\\n Click on the ⊕ to view the full reference<\\/td>\\n <\\/tfoot>\\n<\\/table>\",\"options\":{\"columnDefs\":[{\"visible\":false,\"targets\":[0,3,4,5,6]},{\"orderable\":false,\"className\":\"details-control\",\"targets\":1},{\"orderable\":false,\"targets\":0},{\"name\":\" \",\"targets\":0},{\"name\":\" \",\"targets\":1},{\"name\":\"citation\",\"targets\":2},{\"name\":\"html_reference\",\"targets\":3},{\"name\":\"source__WoS\",\"targets\":4},{\"name\":\"source__DIM\",\"targets\":5},{\"name\":\"source__LENS\",\"targets\":6},{\"name\":\"source__WoS \",\"targets\":7},{\"name\":\"source__DIM \",\"targets\":8},{\"name\":\"source__LENS \",\"targets\":9}],\"dom\":\"Bfrtip\",\"buttons\":[\"print\",{\"extend\":\"csv\",\"filename\":\"CiteSource_record_summary\",\"text\":\"Download csv\",\"exportOptions\":{\"columns\":[0,2,3,4,5,6]}}],\"order\":[],\"autoWidth\":false,\"orderClasses\":false},\"callback\":\"function(table) {\\n\\n table.column(1).nodes().to$().css({cursor: 'pointer'});\\n var format = function(d) {\\n return '' +\\n d[3];\\n };\\n table.on('click', 'td.details-control', function() {\\n var td = $(this), row = table.row(td.closest('tr'));\\n if (row.child.isShown()) {\\n row.child.hide();\\n td.html('⊕');\\n } else {\\n row.child(format(row.data())).show();\\n td.html('⊖');\\n }\\n });\\n}\",\"selection\":{\"mode\":\"multiple\",\"selected\":null,\"target\":\"row\",\"selectable\":null}},\"evals\":[\"callback\"],\"jsHooks\":[]}"},{"path":"http://www.eshackathon.org/CiteSource/reference/record_summary_table.html","id":null,"dir":"Reference","previous_headings":"","what":"search_summary_table — record_summary_table","title":"search_summary_table — record_summary_table","text":"function creates table footnotes columns table. uses gt package create table adds footnotes various columns.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/record_summary_table.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"search_summary_table — record_summary_table","text":"","code":"record_summary_table(data)"},{"path":"http://www.eshackathon.org/CiteSource/reference/record_summary_table.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"search_summary_table — record_summary_table","text":"data data frame must contain columns \"Source\", \"Records Imported\", \"Distinct Records\", \"Unique records\", \"Non-unique Records\", \"Source Contribution %\", \"Source Unique Contribution %\", \"Source Unique %\". \"Source\" column used row names table.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/record_summary_table.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"search_summary_table — record_summary_table","text":"gt object representing table.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_csv.html","id":null,"dir":"Reference","previous_headings":"","what":"Reimport a CSV-file exported from CiteSource — reimport_csv","title":"Reimport a CSV-file exported from CiteSource — reimport_csv","text":"function reimports csv file tagged deduplicated CiteSource. allows continue analyses without repeating step, also allows users make manual corrections tagging deduplication. Note function works CSV files written export_csv(..., separate = NULL)","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_csv.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Reimport a CSV-file exported from CiteSource — reimport_csv","text":"","code":"reimport_csv(filename)"},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_csv.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Reimport a CSV-file exported from CiteSource — reimport_csv","text":"filename Name (path) CSV file reimported, end .csv","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_csv.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Reimport a CSV-file exported from CiteSource — reimport_csv","text":"","code":"if (interactive()) { dedup_results <- dedup_citations(citations, merge_citations = TRUE) export_csv(dedup_results, \"citations.csv\") unique_citations <- reimport_csv(\"citations.csv\") }"},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_ris.html","id":null,"dir":"Reference","previous_headings":"","what":"Reimport a RIS-file exported from CiteSource — reimport_ris","title":"Reimport a RIS-file exported from CiteSource — reimport_ris","text":"function reimports RIS file tagged deduplicated CiteSource. allows continue analyses without repeating step, also allows users make manual corrections tagging deduplication. function can also used replace import step (instance tags added individual citations rather entire files) - case, just call dedup_citations() import.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_ris.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Reimport a RIS-file exported from CiteSource — reimport_ris","text":"","code":"reimport_ris( filename = \"citations.ris\", source_field = \"DB\", label_field = \"C7\", string_field = \"C8\", duplicate_id_field = \"C1\", record_id_field = \"C2\", tag_naming = \"ris_synthesisr\", verbose = TRUE )"},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_ris.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Reimport a RIS-file exported from CiteSource — reimport_ris","text":"filename Name (path) RIS file reimported, end .ris source_field Character. RIS field cite_sources read ? NULL set missing label_field Character. RIS field cite_labels read ? NULL set missing string_field Character. RIS field cite_strings read ? NULL set missing duplicate_id_field Character. RIS field duplicate IDs read ? NULL recreate based row number (note neither duplicate record IDs directly affect CiteSource analyses - can allow connect processed data raw data) record_id_field Character. RIS field record IDs read ? NULL recreate based row number tag_naming Synthesisr option specifying RIS tags replaced names. changed using function reimport file exported CiteSource. import RIS, check names(CiteSource:::synthesisr_code_lookup) select options start ris_ verbose confirmation message displayed?","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_ris.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"Reimport a RIS-file exported from CiteSource — reimport_ris","text":"Note functions defaults' based export_ris() functions can easily combined.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/reimport_ris.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"Reimport a RIS-file exported from CiteSource — reimport_ris","text":"","code":"if (interactive()) { dedup_results <- dedup_citations(citations, merge_citations = TRUE) export_ris(dedup_results$unique, \"citations.ris\") unique_citations2 <- reimport_ris(\"citations.ris\") }"},{"path":"http://www.eshackathon.org/CiteSource/reference/runShiny.html","id":null,"dir":"Reference","previous_headings":"","what":"A wrapper function to run Shiny Apps from CiteSource. — runShiny","title":"A wrapper function to run Shiny Apps from CiteSource. — runShiny","text":"Running function launch CiteSource shiny app","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/runShiny.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"A wrapper function to run Shiny Apps from CiteSource. — runShiny","text":"","code":"runShiny(app = \"CiteSource\", offer_install = interactive())"},{"path":"http://www.eshackathon.org/CiteSource/reference/runShiny.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"A wrapper function to run Shiny Apps from CiteSource. — runShiny","text":"app Defaults CiteSource - possibly apps included future offer_install user prompted install required packages missing?","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/runShiny.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"A wrapper function to run Shiny Apps from CiteSource. — runShiny","text":"CiteSource shiny app","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/runShiny.html","id":"ref-examples","dir":"Reference","previous_headings":"","what":"Examples","title":"A wrapper function to run Shiny Apps from CiteSource. — runShiny","text":"","code":"if (interactive()) { # To run the CiteSource Shiny app: runShiny() }"},{"path":"http://www.eshackathon.org/CiteSource/reference/synthesisr_read_refs.html","id":null,"dir":"Reference","previous_headings":"","what":"Import bibliographic search results — synthesisr_read_refs","title":"Import bibliographic search results — synthesisr_read_refs","text":"Imports common bibliographic reference formats (.e. .bib, .ris, .txt).","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/synthesisr_read_refs.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Import bibliographic search results — synthesisr_read_refs","text":"","code":"synthesisr_read_refs( filename, tag_naming = \"best_guess\", return_df = TRUE, verbose = FALSE, select_fields = NULL ) read_ref( filename, tag_naming = \"best_guess\", return_df = TRUE, verbose = FALSE, select_fields = NULL )"},{"path":"http://www.eshackathon.org/CiteSource/reference/synthesisr_read_refs.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Import bibliographic search results — synthesisr_read_refs","text":"filename path filename vector filenames containing search results import. tag_naming Either length-1 character stating ris tags replaced (see details list options), object inheriting class data.frame containing user-defined replacement tags. return_df TRUE (default), returns data.frame; FALSE, returns list. verbose TRUE, prints status updates (defaults FALSE). select_fields Character vector fields retained. NULL, fields RIS file returned","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/synthesisr_read_refs.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Import bibliographic search results — synthesisr_read_refs","text":"Returns data.frame list assembled search results.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/synthesisr_read_refs.html","id":"details","dir":"Reference","previous_headings":"","what":"Details","title":"Import bibliographic search results — synthesisr_read_refs","text":"default argument tag_naming \"best_guess\", estimates database used ris tag replacement, fills gaps generic tags. tags missing database (.e. code_lookup) passed unchanged. options use tags Web Science (\"wos\"), Scopus (\"scopus\"), Ovid (\"ovid\") Academic Search Premier (\"asp\"). data.frame given, must contain two columns: \"code\" listing original tags source document, \"field\" listing replacement column/tag names. data.frame may optionally include third column named \"order\", specifies order columns resulting data.frame; otherwise taken row order. Finally, passing \"none\" replace_tags suppresses tag replacement.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/synthesisr_read_refs.html","id":"functions","dir":"Reference","previous_headings":"","what":"Functions","title":"Import bibliographic search results — synthesisr_read_refs","text":"read_ref(): Import single file","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/write_refs.html","id":null,"dir":"Reference","previous_headings":"","what":"Export data to a bibliographic format — write_bib","title":"Export data to a bibliographic format — write_bib","text":"function exports data.frames containing bibliographic information either .ris .bib file.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/write_refs.html","id":"ref-usage","dir":"Reference","previous_headings":"","what":"Usage","title":"Export data to a bibliographic format — write_bib","text":"","code":"write_bib(x) write_ris(x, tag_naming = \"synthesisr\") write_refs(x, format = \"ris\", tag_naming = \"synthesisr\", file = FALSE)"},{"path":"http://www.eshackathon.org/CiteSource/reference/write_refs.html","id":"arguments","dir":"Reference","previous_headings":"","what":"Arguments","title":"Export data to a bibliographic format — write_bib","text":"x Either data.frame containing bibliographic information object class bibliography. tag_naming naming convention used write RIS files? See details options. format format data exported ? Options ris bib. file Either logical indicating whether file written (defaulting FALSE), character giving name file written.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/write_refs.html","id":"value","dir":"Reference","previous_headings":"","what":"Value","title":"Export data to a bibliographic format — write_bib","text":"Returns character vector containing bibliographic information specified format file FALSE, saves output file TRUE.","code":""},{"path":"http://www.eshackathon.org/CiteSource/reference/write_refs.html","id":"functions","dir":"Reference","previous_headings":"","what":"Functions","title":"Export data to a bibliographic format — write_bib","text":"write_bib(): Format bib file export write_ris(): Format ris file export","code":""},{"path":"http://www.eshackathon.org/CiteSource/news/index.html","id":"citesource-001","dir":"Changelog","previous_headings":"","what":"CiteSource 0.0.1","title":"CiteSource 0.0.1","text":"Added NEWS.md file track changes package. Added dependency latest version ASySD R package Simplified dedup function arguments (now specified within call ASySD) Integrated new dedup function R shiny app","code":""}]
+[{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":null,"dir":"","previous_headings":"","what":"GNU General Public License","title":"GNU General Public License","text":"Version 3, 29 June 2007Copyright © 2007 Free Software Foundation, Inc. Everyone permitted copy distribute verbatim copies license document, changing allowed.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"preamble","dir":"","previous_headings":"","what":"Preamble","title":"GNU General Public License","text":"GNU General Public License free, copyleft license software kinds works. licenses software practical works designed take away freedom share change works. contrast, GNU General Public License intended guarantee freedom share change versions program–make sure remains free software users. , Free Software Foundation, use GNU General Public License software; applies also work released way authors. can apply programs, . speak free software, referring freedom, price. General Public Licenses designed make sure freedom distribute copies free software (charge wish), receive source code can get want , can change software use pieces new free programs, know can things. protect rights, need prevent others denying rights asking surrender rights. Therefore, certain responsibilities distribute copies software, modify : responsibilities respect freedom others. example, distribute copies program, whether gratis fee, must pass recipients freedoms received. must make sure , , receive can get source code. must show terms know rights. Developers use GNU GPL protect rights two steps: (1) assert copyright software, (2) offer License giving legal permission copy, distribute /modify . developers’ authors’ protection, GPL clearly explains warranty free software. users’ authors’ sake, GPL requires modified versions marked changed, problems attributed erroneously authors previous versions. devices designed deny users access install run modified versions software inside , although manufacturer can . fundamentally incompatible aim protecting users’ freedom change software. systematic pattern abuse occurs area products individuals use, precisely unacceptable. Therefore, designed version GPL prohibit practice products. problems arise substantially domains, stand ready extend provision domains future versions GPL, needed protect freedom users. Finally, every program threatened constantly software patents. States allow patents restrict development use software general-purpose computers, , wish avoid special danger patents applied free program make effectively proprietary. prevent , GPL assures patents used render program non-free. precise terms conditions copying, distribution modification follow.","code":""},{"path":[]},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_0-definitions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"0. Definitions","title":"GNU General Public License","text":"“License” refers version 3 GNU General Public License. “Copyright” also means copyright-like laws apply kinds works, semiconductor masks. “Program” refers copyrightable work licensed License. licensee addressed “”. “Licensees” “recipients” may individuals organizations. “modify” work means copy adapt part work fashion requiring copyright permission, making exact copy. resulting work called “modified version” earlier work work “based ” earlier work. “covered work” means either unmodified Program work based Program. “propagate” work means anything , without permission, make directly secondarily liable infringement applicable copyright law, except executing computer modifying private copy. Propagation includes copying, distribution (without modification), making available public, countries activities well. “convey” work means kind propagation enables parties make receive copies. Mere interaction user computer network, transfer copy, conveying. interactive user interface displays “Appropriate Legal Notices” extent includes convenient prominently visible feature (1) displays appropriate copyright notice, (2) tells user warranty work (except extent warranties provided), licensees may convey work License, view copy License. interface presents list user commands options, menu, prominent item list meets criterion.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_1-source-code","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"1. Source Code","title":"GNU General Public License","text":"“source code” work means preferred form work making modifications . “Object code” means non-source form work. “Standard Interface” means interface either official standard defined recognized standards body, , case interfaces specified particular programming language, one widely used among developers working language. “System Libraries” executable work include anything, work whole, () included normal form packaging Major Component, part Major Component, (b) serves enable use work Major Component, implement Standard Interface implementation available public source code form. “Major Component”, context, means major essential component (kernel, window system, ) specific operating system () executable work runs, compiler used produce work, object code interpreter used run . “Corresponding Source” work object code form means source code needed generate, install, (executable work) run object code modify work, including scripts control activities. However, include work’s System Libraries, general-purpose tools generally available free programs used unmodified performing activities part work. example, Corresponding Source includes interface definition files associated source files work, source code shared libraries dynamically linked subprograms work specifically designed require, intimate data communication control flow subprograms parts work. Corresponding Source need include anything users can regenerate automatically parts Corresponding Source. Corresponding Source work source code form work.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_2-basic-permissions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"2. Basic Permissions","title":"GNU General Public License","text":"rights granted License granted term copyright Program, irrevocable provided stated conditions met. License explicitly affirms unlimited permission run unmodified Program. output running covered work covered License output, given content, constitutes covered work. License acknowledges rights fair use equivalent, provided copyright law. may make, run propagate covered works convey, without conditions long license otherwise remains force. may convey covered works others sole purpose make modifications exclusively , provide facilities running works, provided comply terms License conveying material control copyright. thus making running covered works must exclusively behalf, direction control, terms prohibit making copies copyrighted material outside relationship . Conveying circumstances permitted solely conditions stated . Sublicensing allowed; section 10 makes unnecessary.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_3-protecting-users-legal-rights-from-anti-circumvention-law","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"3. Protecting Users’ Legal Rights From Anti-Circumvention Law","title":"GNU General Public License","text":"covered work shall deemed part effective technological measure applicable law fulfilling obligations article 11 WIPO copyright treaty adopted 20 December 1996, similar laws prohibiting restricting circumvention measures. convey covered work, waive legal power forbid circumvention technological measures extent circumvention effected exercising rights License respect covered work, disclaim intention limit operation modification work means enforcing, work’s users, third parties’ legal rights forbid circumvention technological measures.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_4-conveying-verbatim-copies","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"4. Conveying Verbatim Copies","title":"GNU General Public License","text":"may convey verbatim copies Program’s source code receive , medium, provided conspicuously appropriately publish copy appropriate copyright notice; keep intact notices stating License non-permissive terms added accord section 7 apply code; keep intact notices absence warranty; give recipients copy License along Program. may charge price price copy convey, may offer support warranty protection fee.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_5-conveying-modified-source-versions","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"5. Conveying Modified Source Versions","title":"GNU General Public License","text":"may convey work based Program, modifications produce Program, form source code terms section 4, provided also meet conditions: ) work must carry prominent notices stating modified , giving relevant date. b) work must carry prominent notices stating released License conditions added section 7. requirement modifies requirement section 4 “keep intact notices”. c) must license entire work, whole, License anyone comes possession copy. License therefore apply, along applicable section 7 additional terms, whole work, parts, regardless packaged. License gives permission license work way, invalidate permission separately received . d) work interactive user interfaces, must display Appropriate Legal Notices; however, Program interactive interfaces display Appropriate Legal Notices, work need make . compilation covered work separate independent works, nature extensions covered work, combined form larger program, volume storage distribution medium, called “aggregate” compilation resulting copyright used limit access legal rights compilation’s users beyond individual works permit. Inclusion covered work aggregate cause License apply parts aggregate.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_6-conveying-non-source-forms","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"6. Conveying Non-Source Forms","title":"GNU General Public License","text":"may convey covered work object code form terms sections 4 5, provided also convey machine-readable Corresponding Source terms License, one ways: ) Convey object code , embodied , physical product (including physical distribution medium), accompanied Corresponding Source fixed durable physical medium customarily used software interchange. b) Convey object code , embodied , physical product (including physical distribution medium), accompanied written offer, valid least three years valid long offer spare parts customer support product model, give anyone possesses object code either (1) copy Corresponding Source software product covered License, durable physical medium customarily used software interchange, price reasonable cost physically performing conveying source, (2) access copy Corresponding Source network server charge. c) Convey individual copies object code copy written offer provide Corresponding Source. alternative allowed occasionally noncommercially, received object code offer, accord subsection 6b. d) Convey object code offering access designated place (gratis charge), offer equivalent access Corresponding Source way place charge. need require recipients copy Corresponding Source along object code. place copy object code network server, Corresponding Source may different server (operated third party) supports equivalent copying facilities, provided maintain clear directions next object code saying find Corresponding Source. Regardless server hosts Corresponding Source, remain obligated ensure available long needed satisfy requirements. e) Convey object code using peer--peer transmission, provided inform peers object code Corresponding Source work offered general public charge subsection 6d. separable portion object code, whose source code excluded Corresponding Source System Library, need included conveying object code work. “User Product” either (1) “consumer product”, means tangible personal property normally used personal, family, household purposes, (2) anything designed sold incorporation dwelling. determining whether product consumer product, doubtful cases shall resolved favor coverage. particular product received particular user, “normally used” refers typical common use class product, regardless status particular user way particular user actually uses, expects expected use, product. product consumer product regardless whether product substantial commercial, industrial non-consumer uses, unless uses represent significant mode use product. “Installation Information” User Product means methods, procedures, authorization keys, information required install execute modified versions covered work User Product modified version Corresponding Source. information must suffice ensure continued functioning modified object code case prevented interfered solely modification made. convey object code work section , , specifically use , User Product, conveying occurs part transaction right possession use User Product transferred recipient perpetuity fixed term (regardless transaction characterized), Corresponding Source conveyed section must accompanied Installation Information. requirement apply neither third party retains ability install modified object code User Product (example, work installed ROM). requirement provide Installation Information include requirement continue provide support service, warranty, updates work modified installed recipient, User Product modified installed. Access network may denied modification materially adversely affects operation network violates rules protocols communication across network. Corresponding Source conveyed, Installation Information provided, accord section must format publicly documented (implementation available public source code form), must require special password key unpacking, reading copying.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_7-additional-terms","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"7. Additional Terms","title":"GNU General Public License","text":"“Additional permissions” terms supplement terms License making exceptions one conditions. Additional permissions applicable entire Program shall treated though included License, extent valid applicable law. additional permissions apply part Program, part may used separately permissions, entire Program remains governed License without regard additional permissions. convey copy covered work, may option remove additional permissions copy, part . (Additional permissions may written require removal certain cases modify work.) may place additional permissions material, added covered work, can give appropriate copyright permission. Notwithstanding provision License, material add covered work, may (authorized copyright holders material) supplement terms License terms: ) Disclaiming warranty limiting liability differently terms sections 15 16 License; b) Requiring preservation specified reasonable legal notices author attributions material Appropriate Legal Notices displayed works containing ; c) Prohibiting misrepresentation origin material, requiring modified versions material marked reasonable ways different original version; d) Limiting use publicity purposes names licensors authors material; e) Declining grant rights trademark law use trade names, trademarks, service marks; f) Requiring indemnification licensors authors material anyone conveys material (modified versions ) contractual assumptions liability recipient, liability contractual assumptions directly impose licensors authors. non-permissive additional terms considered “restrictions” within meaning section 10. Program received , part , contains notice stating governed License along term restriction, may remove term. license document contains restriction permits relicensing conveying License, may add covered work material governed terms license document, provided restriction survive relicensing conveying. add terms covered work accord section, must place, relevant source files, statement additional terms apply files, notice indicating find applicable terms. Additional terms, permissive non-permissive, may stated form separately written license, stated exceptions; requirements apply either way.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_8-termination","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"8. Termination","title":"GNU General Public License","text":"may propagate modify covered work except expressly provided License. attempt otherwise propagate modify void, automatically terminate rights License (including patent licenses granted third paragraph section 11). However, cease violation License, license particular copyright holder reinstated () provisionally, unless copyright holder explicitly finally terminates license, (b) permanently, copyright holder fails notify violation reasonable means prior 60 days cessation. Moreover, license particular copyright holder reinstated permanently copyright holder notifies violation reasonable means, first time received notice violation License (work) copyright holder, cure violation prior 30 days receipt notice. Termination rights section terminate licenses parties received copies rights License. rights terminated permanently reinstated, qualify receive new licenses material section 10.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_9-acceptance-not-required-for-having-copies","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"9. Acceptance Not Required for Having Copies","title":"GNU General Public License","text":"required accept License order receive run copy Program. Ancillary propagation covered work occurring solely consequence using peer--peer transmission receive copy likewise require acceptance. However, nothing License grants permission propagate modify covered work. actions infringe copyright accept License. Therefore, modifying propagating covered work, indicate acceptance License .","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_10-automatic-licensing-of-downstream-recipients","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"10. Automatic Licensing of Downstream Recipients","title":"GNU General Public License","text":"time convey covered work, recipient automatically receives license original licensors, run, modify propagate work, subject License. responsible enforcing compliance third parties License. “entity transaction” transaction transferring control organization, substantially assets one, subdividing organization, merging organizations. propagation covered work results entity transaction, party transaction receives copy work also receives whatever licenses work party’s predecessor interest give previous paragraph, plus right possession Corresponding Source work predecessor interest, predecessor can get reasonable efforts. may impose restrictions exercise rights granted affirmed License. example, may impose license fee, royalty, charge exercise rights granted License, may initiate litigation (including cross-claim counterclaim lawsuit) alleging patent claim infringed making, using, selling, offering sale, importing Program portion .","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_11-patents","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"11. Patents","title":"GNU General Public License","text":"“contributor” copyright holder authorizes use License Program work Program based. work thus licensed called contributor’s “contributor version”. contributor’s “essential patent claims” patent claims owned controlled contributor, whether already acquired hereafter acquired, infringed manner, permitted License, making, using, selling contributor version, include claims infringed consequence modification contributor version. purposes definition, “control” includes right grant patent sublicenses manner consistent requirements License. contributor grants non-exclusive, worldwide, royalty-free patent license contributor’s essential patent claims, make, use, sell, offer sale, import otherwise run, modify propagate contents contributor version. following three paragraphs, “patent license” express agreement commitment, however denominated, enforce patent (express permission practice patent covenant sue patent infringement). “grant” patent license party means make agreement commitment enforce patent party. convey covered work, knowingly relying patent license, Corresponding Source work available anyone copy, free charge terms License, publicly available network server readily accessible means, must either (1) cause Corresponding Source available, (2) arrange deprive benefit patent license particular work, (3) arrange, manner consistent requirements License, extend patent license downstream recipients. “Knowingly relying” means actual knowledge , patent license, conveying covered work country, recipient’s use covered work country, infringe one identifiable patents country reason believe valid. , pursuant connection single transaction arrangement, convey, propagate procuring conveyance , covered work, grant patent license parties receiving covered work authorizing use, propagate, modify convey specific copy covered work, patent license grant automatically extended recipients covered work works based . patent license “discriminatory” include within scope coverage, prohibits exercise , conditioned non-exercise one rights specifically granted License. may convey covered work party arrangement third party business distributing software, make payment third party based extent activity conveying work, third party grants, parties receive covered work , discriminatory patent license () connection copies covered work conveyed (copies made copies), (b) primarily connection specific products compilations contain covered work, unless entered arrangement, patent license granted, prior 28 March 2007. Nothing License shall construed excluding limiting implied license defenses infringement may otherwise available applicable patent law.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_12-no-surrender-of-others-freedom","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"12. No Surrender of Others’ Freedom","title":"GNU General Public License","text":"conditions imposed (whether court order, agreement otherwise) contradict conditions License, excuse conditions License. convey covered work satisfy simultaneously obligations License pertinent obligations, consequence may convey . example, agree terms obligate collect royalty conveying convey Program, way satisfy terms License refrain entirely conveying Program.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_13-use-with-the-gnu-affero-general-public-license","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"13. Use with the GNU Affero General Public License","title":"GNU General Public License","text":"Notwithstanding provision License, permission link combine covered work work licensed version 3 GNU Affero General Public License single combined work, convey resulting work. terms License continue apply part covered work, special requirements GNU Affero General Public License, section 13, concerning interaction network apply combination .","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_14-revised-versions-of-this-license","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"14. Revised Versions of this License","title":"GNU General Public License","text":"Free Software Foundation may publish revised /new versions GNU General Public License time time. new versions similar spirit present version, may differ detail address new problems concerns. version given distinguishing version number. Program specifies certain numbered version GNU General Public License “later version” applies , option following terms conditions either numbered version later version published Free Software Foundation. Program specify version number GNU General Public License, may choose version ever published Free Software Foundation. Program specifies proxy can decide future versions GNU General Public License can used, proxy’s public statement acceptance version permanently authorizes choose version Program. Later license versions may give additional different permissions. However, additional obligations imposed author copyright holder result choosing follow later version.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_15-disclaimer-of-warranty","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"15. Disclaimer of Warranty","title":"GNU General Public License","text":"WARRANTY PROGRAM, EXTENT PERMITTED APPLICABLE LAW. EXCEPT OTHERWISE STATED WRITING COPYRIGHT HOLDERS /PARTIES PROVIDE PROGRAM “” WITHOUT WARRANTY KIND, EITHER EXPRESSED IMPLIED, INCLUDING, LIMITED , IMPLIED WARRANTIES MERCHANTABILITY FITNESS PARTICULAR PURPOSE. ENTIRE RISK QUALITY PERFORMANCE PROGRAM . PROGRAM PROVE DEFECTIVE, ASSUME COST NECESSARY SERVICING, REPAIR CORRECTION.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_16-limitation-of-liability","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"16. Limitation of Liability","title":"GNU General Public License","text":"EVENT UNLESS REQUIRED APPLICABLE LAW AGREED WRITING COPYRIGHT HOLDER, PARTY MODIFIES /CONVEYS PROGRAM PERMITTED , LIABLE DAMAGES, INCLUDING GENERAL, SPECIAL, INCIDENTAL CONSEQUENTIAL DAMAGES ARISING USE INABILITY USE PROGRAM (INCLUDING LIMITED LOSS DATA DATA RENDERED INACCURATE LOSSES SUSTAINED THIRD PARTIES FAILURE PROGRAM OPERATE PROGRAMS), EVEN HOLDER PARTY ADVISED POSSIBILITY DAMAGES.","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"id_17-interpretation-of-sections-15-and-16","dir":"","previous_headings":"TERMS AND CONDITIONS","what":"17. Interpretation of Sections 15 and 16","title":"GNU General Public License","text":"disclaimer warranty limitation liability provided given local legal effect according terms, reviewing courts shall apply local law closely approximates absolute waiver civil liability connection Program, unless warranty assumption liability accompanies copy Program return fee. END TERMS CONDITIONS","code":""},{"path":"http://www.eshackathon.org/CiteSource/LICENSE.html","id":"how-to-apply-these-terms-to-your-new-programs","dir":"","previous_headings":"","what":"How to Apply These Terms to Your New Programs","title":"GNU General Public License","text":"develop new program, want greatest possible use public, best way achieve make free software everyone can redistribute change terms. , attach following notices program. safest attach start source file effectively state exclusion warranty; file least “copyright” line pointer full notice found. Also add information contact electronic paper mail. program terminal interaction, make output short notice like starts interactive mode: hypothetical commands show w show c show appropriate parts General Public License. course, program’s commands might different; GUI interface, use “box”. also get employer (work programmer) school, , sign “copyright disclaimer” program, necessary. information , apply follow GNU GPL, see . GNU General Public License permit incorporating program proprietary programs. program subroutine library, may consider useful permit linking proprietary applications library. want , use GNU Lesser General Public License instead License. first, please read .","code":" Copyright (C) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . Copyright (C) This program comes with ABSOLUTELY NO WARRANTY; for details type 'show w'. This is free software, and you are welcome to redistribute it under certain conditions; type 'show c' for details."},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"about-this-vignette","dir":"Articles","previous_headings":"","what":"About this vignette","title":"Analysis Across Screening Phases","text":"vignette created order show CiteSource can assist assessing impact sources methods context evidence synthesis project. order complete reliable systematic search one must include multiple resources ensure inclusion relevant studies. exact number sources necessary thorough search can vary depending topic, type review, etc. Along selection search traditional literature sources, application methods hand searching relevant journals, citation chasing/snowballing, searching websites, collecting literature stakeholders, etc. can used minimize risk missing relevant studies. developing search strategy teams often don’t understand potential impact particular resources search method. Questions can arise critical particular database question return investment weeks gray literature searching web. answers questions vary based topic scope project, CiteSource can assist better informing Evidence Synthesis community data projects shared goal vignette show CiteSource can help gather information ways sources methods impact review. data vignette based mock project. looks result searches systematic reviews meta-analyses health, environmental economic impacts wildfires. ’ll walk CiteSource can import original search results, compare information sources methods, determine source method contributed final review. questions, feedback, ideas, etc. vignette others sure check discussion board github!","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"install-and-load-citesource","dir":"Articles","previous_headings":"","what":"1. Install and Load CiteSource","title":"Analysis Across Screening Phases","text":"Use following code install CiteSource. Currently, CiteSource lives GitHub, may need first install remotes package.","code":"#Install the remotes packages to enable installation from GitHub #install.packages(\"remotes\") #library(remotes) #Install CiteSource #remotes::install_github(\"ESHackathon/CiteSource\") #Load the CiteSource library(CiteSource)"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"import-and-tag-citation-files-with-custom-metadata","dir":"Articles","previous_headings":"","what":"2. Import and tag citation files with custom metadata","title":"Analysis Across Screening Phases","text":"Start importing multiple .ris .bib files CiteSource. working local directory need provide path folder contains files wish upload. can print citation_files console ensure files expect see order, important labeling data. CiteSource works .ris .bib files straight database/resource, however, deduplication functionality relies metadata provided. Higher quality metadata ensure accurate results.","code":"#Import citation files from a folder file_path <- \"../vignettes/new_stage_data/\" citation_files <- list.files(path = file_path, pattern = \"\\\\.ris\", full.names = TRUE) #Print citation_files to double check the order in which R imported the files. citation_files #> [1] \"../vignettes/new_stage_data//Dimensions_246.ris\" #> [2] \"../vignettes/new_stage_data//econlit_3.ris\" #> [3] \"../vignettes/new_stage_data//envindex_100.ris\" #> [4] \"../vignettes/new_stage_data//final_24.ris\" #> [5] \"../vignettes/new_stage_data//lens_343.ris\" #> [6] \"../vignettes/new_stage_data//medline_84.ris\" #> [7] \"../vignettes/new_stage_data//screened_128.ris\" #> [8] \"../vignettes/new_stage_data//wos_278.ris\""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"assigning-custom-metadata","dir":"Articles","previous_headings":"","what":"3. Assigning custom metadata","title":"Analysis Across Screening Phases","text":"NOTE: CiteSource allows label records three custom fields: cite_source, cite_string, cite_label. currently cite_source cite_label primary fields CiteSource employs, cite_string operates like cite_label, plans integrate field future package functionality cite_source metadata Using cite_source field, tag files according source method found. example two .ris files represent citations included title/abstract screening full-text screening. labeled files “NA” cite_source field represent citations gathered part source method searching phase. cite_label metadata Using cite_label field, tag files according phase associated. case six database files represent search results turn labeled “search”. two citation files (screened final) files included citations title/abstract screening full-text screening labeled accordingly. tag files accordingly save raw_citations.","code":"# Create a tibble that contains metadata about the citation files imported_tbl <- tibble::tribble( ~files, ~cite_sources, ~cite_labels, \"wos_278.ris\", \"WoS\", \"search\", \"medline_84.ris\", \"Medline\", \"search\", \"econlit_3.ris\", \"EconLit\", \"search\", \"Dimensions_246.ris\", \"Dimensions\", \"search\", \"lens_343.ris\", \"Lens.org\", \"search\", \"envindex_100.ris\", \"Environment Index\", \"search\", \"screened_128.ris\", NA, \"screened\", \"final_24.ris\", NA, \"final\" ) %>% dplyr::mutate(files = paste0(file_path, files)) raw_citations <- read_citations(metadata = imported_tbl) #> Importing files ■■■ 6% #> Import completed - with the following details: #> file cite_source cite_string cite_label citations #> 1 wos_278.ris WoS search 278 #> 2 medline_84.ris Medline search 84 #> 3 econlit_3.ris EconLit search 3 #> 4 Dimensions_246.ris Dimensions search 246 #> 5 lens_343.ris Lens.org search 343 #> 6 envindex_100.ris Environment Index search 100 #> 7 screened_128.ris screened 128 #> 8 final_24.ris final 24"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"deduplication-identifying-overlapping-records","dir":"Articles","previous_headings":"","what":"4. Deduplication & Identifying Overlapping Records","title":"Analysis Across Screening Phases","text":"added custom metadata files, now able compare records within files. CiteSource uses ASySD package identify merge metadata duplicate records, maintaining cite_source, cite_label,cite_string fields record. Note pre-prints similar results identified duplicates, learn algorithm employed identifying duplicate records see (ASySD).","code":"#Identify overlapping records and consolidate unique citations unique_citations <- dedup_citations(raw_citations) #> formatting data... #> identifying potential duplicates... #> identified duplicates! #> flagging potential pairs for manual dedup... #> Joining with `by = join_by(duplicate_id.x, duplicate_id.y)` #> 1206 citations loaded... #> 690 duplicate citations removed... #> 516 unique citations remaining! # Count number of unique and non-unique citations n_unique <- count_unique(unique_citations) # Create dataframe indicating occurrence of records across sources source_comparison <- compare_sources(unique_citations, comp_type = \"sources\")"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"reviewing-internal-source-duplication","dir":"Articles","previous_headings":"","what":"5. Reviewing Internal Source Duplication","title":"Analysis Across Screening Phases","text":"imported, added custom metadata, identified duplicates, can helpful review initial record count data ensure everything looks okay. part deduplication process, duplicate records may identified within sources. initial record table provide count many records initially source file, count distinct records vary duplicates identified within source file. case, can see Lens.org 340 records, initial .ris file contained 343 citations. means CiteSource identified duplicate references within citation list. 340 remaining citations attributed source. Looking source Medline, can see CiteSource find duplicate citations within source counts read 84.","code":"# initial upload/post internal deduplication table creation initial_records <- calculate_initial_records(unique_citations, \"search\") initial_record_table <- create_initial_record_table(initial_records) initial_record_table"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"analyzing-overlap-across-sournces-methods","dir":"Articles","previous_headings":"","what":"6. Analyzing Overlap Across Sournces & Methods","title":"Analysis Across Screening Phases","text":"teams selecting databases inclusion review can extremely difficult determine best resources determine return investment terms time takes apply searches. especially true fields research relies cross-disciplinary resources. tracking reporting /citation found, evidence synthesis community turn track utility various databases/platforms identify relevant resources relates research topic. idea can extended search string comparison well various search strategies methodologies.","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"plot-overlap-as-a-heatmap-matrix-heatmap-percent-matrix","dir":"Articles","previous_headings":"6. Analyzing Overlap Across Sournces & Methods","what":"Plot overlap as a heatmap matrix & heatmap percent matrix","title":"Analysis Across Screening Phases","text":"Looking first heatmap can see heatmap organized source order record count. source count located top source’s column. count within cells represents number records overlapped two sources. Looking records imported LENS.org can see 340 records, 212 also found Dimensions 146 found Web Science. can also see 100 records imported Environmental Index, 82 found LENS. second heatmap displays overlap sources percentage. gray cell shows number citations imported source reading /column can see percent citations found intersecting source. , know Environmental Index 100 records 82 citations also Lens.org, version can see overlap reads 82%. hand look column LENS, 82 citations represent 24% 340 citations imported LENS","code":"my_heatmap_count <- plot_source_overlap_heatmap(source_comparison) my_heatmap_count my_heatmap_percent <- plot_source_overlap_heatmap(source_comparison, plot_type = \"percentages\") my_heatmap_percent"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"plot-overlap-as-an-upset-plot","dir":"Articles","previous_headings":"6. Analyzing Overlap Across Sournces & Methods","what":"Plot overlap as an upset plot","title":"Analysis Across Screening Phases","text":"powerful way looking overlap sources use upset plot, provides details overlap across sources. upset plot also provides information number unique contributions given source. example, can see search EconLit three results, , two unique found source. can also see single record EconLit unique found LENS Web Science. Wwe can also see Lens.org Web Science contributed far unique records Dimensions LENS greatest overlap, 63 records shared found source. upset plot powerful visualization tool can used number ways, including benchmark testing testing variations strings. sure review vignettes applying upset plot use cases.","code":"plot_overlap_across_sources <- plot_source_overlap_upset(source_comparison, decreasing = c(TRUE, TRUE)) #> Plotting a large number of groups. Consider reducing nset or sub-setting the data. plot_overlap_across_sources"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"analyzing-records-across-screening-phases","dir":"Articles","previous_headings":"","what":"7. Analyzing Records Across Screening Phases","title":"Analysis Across Screening Phases","text":"now reviewed overlap across sources. following, now include cite_label data well order track source’s records across screening phases. case uploaded .ris file citations included title abstract screening well full-text screening. Using contributions plot can easily see number records source, overlapping unique, across phases.","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"assessing-contribution-of-sources-by-review-stage","dir":"Articles","previous_headings":"7. Analyzing Records Across Screening Phases","what":"Assessing contribution of sources by review stage","title":"Analysis Across Screening Phases","text":"Looking plot three bar plots source order search, screened, final. green bar within phase count unique records source, red bar shows number records source overlapped least one source. case can see despite high number unique records LENS Web Science, contributed single unique citation end.","code":"plot_contributions_over_phases <- plot_contributions(n_unique, center = TRUE, bar_order = c(\"search\", \"screened\", \"final\") ) plot_contributions_over_phases"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"analyzing-data-using-tables","dir":"Articles","previous_headings":"","what":"8. Analyzing Data Using Tables","title":"Analysis Across Screening Phases","text":"Visualizations great, tables! CiteSource provides ability create tables additional analysis. Presenting data form search summary table can provide overview source’s impact (see Bethel et al. 2021 search summary tables).","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"creating-a-detailed-record-table","dir":"Articles","previous_headings":"8. Analyzing Data Using Tables","what":"Creating a Detailed Record Table","title":"Analysis Across Screening Phases","text":"detailed record provides details regarding unique records. Let’s break columns. Starting first two columns, can see data provided initial record table. Since number records imported actual number distinct records source may differ, information provided due fact distinct record count calculations based . one difference total distinct records table number deduplication, done order give accurate number records screened. next two columns, Unique Records Non-unique Records, simply shows number distinct records either unique non-unique. source contribution column gives percent distinct records source contributed total number distinct records. example, know 1051 distinct records deduplication, since LENS 340 distinct records (343 internal deduplication), percent records contributed deduplication 32.4%. 121 264 total unique citations, percent unique sources contributed 45.8% final column shows percent records unique within source. case Environmental Index can easily see source unique percent 5% lowest source.","code":"detailed_count<-calculate_detailed_records(unique_citations, n_unique, \"search\") create_detailed_record_table(detailed_count)"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"creating-a-precisionsensitivity-table","dir":"Articles","previous_headings":"8. Analyzing Data Using Tables","what":"Creating a Precision/Sensitivity Table","title":"Analysis Across Screening Phases","text":"Like contributions plot, precision/sensitivity table takes consideration data screening phases. Alongside distinct records, records included title/abstract screening phases source, table also calculates precision sensitivity (also known recall). table differentiate overlapping vs. unique records. example, can see 340 records LENS, 100 included title/abstract screening, 16 included full-text screening.","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"precision-calculation-in-the-function","dir":"Articles","previous_headings":"8. Analyzing Data Using Tables","what":"Precision Calculation in the Function:","title":"Analysis Across Screening Phases","text":"function calculates precision : Precision=Final Records SourceDistinct Records Source \\text{Precision} = \\frac{\\text{Final Records Source}}{\\text{Distinct Records Source}} Final Records Source (final): number records specific source included final synthesis. Distinct Records Source (Distinct Records): total number unique records (deduplication) source.","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"sensitivity-calculation-in-the-function","dir":"Articles","previous_headings":"8. Analyzing Data Using Tables","what":"Sensitivity Calculation in the Function:","title":"Analysis Across Screening Phases","text":"function calculates recall : Recall=Final Records SourceTotal Final Records Across Sources \\text{Recall} = \\frac{\\text{Final Records Source}}{\\text{Total Final Records Across Sources}} Final Records Source (final): number records specific source included final synthesis. Total Final Records Across Sources(Total final records): total number records made final synthesis sources combined.","code":"phase_count<-calculate_phase_records(unique_citations, citations, \"cite_source\") create_precision_sensitivity_table(phase_count)"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"citation-record-tables","dir":"Articles","previous_headings":"","what":"9. Citation Record Tables","title":"Analysis Across Screening Phases","text":"Another useful table can exported .csv record-level table. table allows users quickly identify individual citations screened /final records present/absent source. source tag default (include = “sources”), can replaced expanded ‘labels’ /‘strings’","code":"citation_table_final<-unique_citations %>% dplyr::filter(stringr::str_detect(cite_label, \"final\")) %>% record_level_table(return = \"DT\") citation_table_final"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"exporting-for-further-analysis","dir":"Articles","previous_headings":"","what":"10. Exporting for further analysis","title":"Analysis Across Screening Phases","text":"may want export deduplicated set results (dataframes) analysis save convenient format subsequent use. CiteSource offers set export functions called export_csv, export_ris export_bib save dataframes .csv file, .ris file .bib file, respectively. can reimport exported files pick project analysis without start scratch, making manual adjustments (adding missing abstract data) file.","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"generate-a--csv-file","dir":"Articles","previous_headings":"10. Exporting for further analysis","what":"Generate a .csv file","title":"Analysis Across Screening Phases","text":"separate argument can used create separate columns cite_source, cite_label cite_string facilitate analysis.","code":"#export_csv(unique_citations, filename = \"citesource_export.csv\", separate = \"cite_source\")"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"generate-a--ris-file","dir":"Articles","previous_headings":"10. Exporting for further analysis","what":"Generate a .ris file","title":"Analysis Across Screening Phases","text":"Generate .ris indicate custom field location cite_source, cite_label cite_string. example, ’ll using EndNote, put cite_sources DB field, appear “Name Database” field EndNote cite_labels C5, appear “Custom 5” metadata field EndNote.","code":"#export_ris(unique_citations, filename = \"citesource_export.ris\", source_field = \"DB\", label_field = \"C5\")"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"generate-a-bibtex-file","dir":"Articles","previous_headings":"10. Exporting for further analysis","what":"Generate a bibtex file","title":"Analysis Across Screening Phases","text":"Generate bibtex file include data cite_source, cite_label cite_string.**","code":"#export_bib(unique_citations, filename = \"citesource_export.bib\", include = c(\"sources\", \"labels\", \"strings\"))"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_analysis_across_screening_phases.html","id":"re-import-a-citesource-exported-file","dir":"Articles","previous_headings":"10. Exporting for further analysis","what":"Re-import a CiteSource exported file","title":"Analysis Across Screening Phases","text":"order reimport .csv .ris can use following. example re-import file desktop","code":"#citesource_working_example <-reimport_csv(\"citesource_export.csv\") #citesource_working_example <-reimport_ris(\"citesource_export.ris\")"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_benchmark_testing.html","id":"about-this-vignette","dir":"Articles","previous_headings":"","what":"About this vignette","title":"Benchmark Testing","text":"estimating comprehensiveness search, researchers often compile list relevant studies evaluate whether discovered using search strategy. benchmarking important step testing sensitivity search, process can time consuming variations string tested. vignette provide example CiteSource can used speed process benchmarking especially comparing variations search strings search strategies.","code":""},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_benchmark_testing.html","id":"installation-of-packages-and-loading-libraries","dir":"Articles","previous_headings":"","what":"1. Installation of packages and loading libraries","title":"Benchmark Testing","text":"Use following code install CiteSource. Currently, CiteSource lives GitHub, may need first install remotes package. vignette also uses functions ggplot2 dplyr packages.","code":"#Install the remotes packages to enable installation from GitHub #install.packages(\"remotes\") #library(remotes) #Install CiteSource #remotes::install_github(\"ESHackathon/CiteSource\") #Load the necessary libraries library(CiteSource) library(ggplot2) library(dplyr)"},{"path":"http://www.eshackathon.org/CiteSource/articles/citesource_benchmark_testing.html","id":"import-files-from-multiple-sources","dir":"Articles","previous_headings":"","what":"2. Import files from multiple sources","title":"Benchmark Testing","text":"Users can import multiple .ris .bib files CiteSource, user can label source information database platform. case uploading results six different strings, applied Web Science.","code":"# Import citation files from folder citation_files <- list.files(path = \"benchmark_data\", pattern = \"\\\\.ris\", full.names = TRUE) # Print list of citation files to console citation_files #> [1] \"benchmark_data/Benchmarking.ris\" \"benchmark_data/Search1_1.ris\" #> [3] \"benchmark_data/Search2_1.ris\" \"benchmark_data/Search2_2.ris\" #> [5] \"benchmark_data/Search2_3.ris\" \"benchmark_data/Search2_4.ris\" #> [7] \"benchmark_data/Search3_1.ris\" \"benchmark_data/Search3_2.ris\" #> [9] \"benchmark_data/Search3_3.ris\" \"benchmark_data/Search3_4.ris\" #> [11] \"benchmark_data/Search3_5.ris\" \"benchmark_data/Search4_1.ris\" #> [13] \"benchmark_data/Search4_2.ris\" \"benchmark_data/Search4_3.ris\" #> [15] \"benchmark_data/Search5_1.ris\" \"benchmark_data/Search5_2.ris\" #> [17] \"benchmark_data/Search5_3.ris\" \"benchmark_data/Search5_4.ris\" #> [19] \"benchmark_data/Search5_5.ris\" \"benchmark_data/Search5_6.ris\" #> [21] \"benchmark_data/Search5_7.ris\" \"benchmark_data/Search5_8.ris\" #> [23] \"benchmark_data/Search6_1.ris\" \"benchmark_data/Search6_2.ris\" #> [25] \"benchmark_data/Search6_3.ris\" \"benchmark_data/Search6_4.ris\" # Set the path to the directory containing the citation files file_path <- \"../vignettes/benchmark_data/\" # Create a tibble that contains metadata about the citation files metadata_tbl <- tibble::tribble( ~files, ~cite_sources, ~cite_labels, \"Benchmarking.ris\", \"Benchmark\", \"Benchmark\", \"Search1_1.ris\", \"search1\", \"search\", \"Search2_1.ris\", \"search2\", \"search\", \"Search2_2.ris\", \"search2\", \"search\", \"Search2_3.ris\", \"search2\", \"search\", \"Search2_4.ris\", \"search2\", \"search\", \"Search3_1.ris\", \"search3\", \"search\", \"Search3_2.ris\", \"search3\", \"search\", \"Search3_3.ris\", \"search3\", \"search\", \"Search3_4.ris\", \"search3\", \"search\", \"Search3_5.ris\", \"search3\", \"search\", \"Search4_1.ris\", \"search4\", \"search\", \"Search4_2.ris\", \"search4\", \"search\", \"Search4_3.ris\", \"search4\", \"search\", \"Search5_1.ris\", \"search5\", \"search\", \"Search5_2.ris\", \"search5\", \"search\", \"Search5_3.ris\", \"search5\", \"search\", \"Search5_4.ris\", \"search5\", \"search\", \"Search5_5.ris\", \"search5\", \"search\", \"Search5_6.ris\", \"search5\", \"search\", \"Search5_7.ris\", \"search5\", \"search\", \"Search5_8.ris\", \"search5\", \"search\", \"Search6_1.ris\", \"search6\", \"search\", \"Search6_2.ris\", \"search6\", \"search\", \"Search6_3.ris\", \"search6\", \"search\", \"Search6_4.ris\", \"search6\", \"search\", ) %>% # Append the file path to each file name in the 'files' column dplyr::mutate(files = paste0(file_path, files)) # Read in citations using metadata table citations <- read_citations(metadata = metadata_tbl) #> Importing files ■■ 3% #> Importing files ■■■ 7% #> Importing files ■■■■ 9% #> Importing files ■■■■ 11% #> Importing files ■■■■■ 14% #> Importing files ■■■■■■ 16% #> Importing files ■■■■■■■ 19% #> Importing files ■■■■■■■ 20% #> Importing files ■■■■■■■■ 23% #> Importing files ■■■■■■■■■ 25% #> Import completed - with the following details: #> file cite_source cite_string cite_label citations #> 1 Benchmarking.ris Benchmark Benchmark 55 #> 2 Search1_1.ris search1 search 978 #> 3 Search2_1.ris search2 search 1000 #> 4 Search2_2.ris search2 search 1000 #> 5 Search2_3.ris search2 search 1000 #> 6 Search2_4.ris search2 search 15 #> 7 Search3_1.ris search3 search 1000 #> 8 Search3_2.ris search3 search 1000 #> 9 Search3_3.ris search3 search 1000 #> 10 Search3_4.ris search3 search 1000 #> 11 Search3_5.ris search3 search 214 #> 12 Search4_1.ris search4 search 1000 #> 13 Search4_2.ris search4 search 1000 #> 14 Search4_3.ris search4 search 434 #> 15 Search5_1.ris search5 |