uni-leipzig-open-access/json/s41597-022-01908-z

1 line
19 KiB
Plaintext

{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T07:27:49Z","timestamp":1705044469752},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T00:00:00Z","timestamp":1674691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T00:00:00Z","timestamp":1674691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["01PW18015B","01PW18015B","01PW18015B"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Data"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>We present the Webis-STEREO-21 dataset, a massive collection of <jats:bold>S<\/jats:bold>cientific <jats:bold>Te<\/jats:bold>xt <jats:bold>Re<\/jats:bold>use in <jats:bold>O<\/jats:bold>pen-access publications. It contains 91 million cases of reused text passages found in 4.2 million unique open-access publications. Cases range from overlap of as few as eight words to near-duplicate publications and include a variety of reuse types, ranging from boilerplate text to verbatim copying to quotations and paraphrases. Featuring a high coverage of scientific disciplines and varieties of reuse, as well as comprehensive metadata to contextualize each case, our dataset addresses the most salient shortcomings of previous ones on scientific writing. The Webis-STEREO-21 does not indicate if a reuse case is legitimate or not, as its focus is on the general study of text reuse in science, which is legitimate in the vast majority of cases. It allows for tackling a wide range of research questions from different scientific backgrounds, facilitating both qualitative and quantitative analysis of the phenomenon as well as a first-time grounding on the base rate of text reuse in scientific publications.<\/jats:p>","DOI":"10.1038\/s41597-022-01908-z","type":"journal-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T12:02:48Z","timestamp":1674734568000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A large dataset of scientific text reuse in Open-Access publications"],"prefix":"10.1038","volume":"10","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5707-3751","authenticated-orcid":false,"given":"Lukas","family":"Gienapp","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Kircheis","sequence":"additional","affiliation":[]},{"given":"Bjarne","family":"Sievers","sequence":"additional","affiliation":[]},{"given":"Benno","family":"Stein","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Potthast","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,26]]},"reference":[{"key":"1908_CR1","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.jeap.2015.05.003","volume":"20","author":"Y-C Sun","year":"2015","unstructured":"Sun, Y.-C. & Yang, F.-Y. Uncovering published authors\u2019 text-borrowing practices: Paraphrasing strategies, sources, and self-plagiarism. Journal of English for Academic Purposes 20, 224\u2013236, https:\/\/doi.org\/10.1016\/j.jeap.2015.05.003 (2015).","journal-title":"Journal of English for Academic Purposes"},{"key":"1908_CR2","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1080\/08989621.2020.1850284","volume":"28","author":"IG Anson","year":"2020","unstructured":"Anson, I. G. & Moskovitz, C. Text recycling in stem: a text-analytic study of recently published research articles. Accountability in Research 28, 349\u2013371 (2020).","journal-title":"Accountability in Research"},{"key":"1908_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1093\/biosci\/biv160","volume":"66","author":"C Moskovitz","year":"2015","unstructured":"Moskovitz, C. Self-plagiarism, text recycling, and science education. BioScience 66, 5\u20136, https:\/\/doi.org\/10.1093\/biosci\/biv160 (2015).","journal-title":"BioScience"},{"key":"1908_CR4","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1080\/08989621.2018.1434622","volume":"25","author":"S Hall","year":"2018","unstructured":"Hall, S., Moskovitz, C. & Pemberton, M. A. Attitudes toward text recycling in academic writing across disciplines. Accountability in Research 25, 142\u2013169, https:\/\/doi.org\/10.1080\/08989621.2018.1434622 (2018).","journal-title":"Accountability in Research"},{"key":"1908_CR5","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s11948-002-0007-4","volume":"8","author":"SJ Bird","year":"2002","unstructured":"Bird, S. J. Self-plagiarism and dual and redundant publications: what is the problem? Science and engineering ethics 8, 543\u2013544 (2002).","journal-title":"Science and engineering ethics"},{"key":"1908_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1111\/j.1473-4192.2007.00147.x","volume":"17","author":"Q Wen","year":"2007","unstructured":"Wen, Q. & Gao, Y. Dual publication and academic inequality. International Journal of Applied Linguistics 17, 221\u2013225 (2007).","journal-title":"International Journal of Applied Linguistics"},{"key":"1908_CR7","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1660\/062.116.0310","volume":"116","author":"ME Eberle","year":"2013","unstructured":"Eberle, M. E. Paraphrasing, plagiarism, and misrepresentation in scientific writing. Transactions of the Kansas Academy of Science (1903-) 116, 157\u2013167 (2013).","journal-title":"Transactions of the Kansas Academy of Science (1903-)"},{"key":"1908_CR8","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1093\/llc\/fqu020","volume":"29","author":"J-G Ganascia","year":"2014","unstructured":"Ganascia, J.-G., Glaudes, P. & Del Lungo, A. Automatic detection of reuses and citations in literary texts. Literary and Linguistic Computing 29, 412\u2013421, https:\/\/doi.org\/10.1093\/llc\/fqu020 (2014).","journal-title":"Literary and Linguistic Computing"},{"key":"1908_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1073\/pnas.1415135111","volume":"112","author":"DT Citron","year":"2015","unstructured":"Citron, D. T. & Ginsparg, P. Patterns of text reuse in a scientific corpus. Proceedings of the National Academy of Sciences 112, 25\u201330, https:\/\/doi.org\/10.1073\/pnas.1415135111 (2015).","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"1908_CR10","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1016\/j.respol.2017.09.004","volume":"48","author":"SS Horbach","year":"2019","unstructured":"Horbach, S. S. & Halffman, W. W. The extent and causes of academic text recycling or \u2018self-plagiarism\u2019. Research Policy 48, 492\u2013502 (2019).","journal-title":"Research Policy"},{"key":"1908_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41239-020-00192-4","volume":"17","author":"T Folt\u00fdnek","year":"2020","unstructured":"Folt\u00fdnek, T. et al. Testing of support tools for plagiarism detection. International Journal of Educational Technology in Higher Education 17, 1\u201331 (2020).","journal-title":"International Journal of Educational Technology in Higher Education"},{"key":"1908_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1747016116654065","volume":"15","author":"R Sadeghi","year":"2019","unstructured":"Sadeghi, R. The attitude of scholars has not changed towards plagiarism since the medieval period: definition of plagiarism according to shams-e-qays, thirteenth-century persian literary scientist. Research Ethics 15, 1\u20133, https:\/\/doi.org\/10.1177\/1747016116654065 (2019).","journal-title":"Research Ethics"},{"key":"1908_CR13","doi-asserted-by":"crossref","unstructured":"Moskovitz, C. Standardizing terminology for text recycling in research writing. Learned Publishing 34 (2021).","DOI":"10.1002\/leap.1372"},{"key":"1908_CR14","unstructured":"Various Authors. Vroniplag Wiki. https:\/\/vroniplag.fandom.com\/. Accessed: 2021\u201312-14 (2021)."},{"key":"1908_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/cgf.12618","volume":"34","author":"P Riehmann","year":"2015","unstructured":"Riehmann, P., Potthast, M., Stein, B. & Fr\u00f6hlich, B. Visual assessment of alleged plagiarism cases. Computer Graphics Forum 34, 1\u201310, https:\/\/doi.org\/10.1111\/cgf.12618 (2015).","journal-title":"Computer Graphics Forum"},{"key":"1908_CR16","unstructured":"Moretti, F. Distant reading (Verso Books, 2013)."},{"key":"1908_CR17","unstructured":"Potthast, M., Hagen, M., V\u00f6lske, M. & Stein, B. Crowdsourcing interaction logs to understand text reuse from the web. In Fung, P. & Poesio, M. (eds.) 51st Annual Meeting of the Association for Computational Linguistics (ACL 2013), 1212\u20131221 (Association for Computational Linguistics, 2013)."},{"key":"1908_CR18","first-page":"15","volume":"16","author":"B Martin","year":"2015","unstructured":"Martin, B. Plagiarism: policy against cheating or policy for learning. Nexus (Newsletter of the Australian Sociological Association) 16, 15\u201316 (2015).","journal-title":"Nexus (Newsletter of the Australian Sociological Association)"},{"key":"1908_CR19","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1038\/d41586-019-00893-5","volume":"567","author":"D Weber-Wulff","year":"2019","unstructured":"Weber-Wulff, D. Plagiarism detectors are a crutch, and a problem. Nature 567, 435 (2019).","journal-title":"Nature"},{"key":"1908_CR20","doi-asserted-by":"publisher","unstructured":"Stein, B., Meyer zu Ei\u00dfen, S. & Potthast, M. Strategies for retrieving plagiarized documents. In Clarke, C., Fuhr, N., Kando, N., Kraaij, W. & de Vries, A. (eds.) 30th International ACM Conference on Research and Development in Information Retrieval (SIGIR 2007), 825\u2013826, https:\/\/doi.org\/10.1145\/1277741.1277928 (ACM, New York, 2007).","DOI":"10.1145\/1277741.1277928"},{"key":"1908_CR21","unstructured":"Potthast, M. et al. Overview of the 5th international competition on plagiarism detection. In Forner, P., Navigli, R. & Tufis, D. (eds.) Working Notes Papers of the CLEF 2013 Evaluation Labs, vol. 1179 of Lecture Notes in Computer Science (2013)."},{"key":"1908_CR22","doi-asserted-by":"publisher","unstructured":"Knoth, P. & Zdr\u00e1hal, Z. CORE: three access levels to underpin open access. D Lib Mag. 18, https:\/\/doi.org\/10.1045\/november2012-knoth (2012).","DOI":"10.1045\/november2012-knoth"},{"key":"1908_CR23","unstructured":"Lopez, P. & Romary, L. GROBID - information extraction from scientific publications. ERCIM News 2015 (2015)."},{"key":"1908_CR24","doi-asserted-by":"publisher","unstructured":"Tang, J. et al. Arnetminer: extraction and mining of academic social networks. In Li, Y., Liu, B. & Sarawagi, S. (eds.) Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24\u201327, 2008, 990\u2013998, https:\/\/doi.org\/10.1145\/1401890.1402008 (ACM, 2008).","DOI":"10.1145\/1401890.1402008"},{"key":"1908_CR25","doi-asserted-by":"publisher","unstructured":"Sinha, A. et al. An overview of microsoft academic service (MAS) and applications. In Gangemi, A., Leonardi, S. & Panconesi, A. (eds.) Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18\u201322, 2015 - Companion Volume, 243\u2013246, https:\/\/doi.org\/10.1145\/2740908.2742839 (ACM, 2015).","DOI":"10.1145\/2740908.2742839"},{"key":"1908_CR26","unstructured":"Deutsche Forschungsgemeinschaft. DFG classification of scientific disciplines, research areas, review boards and subject areas. https:\/\/web.archive.org\/web\/20201126170513\/https:\/\/www.dfg.de\/download\/pdf\/dfg_im_profil\/gremien\/fachkollegien\/amtsperiode_2016_2019\/fachsystematik_2016-2019_en_grafik.pdf Accessed on 2021-05-27 (2016)."},{"key":"1908_CR27","unstructured":"Hagen, M., Potthast, M. & Stein, B. Source retrieval for plagiarism detection from large web corpora: recent approaches. In Cappellato, L., Ferro, N., Jones, G. & San Juan, E. (eds.) Working Notes Papers of the CLEF 2015 Evaluation Labs, vol. 1391 of Lecture Notes in Computer Science (2015)."},{"key":"1908_CR28","doi-asserted-by":"publisher","unstructured":"Hagen, M., et al. (eds.) 26th ACM International Conference on Information and Knowledge Management (CIKM 2017), 2091\u20132094, https:\/\/doi.org\/10.1145\/3132847.3133097 (ACM, 2017).","DOI":"10.1145\/3132847.3133097"},{"key":"1908_CR29","doi-asserted-by":"publisher","unstructured":"Alshomary, M. et al. Wikipedia text reuse: within and without. In Azzopardi, L. et al. (eds.) Advances in Information Retrieval. 41st European Conference on IR Research (ECIR 2019), vol. 11437 of Lecture Notes in Computer Science, 747\u2013754, https:\/\/doi.org\/10.1007\/978-3-030-15712-8_49 (Springer, Berlin Heidelberg New York, 2019).","DOI":"10.1007\/978-3-030-15712-8_49"},{"key":"1908_CR30","doi-asserted-by":"publisher","unstructured":"Broder, A. Z. On the resemblance and containment of documents. In Carpentieri, B., Santis, A. D., Vaccaro, U. & Storer, J. A. (eds.) Compression and Complexity of SEQUENCES 1997, Positano, Amalfitan Coast, Salerno, Italy, June 11-13, 1997, Proceedings, 21\u201329, https:\/\/doi.org\/10.1109\/SEQUEN.1997.666900 (IEEE, 1997).","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"1908_CR31","unstructured":"Potthast, M. et al. Overview of the 4th international competition on plagiarism detection. In Forner, P., Karlgren, J. & Womser-Hacker, C. (eds.) Working Notes Papers of the CLEF 2012 Evaluation Labs (2012)."},{"key":"1908_CR32","doi-asserted-by":"publisher","first-page":"2512","DOI":"10.1002\/asi.21630","volume":"62","author":"E Stamatatos","year":"2011","unstructured":"Stamatatos, E. Plagiarism detection using stopword n-grams. J. Assoc. Inf. Sci. Technol. 62, 2512\u20132527, https:\/\/doi.org\/10.1002\/asi.21630 (2011).","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"1908_CR33","doi-asserted-by":"publisher","author":"L Gienapp","year":"2021","unstructured":"Gienapp, L., Kircheis, W., Bjarne, S., Stein, B. & Potthast, M. Webis-STEREO-21 corpus (metadata only version). Zenodo https:\/\/doi.org\/10.5281\/zenodo.5575285 (2021).","DOI":"10.5281\/zenodo.5575285"},{"key":"1908_CR34","unstructured":"Potthast, M. et al. Overview of the 5th international competition on plagiarism detection. In Forner, P., Navigli, R. & Tufis, D. (eds.) Working Notes Papers of the CLEF 2013 Evaluation Labs (2013)."},{"key":"1908_CR35","unstructured":"Peng, K., Mathur, A. & Narayanan, A. Mitigating dataset harms requires stewardship: lessons from 1000 papers. In Vanschoren, J. & Yeung, S. (eds.) Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December 2021, virtual (2021)."},{"key":"1908_CR36","doi-asserted-by":"publisher","unstructured":"Mieskes, M. A quantitative study of data in the NLP community. In Proceedings of the First ACL Workshop on Ethics in Natural Language Processing, 23\u201329, https:\/\/doi.org\/10.18653\/v1\/W17-1603 (Association for Computational Linguistics, Valencia, Spain, 2017).","DOI":"10.18653\/v1\/W17-1603"},{"key":"1908_CR37","doi-asserted-by":"publisher","unstructured":"Leidner, J. L. & Plachouras, V. Ethical by design: ethics best practices for natural language processing. In Proceedings of the First ACL Workshop on Ethics in Natural Language Processing, 30\u201340, https:\/\/doi.org\/10.18653\/v1\/W17-1604 (Association for Computational Linguistics, Valencia, Spain, 2017).","DOI":"10.18653\/v1\/W17-1604"},{"key":"1908_CR38","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/3458723","volume":"64","author":"T Gebru","year":"2021","unstructured":"Gebru, T. et al. Datasheets for datasets. Commun. ACM 64, 86\u201392, https:\/\/doi.org\/10.1145\/3458723 (2021).","journal-title":"Commun. ACM"},{"key":"1908_CR39","unstructured":"Potthast, M. et al. Overview of the 6th international competition on plagiarism detection. In Cappellato, L., Ferro, N., Halvey, M. & Kraaij, W. (eds.) Working Notes Papers of the CLEF 2014 Evaluation Labs, vol. 1180 of Lecture Notes in Computer Science (2014)."},{"key":"1908_CR40","unstructured":"Forner, P., Karlgren, J. & Womser-Hacker, C. (eds.). CLEF 2012 Evaluation Labs and Workshop\u2013Working Notes Papers, 17-20 September, Rome, Italy (CEUR-WS.org, 2012)."},{"key":"1908_CR41","unstructured":"Forner, P., Navigli, R. & Tufis, D. (eds.). CLEF 2013 Evaluation Labs and Workshop\u2013Working Notes Papers, 23\u201326 September, Valencia, Spain (CEUR-WS.org, 2013)."},{"key":"1908_CR42","doi-asserted-by":"crossref","unstructured":"Cappellato, L., Ferro, N., Halvey, M. & Kraaij, W. (eds.). Working Notes Papers of the CLEF 2014 Evaluation Labs, CEUR Workshop Proceedings (CEUR-WS.org, 2014).","DOI":"10.1145\/2701583.2701589"}],"container-title":["Scientific Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s41597-022-01908-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41597-022-01908-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41597-022-01908-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T12:07:29Z","timestamp":1674734849000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s41597-022-01908-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,26]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["1908"],"URL":"http:\/\/dx.doi.org\/10.1038\/s41597-022-01908-z","relation":{"references":[{"id-type":"doi","id":"10.5281\/zenodo.5575285","asserted-by":"subject"}]},"ISSN":["2052-4463"],"issn-type":[{"value":"2052-4463","type":"electronic"}],"subject":["Library and Information Sciences","Statistics, Probability and Uncertainty","Computer Science Applications","Education","Information Systems","Statistics and Probability"],"published":{"date-parts":[[2023,1,26]]},"assertion":[{"value":"8 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"58"}}