{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:00:41Z","timestamp":1754157641647,"version":"3.41.2"},"reference-count":4,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[1995,8,1]],"date-time":"1995-08-01T00:00:00Z","timestamp":807235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995,8,1]]},"abstract":"<jats:p>Argues that the personal computer is dead as a workplace\nphenomenon. Suggests that the financial pay\u2010off associated with using\npersonal computers to increase knowledge and worker productivity is no\nlonger viable; and that leading\u2010edge organizations are in transition\nbetween the close of the PC era and the accession of the new age of\nvalue\u2010on\u2010demand interpersonal computing. Highlights failings of the\npersonal computer paradigm including points such as: focus on the\nindividual and the desktop is misplaced; and the PC paradigm is flawed\nbecause the world which spawned such thinking no longer exists.\nConcludes by providing an action plan for conquering the interpersonal\ncomputer interregnum.<\/jats:p>","DOI":"10.1108\/09685229510092020","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"25-33","source":"Crossref","is-referenced-by-count":0,"title":["The interpersonal computer interregnum"],"prefix":"10.1108","volume":"3","author":[{"given":"Thornton A.","family":"May","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022012519533255100_b2","unstructured":"2. Patton, P., \u201cFeeling\nat home at the office\u201d, New York Times, 27\nAugust 1992, p. C\u20101."},{"key":"key2022012519533255100_b4","unstructured":"4. Dillard, M., \u201cAfter\nthe hurricane, Burger King changes\u201d, New York Times, 10 October 1992, p. 25."},{"key":"key2022012519533255100_b5","unstructured":"5. O\u2032Malley, M., Keeping Watch:\nA History of American Time, Viking Penguin, New\nYork, NY, 1990, p. 9."},{"key":"key2022012519533255100_b6","unstructured":"6. Lewis, P.H., \u201cBarring\nthe door to the ivory tower\u201d, New York Times,\n11 October 1992, p. 8."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229510092020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229510092020\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229510092020\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:35Z","timestamp":1753402175000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/3\/3\/25-33\/184349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,8,1]]},"references-count":4,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,8,1]]}},"alternative-id":["10.1108\/09685229510092020"],"URL":"https:\/\/doi.org\/10.1108\/09685229510092020","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1995,8,1]]}}}