1 Response Letter to the reviewers of “Investigating DOIs’ Classes of Errors Dear reviewers, Thank you for your observations and your constructive criticism. We carefully read all the points that you have made in your reviews [1][2] and revised the protocol according to the remarks and the suggestions that you have thereby stated. First, according to the review written by Alessia Cioffi [1], we added a “Before Starting” section at the beginning of our protocol in which we state the computational requirements to reproduce our procedure (e.g. which programming language and libraries required) and some rules about the notation that we used to provide verbose description of the source code of our software. In addition, we followed the advice made in the same review to put further information related to the provenance of the data used in the project, by adding the citation to the Zenodo repository of our input csv file in secti on “1. Data Import”. Moreover, to enhance the readability of the protocol, we added a tabular visualization of a sample of the CSV file which we use as input in our procedure. Following another remark made by Cioffi, we added the regular expressions that we used for cleaning prefix-type and suffix-type errors in section “2. Error Analysis”. The reason why they were not present in the first release of the protocol was because the software was not entirely available yet. Additionally, according to Cioffi, in the first version of our protocol it was not clear how the classes of errors were identified and stored in our procedure. In addition, in the review written by Arianna Moretti [2], the author suggested adding source code illustrations as well as verbose explanations of our data cleaning procedure to test the soundness of our methodology. As a consequence, we revised the whole section 3, now called “3. Data Cleaning Procedure” in order to provide an extensive description of our data cleaning methodology. Precisely, in this section we provide: 1. a graphic visualization of the workflow involved in the cleaning procedure, 2. a textual description of each sub-step involved, 3. we present the algorithmic functions used to process data, the lines of code to be executed in order to reproduce each sub-step, and how the output of each sub-step, from start to finish, is expected to look like. We expect, with this protocol, to explain clearly how we classify DOIs which already became valid at the time of our research, how we classify the DOIs with respect to the type of errors that were cleaned if they are not valid, how we deal with corrected DOIs, once they are cleaned, and how we store our data in a standardized format (e.g. CSV). We expect this section also to be a guide on how to reuse our software and reproduce our experiment for other developers and researchers, as also stated in our Data Management Plan [3]. Besides, to enhance the access to the data generated by our work, in the same section we provide a link to the Zenodo repositories in which we make available the first release of our software and a sample of our output data. Moreover, also in section 3, we provide the link to our Data Management Plan in order to link the protocol to further information about data sustainability and data reuse, as suggested by both Cioffi and Moretti.