{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:38:16Z","timestamp":1754156296160,"version":"3.41.2"},"reference-count":31,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T00:00:00Z","timestamp":1681344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JD"],"published-print":{"date-parts":[[2023,10,24]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This article aims to advance a multifaceted framework for preserving algorithms and algorithmic systems in an archival context.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The article is based on a review and synthesis of existing literature, during which the authors observe emergent themes. After introducing these themes, the authors follow each theme as manifest in existing digital preservation projects, starting with algorithms' earliest conceptual starting points and moving up through themes' eventual implementation within a complex social environment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The authors find current literature is largely divided between that which addresses algorithms primarily as computational artifacts and that which views them instead as primarily social in nature. To bridge this gap the authors propose that \u201cthe algorithm,\u201d as the algorithm is frequently deployed in popular discourse, is best understood as not as either the algorithm's technical or social components, but rather the sum total of both.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>The study is limited by its methodology as a literature review. However, the findings point toward a new framing for future research that is less divided in terms of social or material orientation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>Creating multifaceted records of algorithms, the authors argue, enables more effective regulation and management of algorithmic systems, which in turn help to improve their levels of fairness, accountability, and trustworthiness.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The paper offers a wide variety of case studies with the potential to inform future studies, while contextualizing the studies together within a new framework that avoids prior limitations.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-09-2022-0204","type":"journal-article","created":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T03:17:33Z","timestamp":1681269453000},"page":"1380-1392","source":"Crossref","is-referenced-by-count":3,"title":["Preserving algorithmic systems: a\u00a0synthesis of overlapping approaches, materialities and contexts"],"prefix":"10.1108","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3236-8486","authenticated-orcid":false,"given":"James A.","family":"Hodges","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7118-6610","authenticated-orcid":false,"given":"Ciaran B.","family":"Trace","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,4,13]]},"reference":[{"key":"key2023102318081329600_ref001","unstructured":"Adobe Photoshop Source Code (2013), \u201cCHM\u201d, 13 February, available at: https:\/\/computerhistory.org\/blog\/adobe-photoshop-source-code\/ (accessed 5 May 2022)."},{"issue":"2","key":"key2023102318081329600_ref002","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1108\/RMJ-04-2019-0019","article-title":"A discussion frame for explaining records that are based on algorithmic output","volume":"30","year":"2019","journal-title":"Records Management Journal"},{"issue":"2","key":"key2023102318081329600_ref003","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1108\/RMJ-08-2019-0038","article-title":"Working in contexts for which transparency is important: a recordkeeping view of explainable artificial intelligence (XAI)","volume":"30","year":"2020","journal-title":"Records Management Journal"},{"issue":"5","key":"key2023102318081329600_ref004","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1177\/0263276420917466","article-title":"Rhythmedia: a study of Facebook immune system","volume":"37","year":"2020","journal-title":"Theory, Culture and Society"},{"year":"2021","key":"key2023102318081329600_ref005","article-title":"mitchaiet\/SMOC-BRISQUEt"},{"edition":"3rd ed.","volume-title":"Introduction to Algorithms","year":"2009","key":"key2023102318081329600_ref006"},{"issue":"4","key":"key2023102318081329600_ref007","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1177\/1461444818815684","article-title":"Playing the visibility game: how digital influencers and algorithms negotiate influence on Instagram","volume":"21","year":"2019","journal-title":"New Media and Society"},{"key":"key2023102318081329600_ref008","first-page":"5","article-title":"A computer program used for bail and sentencing decisions was labeled biased against blacks. It\u2019s actually not that clear","year":"2016","journal-title":"The\u00a0Washington Post"},{"volume-title":"Media Ecologies: Materialist Energies in Art and Technoculture","year":"2005","key":"key2023102318081329600_ref009"},{"volume-title":"Debates in the Digital Humanities","year":"2012","key":"key2023102318081329600_ref010"},{"volume-title":"Virtual Muse: Experiments in Computer Poetry","year":"1996","key":"key2023102318081329600_ref011"},{"volume-title":"Writing Machines","year":"2002","key":"key2023102318081329600_ref012"},{"issue":"1","key":"key2023102318081329600_ref013","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720905874","article-title":"How biased is the sample? Reverse engineering the ranking algorithm of Facebook\u2019s Graph application programming interface","volume":"7","year":"2020","journal-title":"Big Data and Society"},{"issue":"4","key":"key2023102318081329600_ref014","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MAHC.2019.2894830","article-title":"Technical fixes for legal uncertainty in the 1980s software cracking scene","volume":"41","year":"2019","journal-title":"IEEE Annals of the History of Computing"},{"first-page":"197","article-title":"Forensic analysis of memetic image propagation: introducing the SMOC BRISQUEt method","year":"2021","key":"key2023102318081329600_ref015"},{"key":"key2023102318081329600_ref016","unstructured":"ImageNet (2022), available at: https:\/\/image-net.org\/ (accessed 6 May 2022)."},{"key":"key2023102318081329600_ref017","unstructured":"Introducing the Open Images Dataset (2022), \u201cGoogle AI blog\u201d, available at: http:\/\/ai.googleblog.com\/2016\/09\/introducing-open-images-dataset.html (accessed 6 May 2022)."},{"key":"key2023102318081329600_ref018","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1369118X.2020.1834603","article-title":"Algorithms and the narration of past selves","year":"2020","journal-title":"Information, Communication and Society"},{"key":"key2023102318081329600_ref019","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1145\/3351095.3372829","article-title":"Lessons from archives: strategies for collecting sociocultural data in machine learning","year":"2020"},{"issue":"1","key":"key2023102318081329600_ref020","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1080\/1369118X.2016.1154087","article-title":"Thinking critically about and researching algorithms","volume":"20","year":"2017","journal-title":"Information, Communication and Society"},{"key":"key2023102318081329600_ref021","unstructured":"Krysa, J. and Sedek, G. (2005), \u201cSource code\u201d, in Fuller, M. (Ed.), Software Studies: A Lexicon, MIT Press, Cambridge, MA."},{"key":"key2023102318081329600_ref022","doi-asserted-by":"publisher","first-page":"12","DOI":"10.5210\/fm.v22i12.8097","article-title":"Stewardship in the \u2018age of algorithms\u2019","volume":"22","year":"2017","journal-title":"First Monday"},{"volume-title":"Inside Photoshop","year":"2011","key":"key2023102318081329600_ref023"},{"issue":"82","key":"key2023102318081329600_ref024","first-page":"666","article-title":"Sketch of the analytical engine invented by Charles Babbage, with notes upon the memoir by the translator\u201d, translated by Augusta, countess of Lovelace","year":"1842","journal-title":"A Biblioth\u00e8que Universelle de Gen\u00e8ve"},{"key":"key2023102318081329600_ref025","unstructured":"Microsoft MS-DOS early source code (2014), \u201cCHM\u201d, 25 March, available at: https:\/\/computerhistory.org\/blog\/microsoft-ms-dos-early-source-code\/ (accessed 5 May 2022)."},{"year":"2012","key":"key2023102318081329600_ref026"},{"volume-title":"Guide to the Computer Oral History Collection","year":"2010","key":"key2023102318081329600_ref027"},{"volume-title":"The Black Box Society: The Secret\u00a0algorithms That Control Money and Information","year":"2015","key":"key2023102318081329600_ref028"},{"key":"key2023102318081329600_ref029","doi-asserted-by":"crossref","unstructured":"Seaver, N. (2019), \u201cKnowing algorithms\u201d, in Vertesi, J., Ribes, D., DiSalvo, C., Loukissas, Y., Forlano, L., Rosner, D.K., Jackson, S.J. and Shell, H.R. (Eds), DigitalSTS, Princeton University Press, pp. 412-422.","DOI":"10.2307\/j.ctvc77mp9.30"},{"journal-title":"ArXiv:1909.05167 [Cs, Stat]","article-title":"FAT forensics: a Python toolbox for algorithmic fairness, accountability and transparency","year":"2019","key":"key2023102318081329600_ref030"},{"key":"key2023102318081329600_ref031","unstructured":"Xerox Alto Source Code (2014), \u201cCHM\u201d, 21 October, available at: https:\/\/computerhistory.org\/blog\/xerox-alto-source-code\/ (accessed 5 May 2022)."}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-09-2022-0204\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-09-2022-0204\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:35:04Z","timestamp":1753396504000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/79\/6\/1380-1392\/207198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,13]]},"references-count":31,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,4,13]]},"published-print":{"date-parts":[[2023,10,24]]}},"alternative-id":["10.1108\/JD-09-2022-0204"],"URL":"https:\/\/doi.org\/10.1108\/jd-09-2022-0204","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2023,4,13]]}}}