{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T23:18:06Z","timestamp":1768778286338,"version":"3.49.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Annals Hist. Comput."],"published-print":{"date-parts":[[1995]]},"DOI":"10.1109\/85.397061","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T19:45:59Z","timestamp":1030218359000},"page":"58-66","source":"Crossref","is-referenced-by-count":6,"title":["Lock-in and the costs of switching mainframe computer vendors in the US federal government in the 1970s"],"prefix":"10.1109","volume":"17","author":[{"given":"S.M.","family":"Greenstein","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"BIBA3005817","article-title":"clio and the economics of qwerty","author":"david","year":"1985","journal-title":"American Economic Rev"},{"key":"BIBA3005818","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511559938.010"},{"key":"BIBA3005815","author":"cowan","year":"1987","journal-title":"Backing the Wrong Horse Sequential Technology Choice Under Increasing Returns"},{"key":"BIBA3005816","article-title":"the landscape and the machine: technical interrelatedness, land tenure and the mechanization of the corn harvest in victorian britain","author":"david","year":"1975","journal-title":"Technical Choice Innovation and Economic Growth"},{"key":"BIBA3005813","article-title":"competing technologies: an overview","author":"arthur","year":"1988","journal-title":"Technical Change and Economic Theory"},{"key":"BIBA3005814","doi-asserted-by":"publisher","DOI":"10.2307\/2234208"},{"key":"BIBA3005811","author":"fisher","year":"1983","journal-title":"Folded Spindled and Mutilated Economic Analysis and US vs IBM"},{"key":"BIBA3005812","author":"fisher","year":"1983","journal-title":"IBM and the US Data Processing Industry an Economic History"},{"key":"BIBA3005836","article-title":"narrow windows, blind giants and angry orphans: the dynamics of systems rivalries and dilemmas of technology policy","volume":"3","author":"david","year":"1990","journal-title":"Innovation Diffusion"},{"key":"BIBA3005835","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.SP.500-79","author":"gray","year":"1981","journal-title":"An Assessment and Forecast of ADP in the Federal Government"},{"key":"BIBA3005834","year":"1980","journal-title":"Data Base Directions ? The Conversion Problem"},{"key":"BIBA3005833","year":"1980","journal-title":"Conversion of Federal ADP Systems A Tutorial"},{"key":"BIBA3005839","author":"jr","year":"1972","journal-title":"The Mythical Man Month Essays in Software Engineering"},{"key":"BIBA3005838","doi-asserted-by":"publisher","DOI":"10.2307\/2950477"},{"key":"BIBA3005819","doi-asserted-by":"publisher","DOI":"10.1080\/10438599000000002"},{"key":"BIBA3005837","year":"0","journal-title":"Auerbach Standard EDP Reports"},{"key":"BIBA3005831","year":"1984","journal-title":"Preparing Software Conversion Studies"},{"key":"BIBA3005832","year":"1986","journal-title":"Conversion Cost Model (Version 4) Cost Model Handbook"},{"key":"BIBA3005830","year":"1983","journal-title":"Software Conversion Lessons Learned Volume I"},{"key":"BIBA3005810","doi-asserted-by":"publisher","DOI":"10.1086\/466942"},{"key":"BIBA3005823","year":"0","journal-title":"EDP Industry Report"},{"key":"BIBA3005822","doi-asserted-by":"publisher","DOI":"10.2307\/2098492"},{"key":"BIBA3005825","article-title":"millions in savings possible in converting programs from one computer to another","year":"1977"},{"key":"BIBA3005824","doi-asserted-by":"publisher","DOI":"10.2190\/P7QL-4G11-QGH5-L891"},{"key":"BIBA3005827","year":"1981","journal-title":"Conversion Contracting Techniques Associated with Procurement of Replacement ADP Hardware System"},{"key":"BIBA3005844","doi-asserted-by":"publisher","DOI":"10.2307\/2555951"},{"key":"BIBA3005826","article-title":"conversion: a costly, disruptive process that must be considered when buying computers","year":"1980"},{"key":"BIBA3005829","year":"1983","journal-title":"Conversion Plan Outline"},{"key":"BIBA3005828","year":"1982","journal-title":"Conversion Work Packages"},{"key":"BIBA3005840","first-page":"453","article-title":"switching costs and bidding parity in government procurement of computer systems","volume":"6","author":"cabral","year":"1990","journal-title":"J Law Economics and Organizations"},{"key":"BIBA3005841","article-title":"the application of a hedonic model to quality-adjusted price index for computer processors","author":"dulberger","year":"1989","journal-title":"Technology and Capital Formation"},{"key":"BIBA3005842","article-title":"the postwar evolution of computer prices","author":"gordon","year":"1989","journal-title":"Technology and Capital Formation"},{"key":"BIBA3005843","first-page":"39","article-title":"the identification problem in econometric models of duration data","author":"heckman","year":"1982","journal-title":"Advances in Econometrics"},{"key":"BIBA3005820","doi-asserted-by":"publisher","DOI":"10.1017\/S0022050700037153"},{"key":"BIBA300588","doi-asserted-by":"publisher","DOI":"10.2307\/1910989"},{"key":"BIBA300589","author":"williamson","year":"1975","journal-title":"Markets and Hierarchies Analysis and Antitrust Implications"},{"key":"BIBA3005821","doi-asserted-by":"publisher","DOI":"10.2307\/3117053"},{"key":"BIBA300586","doi-asserted-by":"publisher","DOI":"10.2307\/2555540"},{"key":"BIBA300587","doi-asserted-by":"publisher","DOI":"10.1111\/j.1465-7295.1992.tb01972.x"},{"key":"BIBA300584","article-title":"optimal contracts with lock-in","author":"farrell","year":"1989","journal-title":"American Economics Rev"},{"key":"BIBA300585","doi-asserted-by":"publisher","DOI":"10.2307\/1885068"},{"key":"BIBA300582","doi-asserted-by":"publisher","DOI":"10.2307\/2555589"},{"key":"BIBA300583","doi-asserted-by":"publisher","DOI":"10.2307\/2555402"},{"key":"BIBA300581","first-page":"20","year":"1987","journal-title":"Federal Government Information Technology Management Security and Con gressional Oversight"}],"container-title":["IEEE Annals of the History of Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx4\/85\/8988\/00397061.pdf?arnumber=397061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:18:40Z","timestamp":1638217120000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/397061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"references-count":44,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/85.397061","relation":{},"ISSN":["1058-6180"],"issn-type":[{"value":"1058-6180","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}