{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:39Z","timestamp":1750220379106,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T00:00:00Z","timestamp":1627862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF Office of Advanced Cyberinfrastructure (OAC)","award":["1547611"],"award-info":[{"award-number":["1547611"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,2]]},"DOI":"10.1145\/3472688.3472700","type":"proceedings-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T17:14:00Z","timestamp":1627924440000},"page":"78-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Organizing online hackathons for newcomers to a scientific community \u2013 Lessons learned from two events"],"prefix":"10.1145","author":[{"given":"Jeaime","family":"Powell","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, United States"}]},{"given":"Linda","family":"Bailey Hayden","sequence":"additional","affiliation":[{"name":"NSF Science Gateway Community Institute, United States"}]},{"given":"Amy","family":"Cannon","sequence":"additional","affiliation":[{"name":"Omnibond Systems, LLC, United States"}]},{"given":"Boyd","family":"Wilson","sequence":"additional","affiliation":[{"name":"Omnibond Systems, LLC, United States"}]},{"given":"Alexander","family":"Nolte","sequence":"additional","affiliation":[{"name":"University of Tartu, Estonia"}]}],"member":"320","published-online":{"date-parts":[[2021,8,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025931"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Ben Busby August Matthew\u00a0Lesko 2016. Closing gaps between open software and public data in a hackathon setting: user-centered software prototyping. F1000Research 5(2016).  Ben Busby August Matthew\u00a0Lesko 2016. Closing gaps between open software and public data in a hackathon setting: user-centered software prototyping. F1000Research 5(2016).","DOI":"10.12688\/f1000research.8382.2"},{"key":"e_1_3_2_1_3_1","volume-title":"Education and Development Conference.","author":"Cobham David","year":"2017","unstructured":"David Cobham , Kevin Jacques , Carl Gowan , Jack Laurel , Scott Ringham , 2017 . From appfest to entrepreneurs: using a hackathon event to seed a university student-led enterprise. In 11th annual International Technology , Education and Development Conference. David Cobham, Kevin Jacques, Carl Gowan, Jack Laurel, Scott Ringham, 2017. From appfest to entrepreneurs: using a hackathon event to seed a university student-led enterprise. In 11th annual International Technology, Education and Development Conference."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395543"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2018.8659264"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1717196115"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915578486"},{"key":"e_1_3_2_1_8_1","volume-title":"What are Hackathons for?IEEE Software 32, 5","author":"Komssi Marko","year":"2015","unstructured":"Marko Komssi , Danielle Pichlis , Mikko Raatikainen , Klas Kindstr\u00f6m , and Janne J\u00e4rvinen . 2015. What are Hackathons for?IEEE Software 32, 5 ( 2015 ), 60\u201367. Marko Komssi, Danielle Pichlis, Mikko Raatikainen, Klas Kindstr\u00f6m, and Janne J\u00e4rvinen. 2015. What are Hackathons for?IEEE Software 32, 5 (2015), 60\u201367."},{"volume-title":"Collaboration Technologies and Social Computing","author":"Medina\u00a0Angarita Maria\u00a0Angelica","key":"e_1_3_2_1_9_1","unstructured":"Maria\u00a0Angelica Medina\u00a0Angarita and Alexander Nolte . 2020. What do we know about hackathon outcomes and how to support them? - A systematic literature review . In Collaboration Technologies and Social Computing . Springer . Maria\u00a0Angelica Medina\u00a0Angarita and Alexander Nolte. 2020. What do we know about hackathon outcomes and how to support them? - A systematic literature review. In Collaboration Technologies and Social Computing. Springer."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340481.3342735"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392830"},{"key":"e_1_3_2_1_12_1","volume-title":"Erik Trainer, and James\u00a0D Herbsleb.","author":"Nolte Alexander","year":"2020","unstructured":"Alexander Nolte , Ei\u00a0 Pa\u00a0Pa Pe-Than , Abasi-amefon\u00a0 Obot Affia , Chalalai Chaihirunkarn , Anna Filippova , Arun Kalyanasundaram , Maria Angelica\u00a0Medina Angarita , Erik Trainer, and James\u00a0D Herbsleb. 2020 . How to organize a hackathon\u2013A planning kit. arXiv preprint arXiv:2008.08025(2020). Alexander Nolte, Ei\u00a0Pa\u00a0Pa Pe-Than, Abasi-amefon\u00a0Obot Affia, Chalalai Chaihirunkarn, Anna Filippova, Arun Kalyanasundaram, Maria Angelica\u00a0Medina Angarita, Erik Trainer, and James\u00a0D Herbsleb. 2020. How to organize a hackathon\u2013A planning kit. arXiv preprint arXiv:2008.08025(2020)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.290110547"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Ei\u00a0Pa\u00a0Pa Pe-Than Alexander Nolte Anna Filippova Chris Bird Steve Scallen and James\u00a0D. Herbsleb. 2020. Corporate Hackathons How and Why? A Multiple Case Study of Motivation Projects Proposal and Selection Goal Setting Coordination and Outcomes. Human-Computer Interaction(2020).  Ei\u00a0Pa\u00a0Pa Pe-Than Alexander Nolte Anna Filippova Chris Bird Steve Scallen and James\u00a0D. Herbsleb. 2020. Corporate Hackathons How and Why? A Multiple Case Study of Motivation Projects Proposal and Selection Goal Setting Coordination and Outcomes. Human-Computer Interaction(2020).","DOI":"10.1080\/07370024.2020.1760869"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.933"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 8th European Conference on IS Management and Evaluation. 367\u2013373","author":"Soltani Porya\u00a0Mohajer","year":"2014","unstructured":"Porya\u00a0Mohajer Soltani , Kalevi Pessi , Karin Ahlin , and Ida Wernered . 2014 . Hackathon: A method for digital innovative success: A comparative descriptive study . In Proceedings of the 8th European Conference on IS Management and Evaluation. 367\u2013373 . Porya\u00a0Mohajer Soltani, Kalevi Pessi, Karin Ahlin, and Ida Wernered. 2014. Hackathon: A method for digital innovative success: A comparative descriptive study. In Proceedings of the 8th European Conference on IS Management and Evaluation. 367\u2013373."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173746"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105726.3106174"}],"event":{"name":"ICGJ 2021: Sixth Annual International Conference on Game Jams, Hackathons, and Game Creation Events","acronym":"ICGJ 2021","location":"Montreal Canada"},"container-title":["Sixth Annual International Conference on Game Jams, Hackathons, and Game Creation Events"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472688.3472700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472688.3472700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:19Z","timestamp":1750191499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472688.3472700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,2]]},"references-count":18,"alternative-id":["10.1145\/3472688.3472700","10.1145\/3472688"],"URL":"https:\/\/doi.org\/10.1145\/3472688.3472700","relation":{},"subject":[],"published":{"date-parts":[[2021,8,2]]},"assertion":[{"value":"2021-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}