{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:27:32Z","timestamp":1776184052791,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,27]],"date-time":"2017-02-27T00:00:00Z","timestamp":1488153600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1064209, 1111750, 0943168, 1322278"],"award-info":[{"award-number":["1064209, 1111750, 0943168, 1322278"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2,27]]},"DOI":"10.1145\/2818048.2819946","type":"proceedings-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T11:40:27Z","timestamp":1456746027000},"page":"1118-1130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":105,"title":["How to Hackathon"],"prefix":"10.1145","author":[{"given":"Erik H.","family":"Trainer","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Arun","family":"Kalyanasundaram","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Chalalai","family":"Chaihirunkarn","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"James D.","family":"Herbsleb","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2016,2,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441840"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587110"},{"key":"e_1_3_2_1_3_1","volume-title":"Digital Innovation: The Hackathon Phenomenon. Retrieved","author":"Briscoe Gerard","year":"2014","unstructured":"Gerard Briscoe and Catherine Mulligan. 2014. Digital Innovation: The Hackathon Phenomenon. Retrieved August 4, 2014 from http:\/\/www.creativeworkslondon.org.uk\/wpcontent\/uploads\/2013\/11\/Digital-Innovation-TheHackathon-Phenomenon1.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Peter J.A. Cock Tiago Antao Jeffrey T. Chang et al. 2009. Biopython: freely available Python tools for computational molecular biology and bioinformatics. Bioinformatics (Oxford England) 25 11 1422\u20133. http:\/\/doi.org\/10.1093\/bioinformatics\/btp163 10.1093\/bioinformatics\/btp163","DOI":"10.1093\/bioinformatics\/btp163"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Day Community Science Hack","year":"2015","unstructured":"Science Hack Day Community. Science Hack Day. Retrieved July 25, 2015 from http:\/\/sciencehackday.org"},{"key":"e_1_3_2_1_6_1","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"Corbin Juliet","unstructured":"Juliet Corbin and Anselm Strauss. 2014. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications, Inc., Thousand Oaks, CA."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2007.902654"},{"key":"e_1_3_2_1_8_1","volume-title":"Chester","author":"Egolf Donald B.","year":"2013","unstructured":"Donald B. Egolf and Sondra L. Chester. 2013. Forming Storming Norming Performing: Successful Communication in Groups and Teams. iUniverse, Bloomington, IN."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2010-118-r86"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/320297.320333"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","year":"2014","unstructured":"HackerNest. 2014. DementiaHack TORONTO by the British Govt & HackerNest. Retrieved May 11, 2015 from http:\/\/www.eventbrite.com\/e\/dementiahacktoronto-by-the-british-govt-hackernest-tickets12349265987?aff=estw"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240210"},{"key":"e_1_3_2_1_13_1","volume-title":"Collaboration and Control: Crisis Management and Multimedia Technology in London Underground Line Control Rooms. Computer Supported Cooperative Work 1","author":"Heath Christian","year":"1990","unstructured":"Christian Heath and Paul Luff. 1992. Collaboration and Control: Crisis Management and Multimedia Technology in London Underground Line Control Rooms. Computer Supported Cooperative Work 1, 1990, 69\u201394."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2013.0869"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/2041-1480-5-"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Keyani Pedram","year":"2012","unstructured":"Pedram Keyani. 2012. Stay focused and keep hacking. Retrieved May 11, 2015 from https:\/\/www.facebook.com\/notes\/facebookengineering\/stay-focused-and-keephacking\/10150842676418920\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Cummings","author":"Kiesler Sara","year":"2002","unstructured":"Sara Kiesler and Jonathon N. Cummings. 2002. What Do We Know about Proximity and Distance in Work Groups? A Legacy of Research on Physical Distance. In Distributed Work, Pamela J. Hinds and Sara Kiesler (eds.). MIT Press, Cambridge, MA, 57\u201380."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2207798"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/117693430700300016"},{"key":"e_1_3_2_1_20_1","volume-title":"The New York Times. Retrieved","author":"Leckart Steven","year":"2015","unstructured":"Steven Leckart. 2015. The Hackathon Fast Track, From Campus to Silicon Valley. The New York Times. Retrieved May 11, 2015 from http:\/\/nyti.ms\/1CawQxH"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-014-9198-x"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557411"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/508448.508453"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2141512.2141568"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.5.473.15200"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-15-S14-S7"},{"key":"e_1_3_2_1_27_1","volume-title":"Nardi and Steve Whittaker","author":"Bonnie","year":"2002","unstructured":"Bonnie A. Nardi and Steve Whittaker. 2002. The Place of Face-to-Face Communication in Distributed Work. In Distributed Work, Pamela J. Hinds and Sara Kiesler (eds.). MIT Press, Cambridge, MA, 83\u2013110."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.13.3.249.2776"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/10570319809374611"},{"key":"e_1_3_2_1_31_1","unstructured":"LLC SocioCultural Research Consultants. 2014. Dedoose Version 5.0.11 web application for managing analyzing and presenting qualitative and mixed method research data. Retrieved from http:\/\/www.dedoose.com"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8551.13.s2.3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.359005"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660398.2660420"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0022100"},{"key":"e_1_3_2_1_36_1","volume-title":"August 10","author":"Wagstrom Patrick","unstructured":"Patrick Wagstrom, James D. Herbsleb, Robert E. Kraut, and Audris Mockus. 2010. The impact of commercial organizations on participation in an online community. Presentation at the Annual Academy of Management Meeting, August 10, Academy of Management, Briarcliff Manor, NY."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2005.08.001"},{"key":"e_1_3_2_1_38_1","volume-title":"Case Study Research","author":"Yin Robert K.","unstructured":"Robert K. Yin. 2014. Case Study Research. SAGE Publications, Inc., Thousand Oaks, CA."}],"event":{"name":"CSCW '16: Computer Supported Cooperative Work and Social Computing","location":"San Francisco California USA","acronym":"CSCW '16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work &amp; Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818048.2819946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818048.2819946","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818048.2819946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:22:47Z","timestamp":1763457767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818048.2819946"}},"subtitle":["Socio-technical Tradeoffs in Brief, Intensive Collocation"],"short-title":[],"issued":{"date-parts":[[2016,2,27]]},"references-count":38,"alternative-id":["10.1145\/2818048.2819946","10.1145\/2818048"],"URL":"https:\/\/doi.org\/10.1145\/2818048.2819946","relation":{},"subject":[],"published":{"date-parts":[[2016,2,27]]},"assertion":[{"value":"2016-02-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}