<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "http://jats.nlm.nih.gov/publishing/1.3/JATS-journalpublishing1-3.dtd">
<article article-type="review-article" dtd-version="1.3" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">PJS</journal-id>
<journal-id journal-id-type="publisher-id">Premier Journal of Science</journal-id>
<journal-id journal-id-type="pmc">PJS</journal-id>
<journal-title-group>
<journal-title>PJ Science</journal-title>
</journal-title-group>
<issn pub-type="epub">3049-9011</issn>
<publisher>
<publisher-name>Premier Science</publisher-name>
<publisher-loc>London, UK</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.70389/PJS.100128</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>REVIEW</subject>
</subj-group>
<subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Linguistics</subject><subj-group><subject>Grammar</subject><subj-group><subject>Phonology</subject><subj-group><subject>Syllables</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Engineering and technology</subject><subj-group><subject>Signal processing</subject><subj-group><subject>Speech signal processing</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Mental health and psychiatry</subject><subj-group><subject>Schizophrenia</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Cell biology</subject><subj-group><subject>Cellular types</subject><subj-group><subject>Animal cells</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cellular neuroscience</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group>
</article-categories>
<title-group>
<article-title>Ensuring Research Excellence: The Indispensable Role of Academic Integrity</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-0852-686X</contrib-id>
<name>
<surname>Braslavska</surname>
<given-names>Oksana</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/review-editing">Review and editing</role>
<role content-type="http://credit.niso.org/contributor-roles/software">Software</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Kunderevych</surname>
<given-names>Olena</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/review-editing">Review and editing</role>
<role content-type="http://credit.niso.org/contributor-roles/software">Software</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Popadych</surname>
<given-names>Olena</given-names>
</name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/review-editing">Review and editing</role>
<role content-type="http://credit.niso.org/contributor-roles/software">Software</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Kolechyntseva</surname>
<given-names>Tetiana</given-names>
</name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/review-editing">Review and editing</role>
<role content-type="http://credit.niso.org/contributor-roles/software">Software</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Rylova</surname>
<given-names>Olha</given-names>
</name>
<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/review-editing">Review and editing</role>
<role content-type="http://credit.niso.org/contributor-roles/software">Software</role>
</contrib>
<aff id="aff1"><sup>1</sup><institution>Doctor of Pedagogical Sciences, Professor of the Department of Geography and Tourism, Faculty of Natural Sciences, Bogdan Khmelnitsky Melitopol State Pedagogical University, Melitopol, Ukraine; Professor of the Department of Geography and Tourism, Ferenc Racoczi II Transcarpathian Hungarian College of Higher Education</institution>, <city>Berehove</city>, <country>Ukraine</country></aff>
<aff id="aff2"><sup>2</sup><institution>Candidate of Philosophy, Associate Professor of the Department of Philosophy and Pedagogy, Kyiv National University of Culture and Arts</institution>, <city>Kyiv</city>, <country>Ukraine</country></aff>
<aff id="aff3"><sup>3</sup><institution>Doctor of Pedagogical Sciences, Professor of the Department of General Pedagogy and Pedagogy of Higher Education, Faculty of Social Sciences, State University &#x201C;Uzhhorod National University&#x201D;</institution>, <city>Uzhhorod</city>, <country>Ukraine</country></aff>
<aff id="aff4"><sup>4</sup><institution>PhD in Pedagogy, Associate Professor, Department of Natural Sciences, Marine Engineering Faculty, Kherson State Maritime Academy</institution>, <city>Kherson</city>, <country>Ukraine</country></aff>
<aff id="aff5"><sup>5</sup><institution>Doctor of Philosophy, Associate Professor of the Department of Philosophical and Political Sciences, Cherkasy State Technological University</institution>, <city>Cherkasy</city>, <country>Ukraine</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor001"><bold>Correspondence to:</bold> Oksana Braslavska, <email>braslaoksa@gmail.com</email></corresp>
<fn fn-type="other"><p>Peer Review</p></fn>
</author-notes>
<pub-date pub-type="epub">
<day>16</day>
<month>10</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<month>10</month>
<year>2025</year>
</pub-date>
<volume>14</volume>
<issue>1</issue>
<elocation-id>100128</elocation-id>
<history>
<date date-type="received">
<day>04</day>
<month>08</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>23</day>
<month>09</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>23</day>
<month>09</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-year>2025</copyright-year>
<copyright-holder>Oksana Braslavska, Olena Kunderevych, Olena Popadych, Tetiana Kolechyntseva and Olha Rylova</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
<license-p>This is an open access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">Creative Commons Attribution License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="info:doi/10.70389/PJS.100128"/>
<abstract>
<sec>
<title>BACKGROUND</title>
<p>In the context of global scientific integration and the rapid advancement of information and communication technologies, academic integrity has emerged as a cornerstone of quality research. Defined by ethical norms such as trust, honesty, and responsibility, academic integrity underpins credible scholarly work. However, the digital age presents growing risks to these values, particularly with the rise of artificial intelligence and electronic resources.</p>
</sec>
<sec>
<title>MATERIALS AND METHODS</title>
<p>This study applies a combined methodology, incorporating case study analysis and secondary data review. It explores technological tools for supporting academic originality, institutional mechanisms promoting integrity, and international frameworks for ethical standards in higher education. The sampling period is 2019&#x2013;2025, and the sample size is 41 sources. The criteria for inclusion and exclusion of publications were spatial and temporal indicators and the level of reliability of information.</p>
</sec>
<sec>
<title>RESULTS</title>
<p>The research identifies key challenges to academic integrity, including AI (Artificial intelligence)-generated content, poor digital resource management, and insufficient institutional oversight. The role of global initiatives such as the Bucharest Declaration and the International Center for Academic Integrity (ICAI) is examined. Primary forms of scientific plagiarism are outlined, and the functional role of digital academic publishing in ensuring textual uniqueness is evaluated. Core academic values &#x2013; trust, justice, respect, responsibility, honesty, and courage &#x2013; are reaffirmed as foundations for ethical research. Strategies for improving scientific communication and anti-plagiarism mechanisms are also identified.</p>
</sec>
<sec>
<title>CONCLUSION</title>
<p>Academic integrity is essential for ensuring the quality of scientific research in the information society. A comprehensive approach &#x2013; integrating institutional support, technological control systems, and adherence to global ethical standards &#x2013; can effectively detect and prevent academic dishonesty. Strengthening these measures will foster a trustworthy scientific environment and support the creation of credible research outcomes.</p>
</sec>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>AI-generated text plagiarism</kwd>
<kwd>Digital plagiarism detection</kwd>
<kwd>Institutional academic integrity programs</kwd>
<kwd>Open access publishing ethics</kwd>
<kwd>Bucharest declaration standards</kwd>
</kwd-group>
<counts>
<fig-count count="4"/>
<table-count count="0"/>
<page-count count="9"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>Version accepted</meta-name>
<meta-value>6</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec>
<title><ext-link ext-link-type="uri" xlink:href="https://premierscience.com/wp-content/uploads/2025/14/pjs-25-1122.pdf">Source-File: pjs-25-1122.pdf</ext-link></title>
</sec>
<sec id="sec001">
<title>Highlights</title>
<list list-type="bullet">
<list-item><p>The integration of natural and artificial intelligence in scientific research creates new challenges for maintaining academic integrity, particularly regarding recognition of individual contributions.</p></list-item>
<list-item><p>Effective science communication and anti-plagiarism efforts require inclusive, critical approaches that consider fairness, equity, and holistic understanding of plagiarism.</p></list-item>
<list-item><p>Causes of plagiarism include excessive workload, easy access to digital resources, insufficient citation skills, and lack of strong enforcement or consequences.</p></list-item>
<list-item><p>Centrally managed academic integrity programs with clear sanctions are the most effective administrative strategy to combat plagiarism and uphold research quality.</p></list-item>
<list-item><p>The increasing digitalization of the research environment heightens risks to academic integrity, necessitating updated legal frameworks that integrate intellectual property protection with academic misconduct prevention.</p></list-item>
</list>
</sec>
<sec id="sec002" sec-type="intro">
<title>Introduction</title>
<p>The essence of high-quality scientific research, which is seen in obtaining true scientific novelty, includes aspects of scientific communication. The rapid development of information and communication digital technologies provides virtually unlimited potential for information support in the communication process while increasing the risks of plagiarism, infringement of intellectual property rights, and dissemination of unoriginal scientific text.</p>
<p>The international experience of implementing the principles of academic integrity and monitoring their implementation is based on the fight against various manifestations of plagiarism and academic dishonesty. At the institutional level, this fight was launched in 1990 in the United States by creating the Centre for Academic Integrity to combat plagiarism, fraud and academic dishonesty. In 2010, the International Centre for Academic Integrity (ICAI) officially became an international organisation and operates in over twenty countries.<sup><xref ref-type="bibr" rid="ref1">1</xref></sup></p>
<p>Some contemporary scholars are exploring the integration of innovative digital tools into the traditional scientific environment, which brings both positive aspects of information accessibility and communication interaction and the related risks of plagiarism and intellectual property infringement.<sup><xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref></sup> Other scholars focus on qualitatively new approaches to creating unique texts.<sup><xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref></sup></p>
<p>Petrushka<sup><xref ref-type="bibr" rid="ref7">7</xref></sup> considers the potential of social media in the context of academic communities to prevent the use of unfair practices. At the same time, Koshetar et al.<sup><xref ref-type="bibr" rid="ref8">8</xref></sup> note that codifying ethical and communicative regulations of the modern scientific environment forms a model of intercultural dialogue and promotes the ethics of solidarity.</p>
<p>As emphasised by Fatima et al.,<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> the legal regulation of relations in the digitalised space of representation of research results presents specific difficulties. Scientists insist on the need for a systematic upgrade of sectoral regulations regulating information and communication relations in the scientific sphere based on the principles of the rule of law and academic integrity. At the same time, several problematic aspects of combating plagiarism and academic dishonesty require in-depth research.</p>
<p>Among the key research questions raised in the article are: exploring technological tools to support academic originality and key institutional mechanisms that promote integrity; familiarization with international frameworks of ethical standards in higher education; identifying key challenges to academic integrity; assessing the functional role of digital academic publications in ensuring text uniqueness; and identifying strategies for improving scientific communication and mechanisms for combating plagiarism.</p>
</sec>
<sec id="sec003">
<title>Literature Review</title>
<p>The issue of guaranteeing academic integrity as a basis for the quality of scientific research is directly or indirectly developed in numerous modern scientific studies. Kim and Uysal<sup><xref ref-type="bibr" rid="ref9">9</xref></sup> focus on the ethical dilemmas of plagiarism, proposing to integrate the foundations of cultural tolerance and inclusiveness into the educational space, as the educational environment is a key source of development of the scientific community, and academic integrity skills become inherent in the researcher who has learned them during education.</p>
<p><ext-link ext-link-type="uri" xlink:href="https://scholar.google.com.ua/citations?user=gKi6vdsAAAAJ&#x0026;hl=uk&#x0026;oi=sra">Malik</ext-link> et al.<sup><xref ref-type="bibr" rid="ref10">10</xref></sup> study the main prerequisites for the perpetuation of plagiarism in education and science, highlighting among them laziness and uncertainty, a lack of a motivated and proactive approach to educational and research activities, incompetence of teachers and supervisors, the positioning of plagiarism as a common phenomenon, and the lack of serious penalties for its use.</p>
<p>Prashar et al.<sup><xref ref-type="bibr" rid="ref11">11</xref></sup> identified individual factors that significantly impact the level of academic integrity in the educational and research environment, including work experience, gender, age, and internal religiosity. The researchers examined respondents&#x2019; ethical considerations regarding unintentional plagiarism and analysed the level of efforts made by educational and research institutions to raise awareness of academic integrity.</p>
<p>Contemporary researchers Sefcik et al.<sup><xref ref-type="bibr" rid="ref12">12</xref></sup> position centrally managed programmes that impose sanctions for non-compliance as the most effective method of achieving academic integrity requirements in higher education. Furthermore, Fatima et al.<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> investigate the impact of self-competence, self-efficacy and pressure on plagiarism rates in the academic environment, identifying the influence of individual traits.</p>
<p>Researchers Xu et al.<sup><xref ref-type="bibr" rid="ref13">13</xref></sup> raise the dilemmatic issue of the limits of the impact of the ChatGPT (Generative Pre-trained Transformer) artificial intelligence tool on academic integrity in the scientific environment. The authors also raise the acute issue of artificial intelligence&#x2019;s negative impact on the quality of research and the level of higher education in the context of academic integrity and emphasise the issue&#x2019;s silence in the media space due to the current global strategy of active promotion of ChatGPT.</p>
<p>Yaroshenko<sup><xref ref-type="bibr" rid="ref14">14</xref></sup> identifies certain types of academic dishonesty and plagiarism and the main preconditions for their occurrence. The researchers&#x2019; work can serve as a basis for developing an effective strategy for guaranteeing academic integrity.</p>
<p>In continuation, Dawson<sup><xref ref-type="bibr" rid="ref15">15</xref></sup> investigated the potential of modern digital tools to prevent infringement of intellectual property rights, prevent electronic fraud and actively support academic integrity in the scientific field. The scientist sees the development of information and communication tools as a powerful potential for improving scientific communication processes and creating unique texts.</p>
<p>Publications of recent years highlight the functionality of the phenomenon of scientific communication based on the principles of academic integrity,<sup><xref ref-type="bibr" rid="ref16">16</xref></sup> study the culture of professional communication in scientific circles against the background of global digitalisation,<sup><xref ref-type="bibr" rid="ref17">17</xref></sup> and pay special attention to the development of an information model of scientific communication that eliminates the risks of plagiarism.<sup><xref ref-type="bibr" rid="ref18">18</xref></sup> At the same time, the issue of improving the system of guarantees of academic integrity in the context of ensuring the uniqueness of scientific research with the help of innovative technologies remains mainly outside the research interests.</p>
</sec>
<sec id="sec004">
<title>Materials and Methods</title>
<p><bold><italic>Protocol and registration.</italic></bold> The study is a scoping review (PRISMA-ScR). This scoping review complies with the recommendations of the PRISMA Extension for Scoping Reviews (PRISMA-ScR) protocol.</p>
<p><bold><italic>Eligibility criteria.</italic></bold> Studies were included that analyzed the current role of academic integrity in the development of the scientific environment. The criteria for inclusion and exclusion of publications were spatial (European region, USA) and temporal (2018&#x2013;2025) indicators and the level of reliability of information (indexing in scientometric databases). The date of the last search was the first half of 2025. There were no restrictions on language or date; articles written in languages other than English were considered acceptable if they contained sufficient English-language information in the introduction, tables, and images.</p>
<p><bold><italic>Sources of information.</italic></bold> To identify potentially relevant documents, researchers conducted a systematic search of databases (Web of Science, Scopus) from 2018 to January 2025. The final search results were exported to EndNote, and duplicates were removed.</p>
<p><bold><italic>Search.</italic></bold> Comprehensive search queries included descriptors based on the terms &#x201C;academic integrity, scientific research, plagiarism, self-plagiarism, digitalisation, text uniqueness, scientific communications, electronic publications&#x201D;.</p>
<p>The electronic search strategy in Google Scholar involved combining keywords in quotation marks for an exact phrase search, using the operators AND, OR, NOT (or space), author, define, as well as limiting the results by year or type of publication through settings or the date range search function.</p>
<p><bold><italic>Selection of evidence sources.</italic></bold> Two independent reviewers assessed records for inclusion based on titles and abstracts. Abstracts that did not meet the inclusion criteria or that met the exclusion criteria were rejected. The remaining records, as well as those whose abstracts did not contain sufficient information to make a decision about their exclusion, were selected for full-text analysis, which was conducted by the same reviewers independently of each other. A third reviewer resolved any discrepancies.</p>
<p><bold><italic>Diagram construction process and data elements.</italic></bold> The selected studies were analyzed and data were extracted using a standardized system developed for this study. The following information was obtained: first author, year of publication, study design, sample size, inclusion and exclusion criteria.</p>
<p><bold><italic>Summary of results.</italic></bold> The information obtained from the included studies has been summarized.</p>
<p>The quality assessment of the included studies involved checking their methodological rigor and reliability in order to understand how reliable the conclusions of these studies are for the future review. The general screening flowchart can be presented as follows (<xref ref-type="fig" rid="F1">Figure 1</xref>):</p>
<fig id="F1" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100128.g001</object-id>
<label>Fig 1</label>
<caption><title>The general screening flowchart</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1122-Figure-1.webp?">Figure 1</ext-link></p>
</fig>
<p>The PRISMA diagram was used &#x2013; this is a data selection scheme in the process of systematic literature review, which visually demonstrates the process of searching, filtering, and including publications in the study, helping to ensure transparency and reproducibility. It consists of blocks describing the various stages of selection and arrows showing the flow of research from the initial search to the final set of sources (<xref ref-type="fig" rid="F2">Figure 2</xref>).</p>
<fig id="F2" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100128.g002</object-id>
<label>Fig 2</label>
<caption><title>PRISMA block diagram</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1122-Figure-2.webp?">Figure 2</ext-link></p>
</fig>
<p>The quality assessment of the included studies involved checking their methodological rigor and reliability to understand how reliable the conclusions of these studies are for the future review. The Mixed Methods Assessment Tool (MMAT) was used, a validated tool for assessing the quality of studies included in a systematic review, which provides criteria and screening questions for assessing methodology and determining an overall quality score. The Mixed Methods Assessment Tool (MMAT) is designed to assess quantitative, qualitative, and mixed methods studies.</p>
<p><italic>The categorical matrix</italic><bold></bold> was used as a methodological tool to reflect the logical and substantive connection between the object and subject of the study, harmonizing theoretical and practical aspects. It envisaged five phases of implementation: studying and compiling cases for the program with the aim of developing engagement, combining practice with theory; measurement (conducting surveys that highlight any problem areas regarding behavior that creates psychological safety); building (key interventions and actions that create further momentum and improvement); support (practice and formation of behavioral habits); reflection (self-reflection and retrospection).</p>
<p><bold><italic>Data synthesis.</italic></bold> A qualitative data synthesis was conducted, which involved:</p>
<list list-type="bullet">
<list-item><p>Qualitative data analysis: selecting key information from each study, including methodology, results, and conclusions; assessing the quality of each study to reduce bias in the synthesis;</p></list-item>
<list-item><p>Integration and interpretation of results: comparing the results of different studies, looking for common themes, discrepancies, and patterns using qualitative synthesis for descriptive results;</p></list-item>
<list-item><p>Drawing general conclusions that summarize the results of all included studies: identifying the strengths and limitations of the results obtained, as well as opportunities for future research.</p></list-item>
</list>
<sec id="sec004-1">
<title>Approval of Ethical Standards</title>
<p>The research protocol was approved by the Research Ethics Committee. Ethical standards for articles, such as literature reviews, include avoiding plagiarism and citing all sources, objectively presenting the ideas of other authors, critically analyzing information, and avoiding bias when writing reviews.</p>
<p>Limitations of the study are related to the difficulties of experimentally verifying theoretical conclusions, as well as the unsystematic nature of the study, reliance on secondary surveys, and potential regional bias.</p>
<p>In order to reduce the impact of bias and obtain more objective and reliable results, bias minimization methods were used, including: enhancing transparency (providing complete information about the research methodology and data analysis process with the possibility of replicating the results); limiting the influence of cognitive biases; adherence to ethical considerations; use of automated data analysis tools to reduce the influence of researcher subjectivity on the analysis process.</p>
<p>In the process of working on the article, several general scientific methods were used: analysis and synthesis &#x2013; to identify the main modern theoretical concepts and scientific developments to ensure academic integrity in the scientific environment; comparison - to systematize existing approaches to combating plagiarism in the research field, define basic concepts and criteria, identify factors influencing academic integrity; structural and logical method - to develop practical proposals for optimizing.</p>
<p>The study&#x2019;s results and conclusions were formed using the method of deduction and scientific abstraction. This made it possible to mentally move away from the standard indicators of academic integrity and consider the phenomenon under study in the context of the modern digitalized scientific and communication environment that requires adaptability.</p>
</sec>
</sec>
<sec id="sec005" sec-type="results">
<title>Results</title>
<p>Specific features of the development of the global educational environment.</p>
<p>The innovative information environment offers alternative models of scientific communication &#x2013; the concept of open access and the <italic>pay-per-article</italic> model. The phenomenon of a scientific electronic publication is seen primarily as a primary source for publishing research results, theories and ideas, their critical discussion and the development of scientific debate.</p>
<p>World-renowned scientific publishers have issued an official statement banning the authorship of ChatGPT or Large Language Models while demanding transparency and specificity in the list of tools and how they were used in creating a scientific text. AI facilitates the analysis of specific aspects from an opposite perspective and improves the processing of large information arrays.<sup><xref ref-type="bibr" rid="ref13">13</xref></sup></p>
<p>The phenomenon of academic integrity in the modern context.</p>
<p>The definition of academic integrity in European science and education has been significantly expanded and clarified in the course of the activities of the International Centre for Academic Integrity (ICAI), which in 1999 defined the &#x201C;fundamental values of academic integrity&#x201D; &#x2013; justice, honesty, respect, trust and responsibility, to which another one was added fifteen years later &#x2013; courage.<sup><xref ref-type="bibr" rid="ref1">1</xref></sup></p>
<p>The Bucharest Declaration on Ethical Values and Principles of Higher Education in the European Region<sup><xref ref-type="bibr" rid="ref19">19</xref></sup> is important in the context of institutional support for academic integrity. The Declaration defines the basic principles of academic integrity in the scientific and educational environment. It emphasizes that the pursuit of honesty begins with individual efforts to systematically avoid fraud, deception, lying, theft and other dishonest behaviour that negatively affect the quality status of academic and scientific degrees. The Declaration defines justice, trust, responsibility and respect as the main vectors of ensuring academic integrity.</p>
<p>Leading empirical research in recent years in the field of academic integrity.</p>
<p>The functioning of the European Network for Academic Integrity (ENAI) is also noted among the project and institutional foundations of the academic integrity system. The organization has developed the &#x201C;Academic Integrity as a Key Competence for Sustainable Development and the UN SDGs&#x201D; project, which aims to develop a deeper understanding of the UN Sustainable Development Goals from an academic perspective.<sup><xref ref-type="bibr" rid="ref20">20</xref></sup></p>
<p>ICAI leads the study of cases of academic dishonesty in the educational environment. In 2020, 840 respondents took part in the survey, which allowed us to identify key forms of violations of the principles of academic integrity (<xref ref-type="fig" rid="F3">Figure 3</xref>).<sup><xref ref-type="bibr" rid="ref21">21</xref></sup></p>
<fig id="F3" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100128.g003</object-id>
<label>Fig 3</label>
<caption><title>Types of academic dishonesty according to the McCabe questionnaire, % of respondents</title>
<p>Source: Systematised based on Facts and Statistics (ICAI, 2020).<sup><xref ref-type="bibr" rid="ref21">21</xref></sup></p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1122-Figure-3.webp?">Figure 3</ext-link></p>
</fig>
<p>The study includes data from five higher education institutions, including two large public universities, a small public university, a private university, and a small private liberal arts college. Analyzing <xref ref-type="fig" rid="F3">Figure 3</xref>, it should be noted that the sample indicates a persistent trend toward students&#x2019; propensity for academic misconduct.</p>
<p>In continuation, it is advisable to present the results of a survey of respondents in the research and education sector in Ukraine in 2021. These results represent the intensification of negative attitudes towards plagiarism in the professional consciousness. At the same time, scientists underestimate the risks of self-plagiarism (<xref ref-type="fig" rid="F4">Figure 4</xref>).<sup><xref ref-type="bibr" rid="ref22">22</xref></sup> The tool used was an anonymous survey conducted in modern higher education institutions.</p>
<fig id="F4" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100128.g004</object-id>
<label>Fig 4</label>
<caption><title>Aspects of academic dishonesty impact, average score on a scale of 0-5</title>
<p>Source: Systematised based on data from the National Agency for Higher Education Quality Assurance (2021).<sup><xref ref-type="bibr" rid="ref22">22</xref></sup></p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1122-Figure-4.webp?">Figure 4</ext-link></p>
</fig>
<p>The information presented in Fig. 4 shows the results of assessing the impact of various violations of academic integrity by teaching staff on the quality of educational activities and indicates that society is not ready to eradicate the habits of dishonest academic activity.</p>
<p>Analyzing <xref ref-type="fig" rid="F3">Figure 3</xref> and <xref ref-type="fig" rid="F4">Figure 4</xref>, it should be noted that the samples represent a stable trend of academic misconduct in the research and education environment. The assessment results of the impact of various violations of academic integrity on the quality of scientific activity indicate that society is not ready to eradicate habits.</p>
<p>Measures to ensure academic integrity.</p>
<p>Ensuring the quality of research requires the active involvement of all participants in scientific communication. Among the main measures to ensure academic integrity are the following:<sup><xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref23">23</xref></sup></p>
<list list-type="bullet">
<list-item><p>Scientists should provide supporting, reliable information on the results of their research activities, indicating the primary sources of information used and the methodology of work;</p></list-item>
<list-item><p>Ensuring compliance with the requirements and norms of copyright and related rights legislation and intellectual property;</p></list-item>
<list-item><p>Guaranteeing reliable references to information data sources when using already known statements, information, ideas, and developments.</p></list-item>
</list>
<p>Specific examples of academic integrity policy implementation that can be used to integrate an effective strategy to combat academic integrity violations in educational institutions include:</p>
<list list-type="order">
<list-item><p>Educational activities: targeted seminars, training sessions, and lectures explaining the key principles of academic integrity, the risks of violations, and ways to avoid them (on topics such as the proper formatting of academic papers and ethical standards in scientific research);</p></list-item>
<list-item><p>Developing and implementing Codes of Academic Integrity in educational institutions: defining standards of conduct for participants in the educational process regarding plagiarism, data falsification, other types of academic misconduct, and their consequences;</p></list-item>
<list-item><p>Introducing anti-plagiarism software;</p></list-item>
<list-item><p>Establishing a system for monitoring and controlling academic integrity: in particular, forming special committees in educational institutions to review violations and impose appropriate sanctions;</p></list-item>
<list-item><p>Integrating targeted technical means or hiring proctors during control measures to ensure observation;</p></list-item>
<list-item><p>Optimizing approaches to teaching: establishing uniform assessment criteria; ensuring the inclusiveness of the educational process.</p></list-item>
</list>
<p>In particular, in 2023, Uzhhorod National University published a collection of essays on the topic &#x201C;My Academic Integrity.&#x201D; This can serve as a practical example of how an educational institution encourages students to adhere to academic integrity.</p>
<p>AI is a potential tool for verifying academic integrity. Key principles for using AI to support academic integrity include technical reliability and security, transparency of use, confidentiality and data management, and accountability. These principles contribute to the creation of a safe, inclusive, and transparent educational environment in which AI is used as a tool to improve the quality of learning and ensure the ethicality of processes.</p>
<p>This study proposes to detail programs for combating plagiarism and supporting academic integrity by creating Codes of Academic Integrity at the level of educational institutions and scientific institutions, which will take into account the specifics of the object&#x2019;s activities as much as possible. Such local Codes define ethical principles and rules of conduct in the educational or scientific process to ensure honesty, respect, and responsibility, based on legislation and principles established in Model Regulations or codes.</p>
<p>The key aspects of developing effective codes of academic integrity should be:</p>
<list list-type="order">
<list-item><p>Compliance with the current legislative framework;</p></list-item>
<list-item><p>Establishing basic principles: honesty, respect, fairness, trust, responsibility, and perseverance;</p></list-item>
<list-item><p>Clear definition of violations: the code should clearly define what is considered a violation of the principles of academic integrity (e.g., plagiarism, cheating, falsification of data, etc.);</p></list-item>
<list-item><p>Establishing procedures: developing mechanisms for identifying and investigating violations, as well as determining the types of responsibility for participants in the process;</p></list-item>
<list-item><p>Regularly conducting informational work among participants in the educational and scientific process in order to promote the principles of academic integrity and form a corresponding culture;</p></list-item>
<list-item><p>Creating a healthy and ethical environment: each participant in the educational and scientific process should feel responsible for their own actions (conducting targeted training, lectures, seminars; access to management and transparency of the institution&#x2019;s policy; creation of effective support and protection mechanisms).</p></list-item>
</list>
</sec>
<sec id="sec006" sec-type="discussion">
<title>Discussion</title>
<p>Many scientific publications of our time are devoted to the issues of identifying dishonest practices in the field of research and finding ways to counteract plagiarism. Canfield et al.<sup><xref ref-type="bibr" rid="ref24">24</xref></sup> argue that the scientific environment today is in a state of convergence of the potential of natural and artificial intelligence, which are integrated into a single synthesised scientific entity.</p>
<p>Guzman and Lewis<sup><xref ref-type="bibr" rid="ref25">25</xref></sup> emphasize the risks of using artificial intelligence in creating a scientific text in the context of levelling the personal achievements of scientists. The authors&#x2019; main arguments are further developed in several publications that have explored the issue of identifying malpractices and countering the spread of plagiarism.<sup><xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref></sup> Scholars argue that effective science communication requires a critical approach focusing on inclusivity, equity, and intersectionality.</p>
<p>Domingues<sup><xref ref-type="bibr" rid="ref2">2</xref></sup> proposes a holistic approach to the anti-plagiarism system: perception of reality, reflection based on perception, and reflective performance. At the same time, Saeidnia and Lund<sup><xref ref-type="bibr" rid="ref23">23</xref></sup> identify excessive employment, overload, easy access to electronic information resources, low competence in proper citation, and lack of risk of significant punishment as the alleged causes of plagiarism in scientific research. Overall, the conclusions of these researchers reinforce the findings of the current study.</p>
<p>Among the various administrative strategies to ensure academic integrity, Sefcik et al.<sup><xref ref-type="bibr" rid="ref12">12</xref></sup> identify centrally managed programs that impose sanctions for non-compliance as the most effective method of achieving results in the fight against plagiarism.</p>
<p>Xu et al.<sup><xref ref-type="bibr" rid="ref13">13</xref></sup> summarize, based on a meta-analysis, that effective anti-plagiarism and IPR (Intellectual Property Rights) protection positively impact innovation and economic growth. At the same time, the level of impact on innovation development in developing countries is much weaker than in developed countries. This applies to specific areas of the issue that require more detailed research.</p>
<p>Among the publications of recent years, scientific studies of the development of the digital environment and its impact on academic integrity deserve special attention. In particular, Habibzadeh<sup><xref ref-type="bibr" rid="ref28">28</xref></sup> examines the phenomenon&#x2019;s evolution and typology, identifies the main problems scientists face in the digital world, and suggests ways to solve them. The proposed solutions to the problems are continued in the following publications.</p>
<p>Anam<sup><xref ref-type="bibr" rid="ref29">29</xref></sup> reviews current legislative initiatives and the effectiveness of their practical implementation. The author focuses on solutions in the field of intellectual property protection. Akinduyite<sup><xref ref-type="bibr" rid="ref30">30</xref></sup> analyses the use of artificial intelligence in the context of copyright protection in a recent publication. The researcher notes that the legal regulation of this issue should ensure the preservation of the status quo. At the same time, the research by Su et al.<sup><xref ref-type="bibr" rid="ref31">31</xref></sup> forms the theoretical basis for effective management in the field of research and protection of intellectual property, analysing the related risks caused by digitalization.</p>
<p>Sivasubramaniam<sup><xref ref-type="bibr" rid="ref32">32</xref></sup> updates the dynamics of the education systems in India, Pakistan, and Sri Lanka to examine in more detail their path toward improving academic integrity in higher education. The scholar argues that there is an excessive reliance on text comparison software to detect plagiarism. At the same time, these initiatives are rarely backed up by measures to teach students academic integrity, scientific writing, citation styles, or ways to avoid plagiarism. This shows that these countries are just starting to build a culture of integrity in all aspects of education. Further scientific research is needed in this area.</p>
<p>Instead, Orim<sup><xref ref-type="bibr" rid="ref33">33</xref></sup> analyzes the factors responsible for this variation in academic integrity, including the education system, pedagogy, the sociocultural environment, the economic environment, infrastructure, technology, institutional policy, and management systems. The researcher emphasizes the large number of reported and unreported cases of academic misconduct, which makes achieving academic integrity a serious problem in African countries.</p>
<p>A number of contemporary scholars, including Lund and Naheem,<sup><xref ref-type="bibr" rid="ref34">34</xref></sup> have examined AI-based authorship policies in leading academic journals and concluded that AI-based authorship policies may vary depending on the publisher and discipline of the publication.</p>
<p>At the same time, Crawford et al.<sup><xref ref-type="bibr" rid="ref35">35</xref></sup> propose five editorial principles that editors should follow when making decisions, viewing AI as a mechanism that can complement our current practices but is unlikely to replace them entirely. The authors<sup><xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref></sup> propose a substantive approach to technological neutrality aimed at achieving normative balance in the face of technological change.</p>
<p>Fundamental works in the field of research are presented by Macfarlane et al.<sup><xref ref-type="bibr" rid="ref38">38</xref></sup> and Bretag,<sup><xref ref-type="bibr" rid="ref39">39</xref></sup> who propose a productive approach that focuses on promoting the positive values of honesty, trust, fairness, respect, responsibility, and courage as intrinsically motivated drivers of ethical academic practice. The authors go beyond plagiarism, dishonesty, fraud, and other academic misconduct, as well as how best to prevent such behavior. Instead, they rely on multidimensional analysis using surveys/questionnaires, document analysis, and, occasionally, interviews.</p>
<p>Levin<sup><xref ref-type="bibr" rid="ref40">40</xref></sup> updates the requirements for accuracy and relevance that can be met in research. The researcher presents four factors that will contribute to high accuracy in writing scientific texts to convey research results: research partnerships; bias control; standardized methods; and alternative explanations. Ramdani<sup><xref ref-type="bibr" rid="ref41">41</xref></sup> creates a scale that takes psychometric properties into account, with a demonstrated systematic process and reliable calculations.</p>
<p>Despite the amount of work done by modern researchers in the field of the outlined issues, several issues remain under-researched. The risks of digitalising the information and communication environment to guarantee academic integrity in the scientific field require special attention today.</p>
<p>The priorities for ensuring academic integrity are: introducing information transparency, forming a culture of trust and respect, applying anti-plagiarism technologies, and combating manifestations of dishonesty. All participants in the educational process are responsible for ensuring academic integrity: students (undergraduates, pupils), academic and teaching staff (lecturers, teachers, researchers), as well as the management of educational institutions and state bodies that develop relevant laws and regulations.</p>
</sec>
<sec id="sec007" sec-type="conclusions">
<title>Conclusion</title>
<p>The dynamics of requirements for the reliability and quality of research results raise the issue of ensuring academic integrity and upgrading the concept of guaranteeing the uniqueness of a scientific text. Adherence to the principles of originality and integrity is complicated by unlimited access to the integrated scientific and information environment and the increased risk of plagiarism in science.</p>
<p>The main areas of academic integrity include trust, fairness, respect, responsibility, honesty, and courage. A reliable system of detecting academic dishonesty can ensure a high level of research quality for academic and research institutions. Particular attention should be paid to the risks of self-plagiarism in the scientific environment.</p>
<p>The system of protection of academic integrity should meet modern requirements, providing for actions aimed at preventive protection and timely elimination, as well as subsequent lawful restoration of violated rights to the results of scientific activity through jurisdictional and non-jurisdictional forms of protection. The prospect for further research is to develop proposals for improving the current legal framework regarding integration with intellectual property legislation.</p>
</sec>
</body>
<back>
<fn-group>
<fn id="n1" fn-type="other">
<p>Additional material is published online only. To view please visit the journal online.</p>
<p><bold>Cite this as:</bold> Braslavska O, Kunderevych O, Popadych O, Kolechyntseva T and Rylova O. Ensuring Research Excellence: The Indispensable Role of Academic Integrity. Premier Journal of Science 2025;14:100128</p>
<p><bold>DOI:</bold> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.70389/PJS.100128">https://doi.org/10.70389/PJS.100128</ext-link></p>
</fn>
<fn id="n2" fn-type="other">
<p><bold>Ethical approval</bold></p>
<p>N/a</p>
</fn>
<fn id="n3" fn-type="other">
<p><bold>Consent</bold></p>
<p>N/a</p>
</fn>
<fn id="n4" fn-type="other">
<p><bold>Funding</bold></p>
<p>No industry funding</p>
</fn>
<fn id="n5" fn-type="conflict">
<p><bold>Conflicts of interest</bold></p>
<p>N/a</p>
</fn>
<fn id="n6" fn-type="other">
<p><bold>Author contribution</bold></p>
<p>Oksana Braslavska, Olena Kunderevych, Olena Popadych, Tetiana Kolechyntseva and Olha Rylova &#x2013; Conceptualization, Writing &#x2013; original draft, review and editing. Software</p>
</fn>
<fn id="n7" fn-type="other">
<p><bold>Guarantor</bold></p>
<p>Oksana Braslavska</p>
</fn>
<fn id="n8" fn-type="other">
<p><bold>Provenance and peer-review</bold></p>
<p>Unsolicited and externally peer-reviewed</p>
</fn>
<fn id="n9" fn-type="other">
<p><bold>Data availability statement</bold></p>
<p>N/a</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="ref1"><label>1</label><mixed-citation publication-type="journal"><collab>International Center for Academic Integrity (ICAI)</collab>. <year>2024</year>. <ext-link ext-link-type="uri" xlink:href="https://academicintegrity.org/">https://academicintegrity.org/</ext-link> (&#x434;&#x430;&#x442;&#x430; &#x434;&#x43e;&#x441;&#x442;&#x443;&#x43f;&#x443; 15.01.2025)</mixed-citation></ref>
<ref id="ref2"><label>2</label><mixed-citation publication-type="journal"><string-name><surname>Domingues</surname> <given-names>I</given-names></string-name>. <article-title>A holistic approach to higher education plagiarism: Agency and analysis levels</article-title>. <source>High Educ Res Dev</source>. <year>2022</year>;<volume>41</volume>(<issue>6</issue>):<fpage>1869</fpage>&#x2013;<lpage>84</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/07294360.2021.1969540">https://doi.org/10.1080/07294360.2021.1969540</ext-link></mixed-citation></ref>
<ref id="ref3"><label>3</label><mixed-citation publication-type="journal"><string-name><surname>Kampa</surname> <given-names>RK</given-names></string-name>, <string-name><surname>Padhan</surname> <given-names>DK</given-names></string-name>, <string-name><surname>Karna</surname> <given-names>N</given-names></string-name>, <string-name><surname>Gouda</surname> <given-names>J</given-names></string-name>. <article-title>Identifying the factors influencing plagiarism in higher education: An evidence-based review of the literature</article-title>. <source>Account Res</source>. <year>2024</year>;<volume>35</volume>(<issue>2</issue>):<fpage>83</fpage>&#x2013;<lpage>98</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/08989621.2024.2311212">https://doi.org/10.1080/08989621.2024.2311212</ext-link></mixed-citation></ref>
<ref id="ref4"><label>4</label><mixed-citation publication-type="journal"><string-name><surname>Fatima</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sunguh</surname> <given-names>KK</given-names></string-name>, <string-name><surname>Abbas</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mannan</surname> <given-names>A</given-names></string-name>, <string-name><surname>Hosseini</surname> <given-names>S</given-names></string-name>. <article-title>The impact of pressure, self-efficacy, and self-competence on students&#x2019; plagiarism in higher education</article-title>. <source>Account Res</source>. <year>2020</year>;<volume>27</volume>(<issue>1</issue>):<fpage>32</fpage>&#x2013;<lpage>48</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/08989621.2019.1699070">https://doi.org/10.1080/08989621.2019.1699070</ext-link></mixed-citation></ref>
<ref id="ref5"><label>5</label><mixed-citation publication-type="journal"><string-name><surname>Gurbanov</surname> <given-names>TA</given-names></string-name>. <article-title>Technologies of comparative analysis of electronic texts as a means of combating plagiarism</article-title>. <source>Intelligent technologies of linguistic analysis: Abstracts of the international scientific and technical conference; 2021</source>. <ext-link ext-link-type="uri" xlink:href="https://er.nau.edu.ua/handle/NAU/54371">https://er.nau.edu.ua/handle/NAU/54371</ext-link></mixed-citation></ref>
<ref id="ref6"><label>6</label><mixed-citation publication-type="journal"><string-name><surname>Izbash</surname> <given-names>OO</given-names></string-name>. <article-title>Intellectual property in the digital space</article-title>. <source>Inf Law</source>. <year>2021</year>;<volume>3</volume>(<issue>38</issue>):<fpage>82</fpage>&#x2013;<lpage>9</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.37750/2616-6798.2021.Vol.3,No.38.243810">https://doi.org/10.37750/2616-6798.2021.Vol.3,No.38.243810</ext-link></mixed-citation></ref>
<ref id="ref7"><label>7</label><mixed-citation publication-type="journal"><string-name><surname>Petrushka</surname> <given-names>A</given-names></string-name>. <article-title>Social media: Academic integrity in the system of scientific communication</article-title>. <source>Soc Commun</source>. <year>2021</year>;<volume>3</volume>(<issue>47</issue>):<fpage>73</fpage>&#x2013;<lpage>79</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.32840/cpu2219-8741/2021">https://doi.org/10.32840/cpu2219-8741/2021</ext-link></mixed-citation></ref>
<ref id="ref8"><label>8</label><mixed-citation publication-type="journal"><string-name><surname>Koshetar</surname> <given-names>U</given-names></string-name>, <string-name><surname>Lytvynska</surname> <given-names>S</given-names></string-name>, <string-name><surname>Seabrook</surname> <given-names>A</given-names></string-name>. <article-title>Prospects of scientific communications in the context of civilisational challenges in the 21th century</article-title>. <source>In: Proc 6th Int Sci Pract Conf &#x201C;Current Issues and Prospects for the Development of Scientific Research&#x201D;; 2022 Oct 19&#x2013;20; Orl&#x00E9;ans, France</source>. <year>2022</year>;<volume>26</volume>(<issue>129</issue>):<fpage>106</fpage>&#x2013;<lpage>18</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.51582/interconf.19-20.10.2022.011">https://doi.org/10.51582/interconf.19-20.10.2022.011</ext-link></mixed-citation></ref>
<ref id="ref9"><label>9</label><mixed-citation publication-type="journal"><string-name><surname>Kim</surname> <given-names>HJ</given-names></string-name>, <string-name><surname>Uysal</surname> <given-names>H</given-names></string-name>. <article-title>Shifting the discourse of plagiarism and ethics: A cultural opportunity in higher education</article-title>. <source><italic>Int J Ethics Educ</italic></source>. <year>2021</year>;<volume>6</volume>(<issue>1</issue>):<fpage>163</fpage>&#x2013;<lpage>76</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s40889-020-00113-z">https://doi.org/10.1007/s40889-020-00113-z</ext-link></mixed-citation></ref>
<ref id="ref10"><label>10</label><mixed-citation publication-type="journal"><string-name><surname>Malik</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Mahroof</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ashraf</surname> <given-names>MA</given-names></string-name>. <article-title>Online university students&#x2019; perceptions on the awareness of, reasons for, and solutions to plagiarism in higher education: The development of the AS&#x0026;P model to combat plagiarism</article-title>. <source>Appl Sci</source>. <year>2021</year>;<volume>11</volume>(<issue>24</issue>):<fpage>12055</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/app112412055">https://doi.org/10.3390/app112412055</ext-link></mixed-citation></ref>
<ref id="ref11"><label>11</label><mixed-citation publication-type="journal"><string-name><surname>Prashar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>P</given-names></string-name>, <string-name><surname>Dwivedi</surname> <given-names>YK</given-names></string-name>. <article-title>Plagiarism awareness efforts, students&#x2019; ethical judgement and behaviours: A longitudinal experiment study on the ethical nuances of plagiarism in higher education</article-title>. <source>Stud High Educ</source>. <year>2024</year>;<volume>49</volume>(<issue>6</issue>):<fpage>929</fpage>&#x2013;<lpage>55</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/03075079.2023.2253835">https://doi.org/10.1080/03075079.2023.2253835</ext-link></mixed-citation></ref>
<ref id="ref12"><label>12</label><mixed-citation publication-type="journal"><string-name><surname>Sefcik</surname> <given-names>L</given-names></string-name>, <string-name><surname>Striepe</surname> <given-names>M</given-names></string-name>, <string-name><surname>Yorke</surname> <given-names>J</given-names></string-name>. <article-title>Mapping the landscape of academic integrity education programmes: What approaches are effective?</article-title> <source>Assess Eval High Educ</source>. <year>2020</year>;<volume>45</volume>(<issue>1</issue>):<fpage>30</fpage>&#x2013;<lpage>43</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/02602938.2019.1604942">https://doi.org/10.1080/02602938.2019.1604942</ext-link></mixed-citation></ref>
<ref id="ref13"><label>13</label><mixed-citation publication-type="journal"><string-name><surname>Xu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>X</given-names></string-name>, <string-name><surname>Cao</surname> <given-names>X</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>E</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>S</given-names></string-name>, <etal>et al.</etal> <article-title>Artificial intelligence: A powerful paradigm for scientific research</article-title>. <source>Innov (Camb)</source>. <year>2021</year>;<volume>2</volume>(<issue>4</issue>):<fpage>100179</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.xinn.2021.100179">https://doi.org/10.1016/j.xinn.2021.100179</ext-link></mixed-citation></ref>
<ref id="ref14"><label>14</label><mixed-citation publication-type="journal"><string-name><surname>Yaroshenko</surname> <given-names>TO</given-names></string-name>. <article-title>Scientific communication in the digital age: From the point of view of researchers, publishers, librarians</article-title>. <source>Bull Book Chamber</source>. <year>2015</year>;<volume>4</volume>:<fpage>44</fpage>&#x2013;<lpage>9</lpage>. <ext-link ext-link-type="uri" xlink:href="https://ekmair.ukma.edu.ua/items/2d955320-a42f-4cac-9d90-0c16b3c6cb3e">https://ekmair.ukma.edu.ua/items/2d955320-a42f-4cac-9d90-0c16b3c6cb3e</ext-link></mixed-citation></ref>
<ref id="ref15"><label>15</label><mixed-citation publication-type="journal"><string-name><surname>Dawson</surname> <given-names>P</given-names></string-name>. <article-title>Defending assessment security in a digital world: Preventing e-cheating and supporting academic integrity in higher education</article-title>. <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>; <year>2020</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4324/9780429324178">https://doi.org/10.4324/9780429324178</ext-link></mixed-citation></ref>
<ref id="ref16"><label>16</label><mixed-citation publication-type="journal"><string-name><surname>Shevtsova-Vodka</surname> <given-names>G</given-names></string-name>. <article-title>Plagiarism today</article-title>. <source>Bull Book Chamber</source>. <year>2023</year>;<volume>4</volume>:<fpage>18</fpage>&#x2013;<lpage>20</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.36273/2076-9555.2023.4(321).18-20">https://doi.org/10.36273/2076-9555.2023.4(321).18-20</ext-link></mixed-citation></ref>
<ref id="ref17"><label>17</label><mixed-citation publication-type="journal"><string-name><surname>Zinchenko</surname> <given-names>SY</given-names></string-name>. <article-title>Legal aspects of combating plagiarism in the field of higher education and science</article-title>. <source>In: Materials of the XVI All-Ukrainian Student Scientific and Technical Conference</source>; <year>2023</year>. https://science.kname.edu.ua/images/dok/konferentsii/stalyirozvytok2019/2023/Ch4_Socialni_23.pdf#page=135</mixed-citation></ref>
<ref id="ref18"><label>18</label><mixed-citation publication-type="journal"><string-name><surname>Mantovani</surname> <given-names>G</given-names></string-name>. <article-title>New communications environments: From everyday to virtual</article-title>. <publisher-loc>London</publisher-loc>: <publisher-name>CRC Press</publisher-name>; <year>2021</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1201/9780429332128">https://doi.org/10.1201/9780429332128</ext-link></mixed-citation></ref>
<ref id="ref19"><label>19</label><mixed-citation publication-type="journal"><collab>UNESCO</collab>. <article-title>The Bucharest Declaration concerning ethical values and principles for higher education in the Europe Region</article-title>; <year>2004</year>. <ext-link ext-link-type="uri" xlink:href="https://unesdoc.unesco.org/ark:/48223/pf0000139478">https://unesdoc.unesco.org/ark:/48223/pf0000139478</ext-link> (&#x434;&#x430;&#x442;&#x430; &#x434;&#x43e;&#x441;&#x442;&#x443;&#x43f;&#x443; 15.01.2025)</mixed-citation></ref>
<ref id="ref20"><label>20</label><mixed-citation publication-type="journal"><collab>European Network for Academic Integrity (ENAI)</collab>. <article-title>Academic integrity as key competence for sustainable development and United Nations SDGs</article-title>; <year>2024</year>. <ext-link ext-link-type="uri" xlink:href="https://www.academicintegrity.eu/wp/academic-integrity-as-key-competence-for-sustainable-development-and-united-nations-sdgs-aikunsdg/">https://www.academicintegrity.eu/wp/academic-integrity-as-key-competence-for-sustainable-development-and-united-nations-sdgs-aikunsdg/</ext-link>(&#x434;&#x430;&#x442;&#x430; &#x434;&#x43e;&#x441;&#x442;&#x443;&#x43f;&#x443; 15.01.2025)</mixed-citation></ref>
<ref id="ref21"><label>21</label><mixed-citation publication-type="journal"><collab>International Center for Academic Integrity (ICAI)</collab>. <article-title>Facts and statistics</article-title>; <year>2020</year>. <ext-link ext-link-type="uri" xlink:href="https://academicintegrity.org/resources/facts-and-statistics">https://academicintegrity.org/resources/facts-and-statistics</ext-link>(&#x434;&#x430;&#x442;&#x430; &#x434;&#x43e;&#x441;&#x442;&#x443;&#x43f;&#x443; 15.01.2025)</mixed-citation></ref>
<ref id="ref22"><label>22</label><mixed-citation publication-type="journal"><collab>National Agency for Higher Education Quality Assurance</collab>. <year>2021</year>. <ext-link ext-link-type="uri" xlink:href="https://en.naqa.gov.ua/">https://en.naqa.gov.ua/</ext-link> (&#x434;&#x430;&#x442;&#x430; &#x434;&#x43e;&#x441;&#x442;&#x443;&#x43f;&#x443; 15.01.2025)</mixed-citation></ref>
<ref id="ref23"><label>23</label><mixed-citation publication-type="journal"><string-name><surname>Saeidnia</surname> <given-names>HR</given-names></string-name>, <string-name><surname>Lund</surname> <given-names>BD</given-names></string-name>. <article-title>Non-fungible tokens (NFT): A safe and effective way to prevent plagiarism in scientific publishing</article-title>. <source>Libr Hi Tech News</source>. <year>2023</year>;<volume>40</volume>(<issue>2</issue>):<fpage>18</fpage>&#x2013;<lpage>9</lpage>. <ext-link ext-link-type="uri" xlink:href="https://www.emerald.com/insight/content/doi/10.1108/lhtn-12-2022-0134/full/html">https://www.emerald.com/insight/content/doi/10.1108/lhtn-12-2022-0134/full/html</ext-link></mixed-citation></ref>
<ref id="ref24"><label>24</label><mixed-citation publication-type="journal"><string-name><surname>Canfield</surname> <given-names>KN</given-names></string-name>, <string-name><surname>Menezes</surname> <given-names>S</given-names></string-name>, <string-name><surname>Matsuda</surname> <given-names>SB</given-names></string-name>, <string-name><surname>Moore</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mosley Austin</surname> <given-names>AN</given-names></string-name>, <string-name><surname>Dewsbury</surname> <given-names>B</given-names></string-name>, <etal>et al.</etal> <article-title>Science communication requires a critical approach that centres inclusion, equity, and intersectionality</article-title>. <source>Front Commun</source>. <year>2020</year>;<volume>5</volume>:<issue>2</issue>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fcomm.2020.00002">https://doi.org/10.3389/fcomm.2020.00002</ext-link></mixed-citation></ref>
<ref id="ref25"><label>25</label><mixed-citation publication-type="journal"><string-name><surname>Guzman</surname> <given-names>AL</given-names></string-name>, <string-name><surname>Lewis</surname> <given-names>SC</given-names></string-name>. <article-title>Artificial intelligence and communication: A human-machine communication research agenda</article-title>. <source>New Media Soc</source>. <year>2020</year>;<volume>22</volume>(<issue>1</issue>):<fpage>70</fpage>&#x2013;<lpage>86</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/1461444819858691">https://doi.org/10.1177/1461444819858691</ext-link></mixed-citation></ref>
<ref id="ref26"><label>26</label><mixed-citation publication-type="journal"><string-name><surname>West</surname> <given-names>JD</given-names></string-name>, <string-name><surname>Bergstrom</surname> <given-names>CT</given-names></string-name>. <article-title>Misinformation in and about science</article-title>. <source>Proc Natl Acad Sci U S A</source>. <year>2021</year>;<volume>118</volume>(<issue>15</issue>). <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1073/pnas.1912444117">https://doi.org/10.1073/pnas.1912444117</ext-link></mixed-citation></ref>
<ref id="ref27"><label>27</label><mixed-citation publication-type="journal"><string-name><surname>Bucchi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Trench</surname> <given-names>B</given-names></string-name>. <article-title>Routledge handbook of public communication of science and technology</article-title>. <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>; <year>2021</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4324/9781003039242">https://doi.org/10.4324/9781003039242</ext-link></mixed-citation></ref>
<ref id="ref28"><label>28</label><mixed-citation publication-type="journal"><string-name><surname>Habibzadeh</surname> <given-names>F</given-names></string-name>. <article-title>Plagiarism: a bird&#x2019;s eye view</article-title>. <source>J Korean Med Sci</source>. <year>2023</year>;<volume>38</volume>(<issue>45</issue>). <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3346/jkms.2023.38.e373">https://doi.org/10.3346/jkms.2023.38.e373</ext-link></mixed-citation></ref>
<ref id="ref29"><label>29</label><mixed-citation publication-type="journal"><string-name><surname>Anam</surname> <given-names>K</given-names></string-name>. <article-title>Legal protection of intellectual property rights in the digital industry: A review of legal developments and implementation challenges</article-title>. <source>West Sci Law Hum Rights</source>. <year>2024</year>;<volume>2</volume>(<issue>4</issue>):<fpage>358</fpage>&#x2013;<lpage>66</lpage>. <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.58812/wslhr.v2i04.1155">http://doi.org/10.58812/wslhr.v2i04.1155</ext-link></mixed-citation></ref>
<ref id="ref30"><label>30</label><mixed-citation publication-type="journal"><string-name><surname>Akinduyite</surname> <given-names>O</given-names></string-name>. <article-title>Intellectual property protection in the digital age: The impact of AI-generated images</article-title>. <source>SSRN</source>; <year>2024</year>. <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.2139/ssrn.4992371">http://doi.org/10.2139/ssrn.4992371</ext-link></mixed-citation></ref>
<ref id="ref31"><label>31</label><mixed-citation publication-type="journal"><string-name><surname>Su</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>MW</given-names></string-name>. <article-title>Intellectual property rights protection and total factor productivity</article-title>. <source>Int Bus Rev</source>. <year>2022</year>;<volume>31</volume>(<issue>3</issue>):<fpage>101956</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ibusrev.2021.101956">https://doi.org/10.1016/j.ibusrev.2021.101956</ext-link></mixed-citation></ref>
<ref id="ref32"><label>32</label><mixed-citation publication-type="journal"><string-name><surname>Sivasubramaniam</surname> <given-names>SD</given-names></string-name>. <article-title>Academic integrity in South Asia: Focus on India, Pakistan, and Sri Lanka</article-title>. <source>In Second handbook of academic integrity</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer Nature Switzerland</publisher-name>; <year>2024</year>. p. <fpage>77</fpage>&#x2013;<lpage>93</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-031-54144-5_88">https://doi.org/10.1007/978-3-031-54144-5_88</ext-link></mixed-citation></ref>
<ref id="ref33"><label>33</label><mixed-citation publication-type="journal"><string-name><surname>Orim</surname> <given-names>SM</given-names></string-name>, <string-name><surname>Awala-Ale</surname> <given-names>A</given-names></string-name>. <article-title>Academic integrity perspectives: Insights from Africa</article-title>. <source>In Second Handbook of Academic Integrity</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer Nature Switzerland</publisher-name>; <year>2024</year>. p. <fpage>117</fpage>&#x2013;<lpage>134</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-031-54144-5_9">https://doi.org/10.1007/978-3-031-54144-5_9</ext-link></mixed-citation></ref>
<ref id="ref34"><label>34</label><mixed-citation publication-type="journal"><string-name><surname>Lund</surname> <given-names>BD</given-names></string-name>, <string-name><surname>Naheem</surname> <given-names>KT</given-names></string-name>. <article-title>Can ChatGPT be an author?</article-title> <source>A study of artificial intelligence authorship policies in top academic journals</source>. <publisher-name>Learned Publishing</publisher-name>. <year>2024</year>;<volume>37</volume>(<issue>1</issue>):<fpage>13</fpage>&#x2013;<lpage>21</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/leap.1582">https://doi.org/10.1002/leap.1582</ext-link></mixed-citation></ref>
<ref id="ref35"><label>35</label><mixed-citation publication-type="journal"><string-name><surname>Crawford</surname> <given-names>J</given-names></string-name>, <string-name><surname>Cowling</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ashton-Hay</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kelder</surname> <given-names>JA</given-names></string-name>, <string-name><surname>Middleton</surname> <given-names>R</given-names></string-name>. <article-title>Artificial intelligence and authorship editor policy: ChatGPT, Bard Bing AI, and beyond</article-title>. <source>J Univ Teach Learn Pract</source>. <year>2023</year>;<volume>20</volume>(<issue>5</issue>):<fpage>1</fpage>&#x2013;<lpage>11</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.53761/1.20.5.01">https://doi.org/10.53761/1.20.5.01</ext-link></mixed-citation></ref>
<ref id="ref36"><label>36</label><mixed-citation publication-type="journal"><string-name><surname>Zhu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Tian</surname> <given-names>X</given-names></string-name>. <article-title>On the epistemological and methodological implications of AI co-authorship</article-title>. <source>Accountability in Research; 2024</source>. p.<fpage>1</fpage>&#x2013;<lpage>2</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/08989621.2024.2439443">https://doi.org/10.1080/08989621.2024.2439443</ext-link></mixed-citation></ref>
<ref id="ref37"><label>37</label><mixed-citation publication-type="journal"><string-name><surname>Craig</surname> <given-names>CJ</given-names></string-name>. <article-title>The AI-copyright challenge: Tech-neutrality, authorship, and the public interest</article-title>. <source>In Research handbook on intellectual property and artificial intelligence</source>. <publisher-name>Edward Elgar Publishing</publisher-name>; <year>2022</year>. p. <fpage>134</fpage>&#x2013;<lpage>155</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4337/9781800881907.00013">https://doi.org/10.4337/9781800881907.00013</ext-link></mixed-citation></ref>
<ref id="ref38"><label>38</label><mixed-citation publication-type="journal"><string-name><surname>Macfarlane</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Pun</surname> <given-names>A</given-names></string-name>. <article-title>Academic integrity: A review of the literature</article-title>. <source>Studies in Higher Education</source>. <year>2014</year>;<volume>39</volume>(<issue>2</issue>):<fpage>339</fpage>&#x2013;<lpage>358</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/03075079.2012.709495">https://doi.org/10.1080/03075079.2012.709495</ext-link></mixed-citation></ref>
<ref id="ref39"><label>39</label><mixed-citation publication-type="journal"><string-name><surname>Bretag</surname> <given-names>T</given-names></string-name>. <article-title>Academic integrity</article-title>. <source>In Oxford Research Encyclopedia of Business and Management</source>; <year>2018</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1093/acrefore/9780190224851.013.147">https://doi.org/10.1093/acrefore/9780190224851.013.147</ext-link></mixed-citation></ref>
<ref id="ref40"><label>40</label><mixed-citation publication-type="journal"><string-name><surname>Levin</surname> <given-names>M</given-names></string-name>. <article-title>Academic integrity in action research</article-title>. <source>Action Research</source>. <year>2012</year>;<volume>10</volume>(<issue>2</issue>):<fpage>133</fpage>&#x2013;<lpage>149</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/1476750312445034">https://doi.org/10.1177/1476750312445034</ext-link></mixed-citation></ref>
<ref id="ref41"><label>41</label><mixed-citation publication-type="journal"><string-name><surname>Ramdani</surname> <given-names>Z</given-names></string-name>. <article-title>Construction of academic integrity scale</article-title>. <source>Int J Res Stud Psychol</source>. <year>2018</year>;<volume>7</volume>(<issue>1</issue>):<fpage>87</fpage>&#x2013;<lpage>97</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5861/ijrsp.2018.3003">https://doi.org/10.5861/ijrsp.2018.3003</ext-link></mixed-citation></ref>
</ref-list>
</back>
</article>
