishing, 13 (3), Dec. 2010. doi: 10.3998/3336451.0013.305.
  441. J. Beel, B. Gipp, and E. Wilde. Academic Search Engine Optimization (ASEO): Optimizing Scholarly Literature for Google Scholar and Co. Journal of Scholarly Publishing, 41 (2): 176-190, Jan. 2010. doi: 10.3138/jsp.41.2.176. University of Toronto Press. Evaluation of Header Metadata Extraction Approaches and Tools for Scientific PDF Documents [195]: See Section 5.1 and 7.3.
  442. M. Lipinski, K. Yao, C. Breitinger, J. Beel, and B. Gipp. Evaluation of Header Metadata Extraction Approaches and Tools for Scientific PDF Documents. In Proceedings of the 13th ACM/IEEE-CS joint conference on Digital Libraries (JCDL), JCDL '13, New York, NY, USA, 2013. ACM. doi: 10.1145/2467696.2467753. [282, 353, 354, 356] Turnitin [164] [50, 84, 89, 157, 282, 353, 354, 356] Urkund [271] [282, 355,