{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:51:54Z","timestamp":1773082314261,"version":"3.50.1"},"reference-count":22,"publisher":"American Accounting Association","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n               <jats:p>This paper presents a do-it-yourself algorithm to generate the historical GVKEY-CIK link table. The proposed algorithm features a technique of pre-classifying sample data into different treatment subgroups and utilizing historical firm information available from the source data to increase (reduce) matching efficiency (errors). Simulation results show that our algorithm is superior to applying only conventional name matching operations over the whole sample: 57.5 percent of the overall matching results are error free ex ante, and for the remaining 42.5 percent of data, records without Type I errors (with Type II errors) increase (decrease) by 34.0 percent (59.4 percent) when the optimal threshold is used.<\/jats:p>\n               <jats:p>JEL Classifications:\u2002C89; M40; G10; G18.<\/jats:p>","DOI":"10.2308\/isys-18-068","type":"journal-article","created":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T21:22:47Z","timestamp":1580246567000},"page":"27-46","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Algorithm for Generating a GVKEY-CIK Link Table"],"prefix":"10.2308","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2365-0471","authenticated-orcid":true,"given":"K. C. Kenneth","family":"Chu","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Sipeng","family":"Chen","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Tommy","family":"Leung","sequence":"additional","affiliation":[{"name":"The Hang Seng University of Hong Kong"}]}],"member":"1112","published-online":{"date-parts":[[2020,1,28]]},"reference":[{"key":"2024082915272761600_i1558-7959-35-1-27-Amiram1","doi-asserted-by":"crossref","unstructured":"Amiram,\n              D.,\n            \n            \n              Owens\n              E.,\n             and\n\t\t\t\t\t\tRozenbaumO.\n          2016.\n\t\t\t\t\tDo information releases increase or decrease information asymmetry? New evidence from analyst forecast announcements.\n\t\t\t\t\tJournal of Accounting and Economics62 (\n\t\t\t\t\t1):\n\t\t\t\t\t121\u2013\n\t\t\t\t\t138.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jacceco.2016.06.001","DOI":"10.1016\/j.jacceco.2016.06.001"},{"key":"2024082915272761600_i1558-7959-35-1-27-Christen1","doi-asserted-by":"crossref","unstructured":"Christen,\n              P.\n            \n          \n          2006.\n\t\t\t\t\tA comparison of personal name matching: Techniques and practical issues.\n\t\t\t\t\tAvailable at: https:\/\/ieeexplore.ieee.org\/document\/4063641","DOI":"10.1109\/ICDMW.2006.2"},{"key":"2024082915272761600_i1558-7959-35-1-27-Chychyla1","doi-asserted-by":"crossref","unstructured":"Chychyla,\n              R.,\n             and\n\t\t\t\t\t\tKoganA.\n          2015.\n\t\t\t\t\tUsing XBRL to conduct a large-scale study of discrepancies between the accounting numbers in Compustat and SEC 10-K filings.\n\t\t\t\t\tJournal of Information Systems29 (\n\t\t\t\t\t1):\n\t\t\t\t\t37\u2013\n\t\t\t\t\t72.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-50922","DOI":"10.2308\/isys-50922"},{"key":"2024082915272761600_i1558-7959-35-1-27-Daniel1","doi-asserted-by":"crossref","unstructured":"Daniel,\n              K.,\n             and\n\t\t\t\t\t\tTitmanS.\n          1997.\n\t\t\t\t\tEvidence on the characteristics of cross sectional variation in stock returns.\n\t\t\t\t\tThe Journal of Finance52 (\n\t\t\t\t\t1):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t33.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1540-6261.1997.tb03806.x","DOI":"10.1111\/j.1540-6261.1997.tb03806.x"},{"key":"2024082915272761600_i1558-7959-35-1-27-Davis1","doi-asserted-by":"crossref","unstructured":"Davis,\n              J. L.,\n            \n            \n              Fama\n              E. F.,\n             and\n\t\t\t\t\t\tFrenchK. R.\n          2000.\n\t\t\t\t\tCharacteristics, covariances, and average returns: 1929 to 1997.\n\t\t\t\t\tThe Journal of Finance55 (\n\t\t\t\t\t1):\n\t\t\t\t\t389\u2013\n\t\t\t\t\t406.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/0022-1082.00209","DOI":"10.1111\/0022-1082.00209"},{"key":"2024082915272761600_i1558-7959-35-1-27-Engelberg1","doi-asserted-by":"crossref","unstructured":"Engelberg,\n              J.,\n             and\n\t\t\t\t\t\tSankaraguruswamyS.\n          2007.\n\t\t\t\t\tHow to gather data using a web crawler: An application using SAS to search EDGAR.\n\t\t\t\t\tAvailable at: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1015021","DOI":"10.2139\/ssrn.1015021"},{"key":"2024082915272761600_i1558-7959-35-1-27-Fama1","doi-asserted-by":"crossref","unstructured":"Fama,\n              E. F.,\n             and\n\t\t\t\t\t\tFrenchK. R.\n          1992.\n\t\t\t\t\tThe cross-section of expected stock returns.\n\t\t\t\t\tThe Journal of Finance47 (\n\t\t\t\t\t2):\n\t\t\t\t\t427\u2013\n\t\t\t\t\t465.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1540-6261.1992.tb04398.x","DOI":"10.1111\/j.1540-6261.1992.tb04398.x"},{"key":"2024082915272761600_i1558-7959-35-1-27-Fama2","doi-asserted-by":"crossref","unstructured":"Fama,\n              E. F.,\n             and\n\t\t\t\t\t\tFrenchK. R.\n          1993.\n\t\t\t\t\tCommon risk factors in the returns on stocks and bonds.\n\t\t\t\t\tJournal of Financial Economics33 (\n\t\t\t\t\t1):\n\t\t\t\t\t3\u2013\n\t\t\t\t\t56.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/0304-405X(93)90023-5","DOI":"10.1016\/0304-405X(93)90023-5"},{"key":"2024082915272761600_i1558-7959-35-1-27-Fellegi1","doi-asserted-by":"crossref","unstructured":"Fellegi,\n              I. P.,\n             and\n\t\t\t\t\t\tSunterA. B.\n          1969.\n\t\t\t\t\tA theory for record linkage.\n\t\t\t\t\tJournal of the American Statistical Association64 (\n\t\t\t\t\t328):\n\t\t\t\t\t1183\u2013\n\t\t\t\t\t1210.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/01621459.1969.10501049","DOI":"10.1080\/01621459.1969.10501049"},{"key":"2024082915272761600_i1558-7959-35-1-27-Gleason1","doi-asserted-by":"crossref","unstructured":"Gleason,\n              C. A.,\n             and\n\t\t\t\t\t\tLeeC. M.\n          2003.\n\t\t\t\t\tAnalyst forecast revisions and market price discovery.\n\t\t\t\t\tThe Accounting Review78 (\n\t\t\t\t\t1):\n\t\t\t\t\t193\u2013\n\t\t\t\t\t225.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/accr.2003.78.1.193","DOI":"10.2308\/accr.2003.78.1.193"},{"key":"2024082915272761600_i1558-7959-35-1-27-Hevner1","unstructured":"Hevner,\n              A. R.\n            \n          \n          2007.\n\t\t\t\t\tA three cycle view of design science research.\n\t\t\t\t\tScandinavian Journal of Information Systems19 (\n\t\t\t\t\t2):\n\t\t\t\t\t4."},{"key":"2024082915272761600_i1558-7959-35-1-27-Hevner2","doi-asserted-by":"crossref","unstructured":"Hevner,\n              A.,\n             and\n\t\t\t\t\t\tChatterjeeS.\n          2010.\n\t\t\t\t\tDesign science research in information systems.\n\t\t\t\t\tInDesign Research in Information Systems,\n\t\t\t\t\t9\u2013\n\t\t\t\t\t22.\n\t\t\t\t\tNew York, NY:\n\t\t\t\t\tSpringer.","DOI":"10.1007\/978-1-4419-5653-8_2"},{"key":"2024082915272761600_i1558-7959-35-1-27-Hevner3","doi-asserted-by":"crossref","unstructured":"Hevner,\n              A. R.,\n            \n            \n              March\n              S. T.,\n            \n            \n              Park\n              J.,\n             and\n\t\t\t\t\t\tRamS.\n          2004.\n\t\t\t\t\tDesign science in information systems research.\n\t\t\t\t\tMIS Quarterly28 (\n\t\t\t\t\t1):\n\t\t\t\t\t75\u2013\n\t\t\t\t\t105.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/25148625","DOI":"10.2307\/25148625"},{"key":"2024082915272761600_i1558-7959-35-1-27-Hilary1","doi-asserted-by":"crossref","unstructured":"Hilary,\n              G.,\n             and\n\t\t\t\t\t\tHsuC.\n          2013.\n\t\t\t\t\tAnalyst forecast consistency.\n\t\t\t\t\tThe Journal of Finance68 (\n\t\t\t\t\t1):\n\t\t\t\t\t271\u2013\n\t\t\t\t\t297.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1540-6261.2012.01800.x","DOI":"10.1111\/j.1540-6261.2012.01800.x"},{"key":"2024082915272761600_i1558-7959-35-1-27-Hoberg1","doi-asserted-by":"crossref","unstructured":"Hoberg,\n              G.,\n             and\n\t\t\t\t\t\tPhillipsG.\n          2016.\n\t\t\t\t\tText-based network industries and endogenous product differentiation.\n\t\t\t\t\tJournal of Political Economy124 (\n\t\t\t\t\t5):\n\t\t\t\t\t1423\u2013\n\t\t\t\t\t1465.\n\t\t\t\t\thttps:\/\/doi.org\/10.1086\/688176","DOI":"10.1086\/688176"},{"key":"2024082915272761600_i1558-7959-35-1-27-Hodges1","doi-asserted-by":"crossref","unstructured":"Hodges,\n              J. L.\n            \n          \n          2019.\n\t\t\t\t\tDesign patterns.\n\t\t\t\t\tInSoftware Engineering from Scratch,\n\t\t\t\t\t297\u2013\n\t\t\t\t\t300.\n\t\t\t\t\tNew York, NY:\n\t\t\t\t\tSpringer.","DOI":"10.1007\/978-1-4842-5206-2_14"},{"key":"2024082915272761600_i1558-7959-35-1-27-Kasznik1","doi-asserted-by":"crossref","unstructured":"Kasznik,\n              R.,\n             and\n\t\t\t\t\t\tMcNicholsM. F.\n          2002.\n\t\t\t\t\tDoes meeting earnings expectations matter? Evidence from analyst forecast revisions and share prices.\n\t\t\t\t\tJournal of Accounting Research40 (\n\t\t\t\t\t3):\n\t\t\t\t\t727\u2013\n\t\t\t\t\t759.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/1475-679X.00069","DOI":"10.1111\/1475-679X.00069"},{"key":"2024082915272761600_i1558-7959-35-1-27-Li1","doi-asserted-by":"crossref","unstructured":"Li,\n              F.\n            \n          \n          2008.\n\t\t\t\t\tAnnual report readability, current earnings, and earnings persistence.\n\t\t\t\t\tJournal of Accounting and Economics45 (\n\t\t\t\t\t2\/3):\n\t\t\t\t\t221\u2013\n\t\t\t\t\t247.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jacceco.2008.02.003","DOI":"10.1016\/j.jacceco.2008.02.003"},{"key":"2024082915272761600_i1558-7959-35-1-27-Lundholm1","doi-asserted-by":"crossref","unstructured":"Lundholm,\n              R. J.,\n            \n            \n              Rogo\n              R.,\n             and\n\t\t\t\t\t\tZhangJ. L.\n          2014.\n\t\t\t\t\tRestoring the Tower of Babel: How foreign firms communicate with U.S. investors.\n\t\t\t\t\tThe Accounting Review89 (\n\t\t\t\t\t4):\n\t\t\t\t\t1453\u2013\n\t\t\t\t\t1485.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/accr-50725","DOI":"10.2308\/accr-50725"},{"key":"2024082915272761600_i1558-7959-35-1-27-Prilmeier1","doi-asserted-by":"crossref","unstructured":"Prilmeier,\n              R.\n            \n          \n          2017.\n\t\t\t\t\tWhy do loans contain covenants? Evidence from lending relationships.\n\t\t\t\t\tJournal of Financial Economics123 (\n\t\t\t\t\t3):\n\t\t\t\t\t558\u2013\n\t\t\t\t\t579.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jfineco.2016.12.007","DOI":"10.1016\/j.jfineco.2016.12.007"},{"key":"2024082915272761600_i1558-7959-35-1-27-Snae1","unstructured":"Snae,\n              C.\n            \n          \n          2007.\n\t\t\t\t\tA comparison and analysis of name matching algorithms.\n\t\t\t\t\tInternational Journal of Applied Science. Engineering and Technology4 (\n\t\t\t\t\t1):\n\t\t\t\t\t252\u2013\n\t\t\t\t\t257."},{"key":"2024082915272761600_i1558-7959-35-1-27-So1","doi-asserted-by":"crossref","unstructured":"So,\n              E. C.\n            \n          \n          2013.\n\t\t\t\t\tA new approach to predicting analyst forecast errors: Do investors overweight analyst forecasts?Journal of Financial Economics108 (\n\t\t\t\t\t3):\n\t\t\t\t\t615\u2013\n\t\t\t\t\t640.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jfineco.2013.02.002","DOI":"10.1016\/j.jfineco.2013.02.002"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/35\/1\/27\/7652\/i1558-7959-35-1-27.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/35\/1\/27\/7652\/i1558-7959-35-1-27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T16:57:48Z","timestamp":1724950668000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/35\/1\/27\/958\/A-Novel-Algorithm-for-Generating-a-GVKEY-CIK-Link"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,28]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1,28]]},"published-print":{"date-parts":[[2021,3,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-18-068","relation":{},"ISSN":["1558-7959","0888-7985"],"issn-type":[{"value":"1558-7959","type":"electronic"},{"value":"0888-7985","type":"print"}],"subject":[],"published":{"date-parts":[[2020,1,28]]}}}