{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:06:44Z","timestamp":1759972004626,"version":"build-2065373602"},"reference-count":18,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2007,9,6]],"date-time":"2007-09-06T00:00:00Z","timestamp":1189036800000},"content-version":"vor","delay-in-days":9136,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[1982,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>We are moving toward a postindustrial society in which knowledge and information are strategic resources. Central to this society are information, communication, and computer technology implying social changes, which in turn imply major policy questions. There is a need to consider the present and future effect of large\u2010scale computerization on the individual's rights, style of life, method of work, and the ways in which society and institutions operate.<\/jats:p>","DOI":"10.1002\/asi.4630330509","type":"journal-article","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T11:46:51Z","timestamp":1278503211000},"page":"302-307","source":"Crossref","is-referenced-by-count":4,"title":["Computers and the Postindustrial Society: Symbiosis or Information Tyranny?"],"prefix":"10.1002","volume":"33","author":[{"given":"Susan","family":"Artandi","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,9,6]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630300104"},{"key":"e_1_2_1_3_2","first-page":"163","volume-title":"The Computer Age A Twenty Yew View.","author":"Bell D.","year":"1979"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.195.4283.1186"},{"key":"e_1_2_1_5_2","first-page":"3","article-title":"Prospectives for the '80s.","volume":"7","author":"Cowen R. C","year":"1980","journal-title":"Current"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.131.3410.1355"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.132.3429.741"},{"key":"e_1_2_1_8_2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1080\/00963402.1978.11458531","article-title":"Once More a Computer Revolution.","volume":"34","author":"Weizenbaum J.","year":"1978","journal-title":"Bulletin of the Atomic Scientist"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02700060"},{"key":"e_1_2_1_10_2","first-page":"212","volume-title":"The Computer Age: A Twenty Year View.","author":"Simon H. A","year":"1979"},{"key":"e_1_2_1_11_2","unstructured":"Sheridan T. B \u201cComputer Control and Human Alienation.\u201dTechnology Review.61\u201373;1980."},{"volume-title":"Information Management for the 1980s. Proceedings of the 40th ASZS Annual Meeting.","year":"1977","author":"Mahood H. R","key":"e_1_2_1_12_2"},{"key":"e_1_2_1_13_2","first-page":"2","article-title":"The Dossier Society: Computers Have Us Under the Thumb.","volume":"10","author":"Quigg H. D","year":"1980","journal-title":"Moneysworth"},{"key":"e_1_2_1_14_2","first-page":"3","volume-title":"The Computer Age: A Twenty Year View.","author":"Moses J.","year":"1979"},{"key":"e_1_2_1_15_2","first-page":"190","article-title":"The Impact of Computers on Privacy.","volume":"25","author":"Westin A. F","year":"1979","journal-title":"Datamation"},{"key":"e_1_2_1_16_2","first-page":"44","article-title":"Uncle Sam's Computer Has Got You.","volume":"84","author":"Bacon D. C","year":"1978","journal-title":"U.S. News & World Report"},{"key":"e_1_2_1_17_2","first-page":"49","article-title":"The Weakest Go to the Wall.","volume":"26","author":"Cherlin M.","year":"1980","journal-title":"Datamation"},{"key":"e_1_2_1_18_2","first-page":"30","article-title":"The Inhuman Office of the Future.","volume":"6","author":"Stewart J.","year":"1979","journal-title":"Current"},{"key":"e_1_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/0040-1625(77)90022-1"}],"container-title":["Journal of the American Society for Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.4630330509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.4630330509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T18:22:23Z","timestamp":1759947743000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.4630330509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1982,9]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1982,9]]}},"alternative-id":["10.1002\/asi.4630330509"],"URL":"https:\/\/doi.org\/10.1002\/asi.4630330509","archive":["Portico"],"relation":{},"ISSN":["0002-8231","1097-4571"],"issn-type":[{"type":"print","value":"0002-8231"},{"type":"electronic","value":"1097-4571"}],"subject":[],"published":{"date-parts":[[1982,9]]}}}