%0 Journal Article %T A Chain Perspective on Large-scale Number Systems %A J.H.A.M. Grijpink %J Journal of Chain-Computerisation %D 2012 %I Utrecht University Library Open Access Journals %X As large-scale number systems gain significance in social and economic life (electronic communication, remote electronic authentication), the correct functioning and the integrity of public number systems take on crucial importance. They are needed to uniquely indicate people, objects or phenomena in the ever-increasing digitisation of our information society. Number systems fulfil many functions, often several at the same time. Due to poor system design and management people can in many ways manipulate number systems or number verifications to claim rights or other advantages and to render oneself invisible and untraceable by hiding behind somebody else's personal number. In practice, a personal number is often used as claim of identity, both online and offline, both honestly and dishonestly. At present, our large-scale number systems are vulnerable to the misuse of personal numbers (identity fraud/theft). Moreover, the usual multi-chain usage of large-scale personal number systems turns out to be very problematic. Thus, the design and management of number systems are becoming more and more vital to our information society. Unfortunately, the study of large-scale number systems has long been neglected in Public Administration Science as well as in Information Science. To fill this gap this article presents a number system theory based on the theory of Chain-computerisation. It explaines some important insights that have to be taken into account when designing, implementing and managing large-scale number systems. This article is only available in English. As large-scale number systems gain significance in social and economic life (electronic communication, remote electronic authentication), the correct functioning and the integrity of public number systems take on crucial importance. They are needed to uniquely indicate people, objects or phenomena in the ever-increasing digitisation of our information society. Number systems fulfil many functions, often several at the same time. Due to poor system design and management people can in many ways manipulate number systems or number verifications to claim rights or other advantages and to render oneself invisible and untraceable by hiding behind somebody else's personal number. In practice, a personal number is often used as claim of identity, both online and offline, both honestly and dishonestly. At present, our large-scale number systems are vulnerable to the misuse of personal numbers (identity fraud/theft). Moreover, the usual multi-chain usage of large-scale personal number systems turns out to be ve %K authentication %K large-scale personal number system %K Chain-computerisation %K information strategy %K identity management %K interoperability %K privacy %K security %U http://jcc.library.uu.nl/index.php/JCC/article/view/36