{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T14:42:59Z","timestamp":1778683379968,"version":"3.51.4"},"reference-count":51,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Big Data &amp; Society"],"published-print":{"date-parts":[[2016,12]]},"abstract":"<jats:p>This paper draws together empirical findings from our study of hackathons in the UK with literature on big data through three interconnected frameworks: data as discourse, data as datalogical and data as materiality. We suggest not only that hackathons resonate the wider socio-technical and political constructions of (big) data that are currently enacted in policy, education and the corporate sector (to name a few), but also that an investigation of hackathons reveals the extent to which \u2018data\u2019 operates as a powerful discursive tool; how the discourses (and politics) of data mask and reveal a series of tropes pertaining to data; that the politics of data are routinely and simultaneously obscured and claimed with serious implications for expertise and knowledge; and that ultimately, and for the vast majority of hackathons we have attended, the discursive and material constructions of data serve to underpin rather than challenge existing power relations and politics.<\/jats:p>","DOI":"10.1177\/2053951716679675","type":"journal-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T21:32:34Z","timestamp":1480627954000},"update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":11,"title":["Hackathons, data and discourse: Convolutions of the data (logical)"],"prefix":"10.1177","volume":"3","author":[{"given":"Helen","family":"Thornham","sequence":"first","affiliation":[{"name":"University of Leeds, UK"}]},{"given":"Edgar","family":"G\u00f3mez Cruz","sequence":"additional","affiliation":[{"name":"RMIT University, Australia"}]}],"member":"179","published-online":{"date-parts":[[2016,12,1]]},"reference":[{"key":"bibr2-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1215\/9780822392149"},{"key":"bibr3-2053951716679675","volume-title":"Meeting the Universe Halfway","author":"Barad K","year":"2009"},{"key":"bibr4-2053951716679675","volume-title":"What Perec Was Looking For: Notes on Automation, the Everyday, and Ethical Writing. In: Wilken R and Clemens J (ed.) The Afterlives of George Perec. Edinburgh. Edinburgh University Press","author":"Bassett C","year":"2016"},{"key":"bibr5-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715578951"},{"issue":"3","key":"bibr6-2053951716679675","first-page":"22","volume":"49","author":"Berry D","year":"2014","journal-title":"Educause"},{"key":"bibr7-2053951716679675","unstructured":"Boellstorff T (2013) Making big data, in theory.\n                      First Monday\n                      18(10). Available at: http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/4869\/3750 (accessed 15 January 2016)."},{"key":"bibr8-2053951716679675","volume-title":"Memory Practices in the Sciences","author":"Bowker G","year":"2005"},{"key":"bibr9-2053951716679675","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"boyd D","year":"2014"},{"key":"bibr10-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"bibr11-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1177\/0263276411424420"},{"key":"bibr12-2053951716679675","unstructured":"Clough P, Gregory K, Haber B, et\u00a0al. (2015) The datalogical turn. Unpublished Article. 1\u201326. Available at: https:\/\/www.academia.edu\/5986819\/The_Datalogical_Turn (accessed 2 December 2015)."},{"key":"bibr13-2053951716679675","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1r2gbj"},{"key":"bibr14-2053951716679675","unstructured":"Drucker J (2011) Humanities approaches to graphical display.\n                      Digital Humanities Quarterly\n                      5(1): 1\u201323. Available at: http:\/\/beautifuldata.metalab.harvard.edu\/wp-content\/uploads\/2014\/08\/DHQ_-Digital-Humanities-Quarterly_-Humanities-Approaches-to-Graphical-Display.pdf (accessed 4 January 2016)."},{"key":"bibr15-2053951716679675","volume-title":"Discipline and Punish: The Birth of the Prison","author":"Foucault M","year":"1991"},{"key":"bibr16-2053951716679675","first-page":"73","volume-title":"Michel Foucault, Ethics: Subjectivity and Truth","author":"Foucault M","year":"1997"},{"key":"bibr17-2053951716679675","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1208.001.0001"},{"key":"bibr18-2053951716679675","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9302.003.0002"},{"key":"bibr19-2053951716679675","unstructured":"G\u00f3mez Cruz E and Thornham H (2016) Staging the hack (athon): Imagining innovation, an ethnographic approach. Working Papers of the Communities and Culture Network+ vol 8. Available at: http:\/\/2plqyp1e0nbi44cllfr7pbor.wpengine.netdna-cdn.com\/files\/2013\/01\/Staging-the-hackathon_Gomez_Thornham.pdf (accessed 20 November 2016)."},{"key":"bibr20-2053951716679675","volume-title":"The Utopia of Rules: On Technology, Stupidity and the Secret Joys of Bureaucracy","author":"Graeber D","year":"2015"},{"key":"bibr21-2053951716679675","unstructured":"Gregg M (2015) Hack for good: Speculative labour, app development and the burden of austerity.\n                      The Fibreculture Journal\n                      25: 183\u2013201. Available at: http:\/\/twentyfive.fibreculturejournal.org\/fcj-186-hack-for-good-speculative-labour-app-development-and-the-burden-of-austerity\/ (accessed 15 January 2015)."},{"key":"bibr22-2053951716679675","volume-title":"Data Mining: Concepts and Techniques","author":"Han J","year":"2011","edition":"3"},{"key":"bibr23-2053951716679675","unstructured":"Haraway D (2015) Birth of the kennel: A lecture by Donna Haraway, August 2000. The European Graduate School. Available at: http:\/\/www.egs.edu\/faculty\/donna-haraway\/articles\/birth-of-the-kennel\/ (accessed 26 May 2015)."},{"key":"bibr24-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2011.06.036"},{"key":"bibr125-2053951716679675","doi-asserted-by":"crossref","unstructured":"Ingold T (2013)\n                      Making: Anthropology, Archaeology, Art and Architecture\n                      . London: Routledge.","DOI":"10.4324\/9780203559055"},{"key":"bibr25-2053951716679675","doi-asserted-by":"crossref","unstructured":"Irani L (2015) Hackathons and the making of entrepreneurial citizenship.\n                      Science, Technology and Human Values\n                      40: 799\u2013824.","DOI":"10.1177\/0162243915578486"},{"key":"bibr127-2053951716679675","doi-asserted-by":"crossref","unstructured":"Kember S and Zylinska J (2012)\n                      Life after New Media: Mediation as a Vital Process\n                      . Cambridge, MA: MIT Press.","DOI":"10.7551\/mitpress\/8796.001.0001"},{"key":"bibr27-2053951716679675","doi-asserted-by":"crossref","unstructured":"Kitchin R (2014a) Big Data, new epistemologies and paradigm shifts.\n                      Big Data & Society\n                      1(1): 1\u201312. Available at: http:\/\/bds.sagepub.com\/content\/1\/1\/2053951714528481 (accessed 15 January 2016).","DOI":"10.1177\/2053951714528481"},{"key":"bibr28-2053951716679675","doi-asserted-by":"publisher","DOI":"10.4135\/9781473909472"},{"key":"bibr30-2053951716679675","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262027168.001.0001"},{"key":"bibr31-2053951716679675","unstructured":"Leckart S (2012) February 17. The hackathon is on: Pitching and programming the next killer app.\n                      Wired\n                      . Available at: http:\/\/www.wired.com\/magazine\/2012\/02\/ff_hackathons\/ (accessed 4 May 2015)."},{"key":"bibr32-2053951716679675","doi-asserted-by":"crossref","unstructured":"Lupton D (2016) Digital companion species and eating data: Implications for theorising digital data-human assemblages.\n                      Big Data & Society\n                      3(1): 1\u20135.","DOI":"10.1177\/2053951715619947"},{"key":"bibr33-2053951716679675","volume-title":"The Language of New Media","author":"Manovich L","year":"2001"},{"key":"bibr34-2053951716679675","unstructured":"Marlow J (2013) Why do we hackathon?\n                      Wired.\n                      Available at: http:\/\/www.wired.com\/wiredscience\/2013\/03\/why-do-we-hackathon\/ (accessed 5 May 2015)."},{"key":"bibr35-2053951716679675","volume-title":"Big Data: A Revolution That Will Transform How We Live, Work and Think","author":"Mayer-Sch\u00f6nberger V","year":"2013"},{"key":"bibr36-2053951716679675","unstructured":"Miller P (2010) Linked Data and Government. ePSIplatform Topic report no. 7. Available at: http:\/\/www.epsiplatform.eu\/content\/topic-report-no-7-linked-data-and-government-0 (accessed 23 December 2015)."},{"key":"bibr37-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1215\/9780822384151"},{"key":"bibr38-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1057\/sub.2008.2"},{"key":"bibr139-2053951716679675","doi-asserted-by":"crossref","unstructured":"Moores S (2014) Digital orientations: \u2018Ways of the Hand' and practical knowing in media uses and other manual activities.\n                      Mobile Media and Communication\n                      2(2): 196\u2013208.","DOI":"10.1177\/2050157914521091"},{"key":"bibr39-2053951716679675","first-page":"1784","volume":"8","author":"Nafus D","year":"2014","journal-title":"International Journal of Communications"},{"key":"bibr140-2053951716679675","doi-asserted-by":"crossref","unstructured":"Pink S (2012)\n                      Situating Everyday Life: Practices and Places\n                      . London: Sage.","DOI":"10.4135\/9781446250679"},{"key":"bibr40-2053951716679675","volume-title":"Digital Ethnography: Principles and Practice","author":"Pink S","year":"2015"},{"key":"bibr42-2053951716679675","volume-title":"Sentient City: Ubiquitous Computing, Architecture and the Future of Urban Space","author":"Shepard M","year":"2011"},{"key":"bibr43-2053951716679675","volume-title":"Inaugural Lecture for the Sussex Humanities Lab: Keynote Address","author":"Sterne J","year":"2015"},{"key":"bibr44-2053951716679675","unstructured":"Suchman L (2007) Agencies in technology design: Feminist reconfigurations. Unpublished manuscript. Available at: http:\/\/goo.gl\/tsTTyl (accessed 20 November 2016)."},{"key":"bibr45-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1080\/00071310220133287"},{"key":"bibr47-2053951716679675","volume-title":"Non-representational Theory: Space, Politics, Affect","author":"Thrift N","year":"2007"},{"key":"bibr48-2053951716679675","volume-title":"Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia","author":"Townsend AM","year":"2013"},{"key":"bibr49-2053951716679675","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199970773.001.0001"},{"key":"bibr50-2053951716679675","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v12i2.4776"},{"key":"bibr51-2053951716679675","doi-asserted-by":"crossref","unstructured":"Vis F (2013) A critical reflection on big data: Considering APIs, researchers and tools as data makers.\n                      First Monday\n                      18(10). Available at: http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/4878 (accessed 23 December 2015).","DOI":"10.5210\/fm.v18i10.4878"},{"key":"bibr52-2053951716679675","doi-asserted-by":"publisher","DOI":"10.4324\/9781315867854"}],"container-title":["Big Data &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/2053951716679675","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/2053951716679675","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/2053951716679675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T13:02:13Z","timestamp":1777381333000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/2053951716679675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1177\/2053951716679675"],"URL":"https:\/\/doi.org\/10.1177\/2053951716679675","relation":{},"ISSN":["2053-9517","2053-9517"],"issn-type":[{"value":"2053-9517","type":"print"},{"value":"2053-9517","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12]]},"article-number":"2053951716679675"}}