{"id":201,"date":"2026-01-23T19:50:12","date_gmt":"2026-01-23T19:50:12","guid":{"rendered":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-misconduct\/resouces\/"},"modified":"2026-01-23T19:50:52","modified_gmt":"2026-01-23T19:50:52","slug":"resources","status":"publish","type":"page","link":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-misconduct\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/libguides.colostate.edu\/ithenticate\" target=\"_blank\" rel=\"noreferrer noopener\">iThenticate<\/a><\/h3>\n\n\n\n<p>iThenticate is the anti-plagiarism software that is currently used by NSF, and it claims to be the \u201cworld\u2019s largest comparison of scholarly and professional content.\u201d This software is an optional tool now made available for CSU faculty to check their own draft proposals and manuscripts prior to submission, to guard themselves against potential future claims of plagiarism or self-plagiarism.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>iThenticate iThenticate is the anti-plagiarism software that is currently used by NSF, and it claims to be the \u201cworld\u2019s largest comparison of scholarly and professional content.\u201d This software is an optional tool now made available for CSU faculty to check their own draft proposals and manuscripts prior to submission, to guard themselves against potential future [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":198,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"microsite":[14],"class_list":["post-201","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/comments?post=201"}],"version-history":[{"count":0,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/201\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/198"}],"wp:attachment":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/media?parent=201"}],"wp:term":[{"taxonomy":"microsite","embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/microsite?post=201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}