{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:37:43Z","timestamp":1754156263922,"version":"3.41.2"},"reference-count":44,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T00:00:00Z","timestamp":1745193600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JD"],"published-print":{"date-parts":[[2025,4,28]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This paper aims to reframe contemporary research on conspiracy narratives by examining a formative document in online conspiracy culture using bibliographic archeology and focusing on its use of intertextuality.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The study\u2019s methodology is bibliographic archeology. After identifying a document that is particularly notable in the genealogy of contemporary conspiracy cultures, instances of intertextuality are counted and classified. Next, patterns in the data are identified and compared against the interpretive frameworks proposed in existing literature.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Although the Ong\u2019s Hat narrative is constructed using a combination of authentic and fictional sources, both are subjected to the same interpretive techniques. These interpretive techniques include antagonistic framing and other features that are consistent with Walter Ong\u2019s concept of \u201csecondary orality.\u201d<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This paper establishes genealogical connections between recent game-like conspiracy movements and one of their early antecedents. By focusing on intertextuality\u2019s role in constructing such narratives, the paper also demonstrates bibliographic methodologies\u2019 utility in explaining the narrative cohesion of conspiracy narratives.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-07-2024-0185","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T12:37:36Z","timestamp":1744979856000},"page":"829-842","source":"Crossref","is-referenced-by-count":0,"title":["A bibliographic archeology of game-like conspiracy narratives: examining the Ong\u2019s Hat <i>Incunabula<\/i> catalog"],"prefix":"10.1108","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3236-8486","authenticated-orcid":false,"given":"James A.","family":"Hodges","sequence":"first","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2025,4,21]]},"reference":[{"issue":"1","key":"key2025042506291069300_ref001","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1163\/2451859X-12340103","article-title":"The mystery of Cicada 3301: constructing gnosis in cyberspace","volume":"6","year":"2021","journal-title":"Gnosis: Journal of Gnostic Studies"},{"key":"key2025042506291069300_ref002","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1142\/9789811203961_0023","volume-title":"Black Holes and Entropy","year":"2019"},{"issue":"2","key":"key2025042506291069300_ref003","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1353\/ral.2005.0061","article-title":"On the theoretical foundations of orality and literacy","volume":"30","year":"1999","journal-title":"Research in African Literatures"},{"volume-title":"Conspiracy Theories in the Time of Covid-19","year":"2023","key":"key2025042506291069300_ref004","doi-asserted-by":"publisher","DOI":"10.4324\/9781003315438"},{"issue":"1","key":"key2025042506291069300_ref005","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1353\/cj.2024.a944426","article-title":"Conspiracy theory goes to hollywood: an audiovisual analysis of the documentary film plandemic","volume":"64","year":"2024","journal-title":"Journal of Communication and Media Studies: Journal of Cinema and Media Studies"},{"key":"key2025042506291069300_ref006","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1145\/2556288.2557245","article-title":"Design tactics for authentic interactive fiction: insights from alternate reality game designers","year":"2014"},{"issue":"2","key":"key2025042506291069300_ref007","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1177\/15554120231203859","article-title":"Play and misinformation: how America\u2019s conspiracy culture became gamified","volume":"20","year":"2023","journal-title":"Games and Culture"},{"volume-title":"Conspiracy Panics: Political Rationality and Popular Culture","year":"2008","key":"key2025042506291069300_ref008"},{"key":"key2025042506291069300_ref009","doi-asserted-by":"crossref","unstructured":"Butter, M. and Knight, P. (2018), \u201cThe history of conspiracy theory research\u201d, in Uscinski, J.E. (Ed.), Conspiracy Theories and the People Who Believe Them, Oxford University Press, pp.\u00a033-36.","DOI":"10.1093\/oso\/9780190844073.003.0002"},{"volume-title":"Creative Imagination in the Sufism of Ibn Arabi","year":"2014","key":"key2025042506291069300_ref010","doi-asserted-by":"publisher","DOI":"10.1515\/9781400853670"},{"key":"key2025042506291069300_ref011","doi-asserted-by":"crossref","unstructured":"Cosentino, G. (2020), \u201cFrom pizzagate to the great replacement: the globalization of conspiracy theories\u201d, in Cosentino, G. (Ed.), Social Media and the Post-Truth World Order: the Global Dynamics of Disinformation, Springer International Publishing, Cham, pp.\u00a059-86, doi: 10.1007\/978-3-030-43005-4_3.","DOI":"10.1007\/978-3-030-43005-4_3"},{"key":"key2025042506291069300_ref012","doi-asserted-by":"publisher","DOI":"10.3389\/fcomm.2021.707595","article-title":"QAnon propaganda on Twitter as information warfare: influencers, networks, and narratives","volume":"6","year":"2021","journal-title":"Frontiers in Communication"},{"key":"key2025042506291069300_ref013","doi-asserted-by":"crossref","unstructured":"Duggan, E. (2018), \u201cSquaring the (magic) circle: a brief definition and history of pervasive games\u201d, in Nijholt, A. (Ed.), Playable Cities: the City as a Digital Playground, Springer, New York, NY, pp.\u00a0111-135.","DOI":"10.1007\/978-981-10-1962-3_6"},{"issue":"2","key":"key2025042506291069300_ref014","doi-asserted-by":"publisher","DOI":"10.1177\/20563051241242797","article-title":"\u2018You could hear a hair pin drop\u2019: queer utopianism and informal knowledge production in the gaylor closeting conspiracy theory","volume":"10","year":"2024","journal-title":"Social Media + Society"},{"volume-title":"This Is Not a Game","year":"2024","key":"key2025042506291069300_ref015"},{"key":"key2025042506291069300_ref016","first-page":"103","article-title":"Ong\u2019s Hat and the construction of a suspicious model reader","volume":"9","year":"2022","journal-title":"Hortus Semioticus"},{"volume-title":"Book History through Postcolonial Eyes: Rewriting the Script","year":"2008","key":"key2025042506291069300_ref017"},{"volume-title":"Palimpsests: Literature in the Second Degree","year":"1997","key":"key2025042506291069300_ref018"},{"issue":"12","key":"key2025042506291069300_ref019","doi-asserted-by":"publisher","first-page":"7037","DOI":"10.1177\/14614448231162585","article-title":"Debating (in) echo chambers: how culture shapes communication in conspiracy theory networks on YouTube","volume":"26","year":"2024","journal-title":"New Media and Society"},{"volume-title":"Contemporary Conspiracy Culture: Truth and Knowledge in an Era of Epistemic Instability","year":"2020","key":"key2025042506291069300_ref020","doi-asserted-by":"publisher","DOI":"10.4324\/9780429327605"},{"key":"key2025042506291069300_ref021","doi-asserted-by":"crossref","unstructured":"Harviainen, J.T., Bienia, R., Brind, S., Hitchens, M., Kot, Y.I., MacCallum-Stewart, E., Simkins, D.W., Stenros, J. and Sturrock, I. (2018), \u201cLive-action role-playing games\u201d, Role-Playing Game Studies, Routledge.","DOI":"10.4324\/9781315637532-5"},{"issue":"2","key":"key2025042506291069300_ref022","article-title":"Comparing born-digital artefacts using bibliographical archeology: a survey of timothy leary\u2019s published software (1985-1996)","volume":"24","year":"2019","journal-title":"Information Research"},{"issue":"2","key":"key2025042506291069300_ref023","doi-asserted-by":"publisher","first-page":"129","DOI":"10.7560\/IC58201","article-title":"Taxonomizing information practices in a large conspiracy movement: using early QAnon as a case study","volume":"58","year":"2023","journal-title":"Information and Culture"},{"issue":"6","key":"key2025042506291069300_ref024","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1108\/JD-09-2022-0204","article-title":"Preserving algorithmic systems: a synthesis of overlapping approaches, materialities and contexts","volume":"79","year":"2023","journal-title":"Journal of Documentation"},{"key":"key2025042506291069300_ref025","unstructured":"Hon, A. (2020), \u201cWhat ARGs can teach us about QAnon\u201d, Mssv, 2 August, available at: https:\/\/mssv.net\/2020\/08\/02\/what-args-can-teach-us-about-qanon\/ (accessed 2 September 2020)."},{"issue":"6","key":"key2025042506291069300_ref026","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v14i6.2484","article-title":"Storytelling in new media: the case of alternate reality games, 2001-2009","volume":"14","year":"2009","journal-title":"First Monday"},{"volume-title":"Legend-Tripping Online Supernatural Folklore and the Search for Ong\u2019s Hat","year":"2011","key":"key2025042506291069300_ref027"},{"key":"key2025042506291069300_ref028","doi-asserted-by":"crossref","unstructured":"Kristiansen, E. (2014), \u201cAlternate reality games\u201d, in Simonsen, J., Svabo, C., Strandvad, S.M., Samson, K., Hertzum, M. and Hansen, O.E. (Eds), Situated Design Methods, The MIT Press, doi: 10.7551\/mitpress\/9936.001.0001.","DOI":"10.7551\/mitpress\/9936.001.0001"},{"first-page":"275","volume-title":"Switching Codes: Thinking Through New Technologies in the Humanities and Arts","year":"2011","key":"key2025042506291069300_ref044"},{"volume-title":"Laboratory Life: the Construction of Scientific Facts","year":"1979","key":"key2025042506291069300_ref029"},{"volume-title":"Strategic Conspiracy Narratives: A Semiotic Approach","year":"2020","key":"key2025042506291069300_ref030","doi-asserted-by":"publisher","DOI":"10.4324\/9780429020384"},{"issue":"5","key":"key2025042506291069300_ref031","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1177\/14614448221090201","article-title":"Constructing alternative facts: populist expertise and the QAnon conspiracy","volume":"26","year":"2022","journal-title":"New Media and Society"},{"volume-title":"Incunabula: Ong\u2019s Hat- Scans of the Original Mail Art Documents Form the 80s and Early 90s","year":"1989","key":"key2025042506291069300_ref032"},{"issue":"6","key":"key2025042506291069300_ref033","doi-asserted-by":"publisher","DOI":"10.21428\/7808da6b.6b8a82b9","article-title":"QAnon and the emergence of the unreal","year":"2019","journal-title":"Journal of Design Science"},{"edition":"2nd ed.","volume-title":"Orality and Literacy: The Technologizing of the Word","year":"2002","key":"key2025042506291069300_ref034"},{"key":"key2025042506291069300_ref035","doi-asserted-by":"crossref","unstructured":"Orr, M. (2010), \u201cIntertextuality\u201d, in The Encyclopedia of Literary and Cultural Theory, John Wiley & Sons, doi: 10.1002\/9781444337839.wbelctv2i002.","DOI":"10.1002\/9781444337839.wbelctv2i002"},{"issue":"2","key":"key2025042506291069300_ref036","first-page":"146","article-title":"Games supporting student creativity","volume":"6","year":"2015","journal-title":"Uncommon Culture"},{"volume-title":"Conspiracy Narratives South of the Border: Bad Hombres Do the Twist","year":"2020","key":"key2025042506291069300_ref037","doi-asserted-by":"publisher","DOI":"10.4324\/9781003033028"},{"volume-title":"Conspiracy Theories and the People Who Believe Them","year":"2018","key":"key2025042506291069300_ref038"},{"issue":"5","key":"key2025042506291069300_ref039","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1177\/02632764211070962","article-title":"Online conspiracy theories, digital platforms and secondary orality: toward a sociology of online monsters","volume":"39","year":"2022","journal-title":"Theory, Culture and Society"},{"year":"2014","key":"key2025042506291069300_ref040","article-title":"Masonic conspiracy or MI6 recruitment tool? Internet mystery Cicada"},{"issue":"1","key":"key2025042506291069300_ref041","doi-asserted-by":"publisher","DOI":"10.1177\/20563051231157300","article-title":"A god-tier LARP? QAnon as conspiracy fictioning","volume":"9","year":"2023","journal-title":"Social Media + Society"},{"key":"key2025042506291069300_ref042","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v25i11.10643","article-title":"Tracing normiefication: a\u00a0cross-platform analysis of the QAnon conspiracy theory","year":"2020","journal-title":"First Monday"},{"volume-title":"Limelight","year":"2023","author":"The Incident at Ong\u2019s Hat","key":"key2025042506291069300_ref043"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-07-2024-0185\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-07-2024-0185\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:34:38Z","timestamp":1753396478000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/81\/3\/829-842\/1247050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,21]]},"references-count":44,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,4,21]]},"published-print":{"date-parts":[[2025,4,28]]}},"alternative-id":["10.1108\/JD-07-2024-0185"],"URL":"https:\/\/doi.org\/10.1108\/jd-07-2024-0185","relation":{},"ISSN":["0022-0418","1758-7379"],"issn-type":[{"type":"print","value":"0022-0418"},{"type":"electronic","value":"1758-7379"}],"subject":[],"published":{"date-parts":[[2025,4,21]]}}}