When each line of code is written it is surrounded by a sea of context: who in the community this is for, what problem we’re trying to solve, what technical assumptions we’re making, what we already tried but didn’t work, how much coffee we’ve had today. All of these have an effect on the software we write.
By the time the next person looks at that code, some of that context will have evaporated.
It turns out that one of the things that is really difficult at Crossref is checking whether a set of Crossref credentials has permission to act on a specific DOI prefix. This is the result of many legacy systems storing various mappings in various different software components, from our Content System through to our CRM. To this end, I wrote a basic application, credcheck, that will allow you to test a Crossref credential against an API.
Subject classifications have been available via the REST API for many years but have not been complete or reliable from the start and will soon be deprecated.
The subject metadata element was born out of a Labs experiment intended to enrich the metadata returned via Crossref Metadata Search with All Subject Journal Classification codes from Scopus. This feature was developed when the REST API was still fairly new, and we now recognize that the initial implementation worked its way into the service prematurely.
Crossref and DOAJ share the aim to encourage the dissemination and use of scholarly research using online technologies and to work with and through regional and international networks, partners, and user communities for the achievement of their aims to build local institutional capacity and sustainability. Both organisations agreed to work together in 2021 in a variety of ways, but primarily to âencourage the dissemination and use of scholarly research using online technologies, and regional and international networks, partners and communities, helping to build local institutional capacity and sustainability around the world.
Setting up your iThenticate v1 account (admins only)
Documentation Menu
Setting up your iThenticate v1 account (admins only)
This section is for Similarity Check account administrators using iThenticate v1. You need to follow the steps in this section before you start to set up your users and share the account with your colleagues.
If you are using iThenticate v2 rather than iThenticate v1, there are separate instructions for you.
Not sure if you’re using iThenticate v1 or iThenticate v2? More here.
Your personal administrator account in iThenticate v1
Once Turnitin has enabled iThenticate v1 for your organization, the main editorial contact provided on your application form will become the iThenticate account administrator. As an administrator, you create and manage the users on your account, and you decide how your organization uses the iThenticate tool.
To start with, you need to login to iThenticate and set your password.
Log in to your administrator account (v1)
Start from the link in the invitation email from noreply@ithenticate.com with the subject line âAccount Createdâ and click Login
Enter your username and single-use password
Click to agree to the terms of the end-user license agreement. These terms govern your personal use of the service. Theyâre separate from the central Similarity Check service agreement that your organization has agreed to.
You will be prompted to choose a new password
Click âChange Passwordâ to save.
How do you know if youâre an account administrator?
Once you’ve logged in, you will only be able to see the Manage Users tab if you’re an account administrator.
So if you can’t see Manage Users or Users, youâre not an account administrator, and you can skip ahead to the user instructions for iThenticate v1.
Updating your personal email address or password
Changing your email address or updating your password is the same for admins and other users. There’s more information in the user instructions for iThenticate v1.
Page owner: Kathleen Luschek | Last updated 2022-July-15