{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T08:18:22Z","timestamp":1777277902701,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["740548"],"award-info":[{"award-number":["740548"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445198","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T05:53:19Z","timestamp":1620453199000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["What Do Hackathons Do? Understanding Participation in Hackathons Through Program Theory Analysis"],"prefix":"10.1145","author":[{"given":"Jeanette","family":"Falk","sequence":"first","affiliation":[{"name":"Aarhus University, Denmark"}]},{"given":"Gopinaath","family":"Kannabiran","sequence":"additional","affiliation":[{"name":"Computer Science Department IT Univserity of Copenhagen, Denmark"}]},{"given":"Nicolai Brodersen","family":"Hansen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Aalborg University Aalborg, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025864"},{"key":"e_1_3_2_1_2_1","first-page":"5","article-title":"P for Political: Participation is Not Enough","volume":"14","author":"Beck E.","year":"2002","unstructured":"Eevi\u00a0 E. Beck . 2002 . P for Political: Participation is Not Enough . Scandanavian Journal of Information Systems 14 (2002), 5 \u2013 13 . Eevi\u00a0E. Beck. 2002. P for Political: Participation is Not Enough. Scandanavian Journal of Information Systems 14 (2002), 5\u201313.","journal-title":"Scandanavian Journal of Information Systems"},{"key":"e_1_3_2_1_3_1","volume-title":"The functions of program theory. New directions for program evaluation","author":"Bickman Leonard","year":"1987","unstructured":"Leonard Bickman . 1987. The functions of program theory. New directions for program evaluation 1987 , 33 (1987), 5\u201318. Leonard Bickman. 1987. The functions of program theory. New directions for program evaluation 1987, 33 (1987), 5\u201318."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025931"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152421"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940299.2940303"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210604.3210638"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-415921-1.00004-X"},{"key":"e_1_3_2_1_9_1","volume-title":"Post-Hackathon Learning Circles: Supporting Lean Startup Development. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Chan Tina","year":"2020","unstructured":"Tina Chan , Josephine McMurray , AnneMarie Levy , Heidi Sveistrup , and James Wallace . 2020 . Post-Hackathon Learning Circles: Supporting Lean Startup Development. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery , New York, NY, USA, 1\u20138. Tina Chan, Josephine McMurray, AnneMarie Levy, Heidi Sveistrup, and James Wallace. 2020. Post-Hackathon Learning Circles: Supporting Lean Startup Development. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1\u20138."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368563"},{"key":"e_1_3_2_1_11_1","volume-title":"The hackathon format: an analysis of its possible interpretations under a service design perspective. DS 101: Proceedings of NordDesign","author":"De\u00a0G\u00f6tzen Amalia","year":"2020","unstructured":"Amalia De\u00a0G\u00f6tzen , Luca Simeone , Joanna Saad-Sulonen , Beg\u00fcm Becermen , Nicola Morelli , 2020. The hackathon format: an analysis of its possible interpretations under a service design perspective. DS 101: Proceedings of NordDesign 2020 , Lyngby, Denmark , 12th-14th August 2020 DS 101(2020), 1\u201312. Amalia De\u00a0G\u00f6tzen, Luca Simeone, Joanna Saad-Sulonen, Beg\u00fcm Becermen, Nicola Morelli, 2020. The hackathon format: an analysis of its possible interpretations under a service design perspective. DS 101: Proceedings of NordDesign 2020, Lyngby, Denmark, 12th-14th August 2020 DS 101(2020), 1\u201312."},{"key":"e_1_3_2_1_12_1","volume-title":"Building belonging. interactions 21, 4","author":"DiSalvo Carl","year":"2014","unstructured":"Carl DiSalvo , Melissa Gregg , and Thomas Lodato . 2014. Building belonging. interactions 21, 4 ( 2014 ), 58\u201361. Carl DiSalvo, Melissa Gregg, and Thomas Lodato. 2014. Building belonging. interactions 21, 4 (2014), 58\u201361."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1989.4308385"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395543"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675223"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011784.3011794"},{"key":"e_1_3_2_1_17_1","unstructured":"TW Frick and CM Reigeluth. 1999. Formative research: A methodology for creating and improving design theories. Instructional-design theories and models: A new paradigm of instructional theory 2(1999) 633\u2013652.  TW Frick and CM Reigeluth. 1999. Formative research: A methodology for creating and improving design theories. Instructional-design theories and models: A new paradigm of instructional theory 2(1999) 633\u2013652."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSI-SE.2017.5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304221.3319777"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316287.3316293"},{"key":"e_1_3_2_1_21_1","volume-title":"Persistence of women and minorities in STEM field majors: Is it the school that matters?Economics of Education Review 29, 6","author":"Griffith L","year":"2010","unstructured":"Amanda\u00a0 L Griffith . 2010. Persistence of women and minorities in STEM field majors: Is it the school that matters?Economics of Education Review 29, 6 ( 2010 ), 911\u2013922. Amanda\u00a0L Griffith. 2010. Persistence of women and minorities in STEM field majors: Is it the school that matters?Economics of Education Review 29, 6 (2010), 911\u2013922."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369457.3369460"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362364.2362371"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300291"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915578486"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152771.3152787"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17169\/fqs-9.1.334"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26619-6_23"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326365.3326388"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9565-6"},{"key":"e_1_3_2_1_31_1","volume-title":"Research methods in human-computer interaction. Morgan Kaufmann","author":"Lazar Jonathan","unstructured":"Jonathan Lazar , Jinjuan\u00a0Heidi Feng , and Harry Hochheiser . 2017. Research methods in human-computer interaction. Morgan Kaufmann , Cambridge, MA, USA . Jonathan Lazar, Jinjuan\u00a0Heidi Feng, and Harry Hochheiser. 2017. Research methods in human-computer interaction. Morgan Kaufmann, Cambridge, MA, USA."},{"key":"e_1_3_2_1_32_1","volume-title":"CHI\u201913 Extended Abstracts on Human Factors in Computing Systems","author":"Li Ian","unstructured":"Ian Li , Jon Froehlich , Jakob\u00a0 E Larsen , Catherine Grevet , and Ernesto Ramirez . 2013. Personal informatics in the wild: hacking habits for health & happiness . In CHI\u201913 Extended Abstracts on Human Factors in Computing Systems . Association for Computing Machinery , New York, NY, USA , 3179\u20133182. Ian Li, Jon Froehlich, Jakob\u00a0E Larsen, Catherine Grevet, and Ernesto Ramirez. 2013. Personal informatics in the wild: hacking habits for health & happiness. In CHI\u201913 Extended Abstracts on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 3179\u20133182."},{"key":"e_1_3_2_1_33_1","volume-title":"ATHack: Co-Design and Education in Assistive Technology Development. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Narain Jaya","year":"2020","unstructured":"Jaya Narain , Ishwarya Ananthabhotla , Samuel Mendez , Cameron Taylor , Hosea Siu , Lora Brugnaro , and Adriana Mallozzi . 2020 . ATHack: Co-Design and Education in Assistive Technology Development. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery , New York, NY, USA, 1\u20137. Jaya Narain, Ishwarya Ananthabhotla, Samuel Mendez, Cameron Taylor, Hosea Siu, Lora Brugnaro, and Adriana Mallozzi. 2020. ATHack: Co-Design and Education in Assistive Technology Development. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1\u20137."},{"key":"e_1_3_2_1_34_1","volume-title":"Participation in Computing Competitions","author":"National Center for Women and Information Technology 2013.","year":"2020","unstructured":"National Center for Women and Information Technology 2013. National Center for Women and Information Technology. Top 10 Ways to Increase Girls \u2019 Participation in Computing Competitions . National Center for Women and Information Technology . Retrieved September 16, 2020 from http:\/\/www.ncwit.org\/resources\/top-10-waysincrease-girls-participation-computing-competitions\/top-10-ways-increase-girls National Center for Women and Information Technology 2013. National Center for Women and Information Technology. Top 10 Ways to Increase Girls\u2019 Participation in Computing Competitions. National Center for Women and Information Technology. Retrieved September 16, 2020 from http:\/\/www.ncwit.org\/resources\/top-10-waysincrease-girls-participation-computing-competitions\/top-10-ways-increase-girls"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392830"},{"key":"e_1_3_2_1_36_1","volume-title":"Chalalai Chaihirunkarn, Anna Filippova, Arun Kalyanasundaram, Maria Angelica\u00a0Medina Angarita, Erik Trainer, and James\u00a0D. Herbsleb.","author":"Nolte Alexander","year":"2020","unstructured":"Alexander Nolte , Ei\u00a0 Pa\u00a0Pa Pe-Than , Abasi amefon Obot\u00a0Affia , Chalalai Chaihirunkarn, Anna Filippova, Arun Kalyanasundaram, Maria Angelica\u00a0Medina Angarita, Erik Trainer, and James\u00a0D. Herbsleb. 2020 . How to organize a hackathon \u2013 A planning kit. arxiv:2008.08025\u00a0[cs.CY] Alexander Nolte, Ei\u00a0Pa\u00a0Pa Pe-Than, Abasi amefon Obot\u00a0Affia, Chalalai Chaihirunkarn, Anna Filippova, Arun Kalyanasundaram, Maria Angelica\u00a0Medina Angarita, Erik Trainer, and James\u00a0D. Herbsleb. 2020. How to organize a hackathon \u2013 A planning kit. arxiv:2008.08025\u00a0[cs.CY]"},{"key":"e_1_3_2_1_37_1","volume-title":"Open Source Hardware Association","author":"Open Source Hardware Association 2020.","year":"2020","unstructured":"Open Source Hardware Association 2020. Open Source Hardware Association . Open Source Hardware Association . Retrieved September 14, 2020 from https:\/\/www.oshwa.org\/definition\/ Open Source Hardware Association 2020. Open Source Hardware Association. Open Source Hardware Association. Retrieved September 14, 2020 from https:\/\/www.oshwa.org\/definition\/"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.290110547"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194779.3194783"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025637"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677310"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/ev.1177"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2019.00031"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2020.600654"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2560476"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173746"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064663.3064723"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174081"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892549"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819946"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 2017 ACM Conference on International Computing Education Research. Association for Computing Machinery","author":"Warner Jeremy","year":"2017","unstructured":"Jeremy Warner and Philip\u00a0 J Guo . 2017 . Hack. edu: Examining how college hackathons are perceived by student attendees and non-attendees . In Proceedings of the 2017 ACM Conference on International Computing Education Research. Association for Computing Machinery , New York, NY, USA, 254\u2013262. Jeremy Warner and Philip\u00a0J Guo. 2017. Hack. edu: Examining how college hackathons are perceived by student attendees and non-attendees. In Proceedings of the 2017 ACM Conference on International Computing Education Research. Association for Computing Machinery, New York, NY, USA, 254\u2013262."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299063"},{"key":"e_1_3_2_1_53_1","volume-title":"Case study research: design and methods","author":"Yin K.","unstructured":"Robert\u00a0 K. Yin . 2014. Case study research: design and methods . Sage Publication , Thousand Oaks, CA, USA . Robert\u00a0K. Yin. 2014. Case study research: design and methods. Sage Publication, Thousand Oaks, CA, USA."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:43Z","timestamp":1750195723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":53,"alternative-id":["10.1145\/3411764.3445198","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445198","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}