{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:04:37Z","timestamp":1759971877328,"version":"build-2065373602"},"reference-count":0,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2007,3,22]],"date-time":"2007-03-22T00:00:00Z","timestamp":1174521600000},"content-version":"vor","delay-in-days":11709,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[1975,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Appending a checksum (also known as checkring] digit[sl, or control digit[s] \/sum) to a lengthy non\u2010mnemonic number sequence represents one technical control over transcription errors. Different checksum procedures are used by different nations (e.g., France, Denmark, Canada) for their personal identifiers (The U.S. does not use a checksum). This study reflects an attempt to discover the most effective procedure.<\/jats:p>","DOI":"10.1002\/asi.4630260208","type":"journal-article","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T01:18:30Z","timestamp":1182993510000},"page":"125-128","source":"Crossref","is-referenced-by-count":1,"title":["Comparison of checksum procedures by simulation"],"prefix":"10.1002","volume":"26","author":[{"given":"John M.","family":"Carroll","sequence":"first","affiliation":[]},{"given":"John","family":"Cakarnis","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,22]]},"container-title":["Journal of the American Society for Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.4630260208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.4630260208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:39:32Z","timestamp":1759945172000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.4630260208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1975,3]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1975,3]]}},"alternative-id":["10.1002\/asi.4630260208"],"URL":"https:\/\/doi.org\/10.1002\/asi.4630260208","archive":["Portico"],"relation":{},"ISSN":["0002-8231","1097-4571"],"issn-type":[{"type":"print","value":"0002-8231"},{"type":"electronic","value":"1097-4571"}],"subject":[],"published":{"date-parts":[[1975,3]]}}}