hackathons final w pics
TRANSCRIPT
-
7/29/2019 Hackathons Final w Pics
1/20
Recursive Identities in
Sociopolitical Movements:
A Case Study of HackathonsNathanael Bassett and Danny Kim
Participatory Research and Social Inquiry
Fall 2012 The New School
-
7/29/2019 Hackathons Final w Pics
2/20
Abstract
In todays network society, individuals are highly connected, due in large part to the increased
public access to information technologies. The Internet, mobile communications and digital
networks provide communication channels through which most social actors with access canexercise some control over the flow of information to which they are exposed. Hacktivists, part
of a broader range of media activists, can take advantage of the connectivity between
individuated identities to explore the possibilities of collectivizing personalist concerns into
communal action or movements.
Our goal is to investigate for researchers, activists, and hackathon organizers, in what ways a
hackathon exhibits a unique mode of civic engagement and/or socio-political activism. Second,
can hacktivist-oriented hackathons be designed to emphasize the conscious organization of
participants into collectives? If so, these could subsequently be capable of providing support and
advocacy for their corresponding socio-political movements. Finally, we intend to explore therecursive nature of the connection between individual and communal identities of collective
socio-political movements and their participants, framed in cyclical relationships around power
and knowledge.Our findings in this limited study indicate that hackathons are not inherently concerned with
solving social problems, even when they are the theme of the event, but are about solving
technology problems. Collaboration is the key to understanding hackathons, but it may be
possible to encourage collectivity if the organizers make the effort.
Overview: Hackathons,Hacktivism and Hackers
In this study, we are looking at the relationship between
technology and personal/collective political agency.
Hackathons are social events, where participants gather
under a theme to intensively work on problems (usually
related to computer programing) for a fixed amount of
time. These events cross virtual and physical barriers by
happening physically and online in a shared information space. By doing so, they create hybrid
environments where individual participants can directly negotiate goals and agendas with others.
Participants are connected, sometimes combining personal goals and agenda to complete their
projects.
This research began as a way to investigate how to organize disparate agendas under a core,
collectivized consensus. Hackathons seem like the ideal opportunity to do hacktivism, a type of
digital activism (Samuel) encompassing a wide range of activities, including "computer
-
7/29/2019 Hackathons Final w Pics
3/20
programing, circumventing security systems designed to protect computer networks and digital
data stores, designing and executing solutions to solve problems by combining software and
hardware in unconventional ways, and modifying and re-purposing digital products of all
kinds" (Alleyne, 1-2). People who do this sort of hacking, or hackers, can be thought of as
social actors engaged in the investigation and collection of data with social or political goals,
intervening in the exchange of information occurring in digital networks. Hackathons with thesegoals may constitute as modes of political action or activism.1
The question we are looking to make some sense of is how individual hacker identities and
collective consensus of hacker communities inform each other. How do individual political
beliefs and agendas shape the practices of data collection, interception, distribution, and
visualization? Inversely, how does a politically conscious community help form hackers
interested in their work? Do the common goals and relationships with other participants make
hackathons a site for intense, collective hacktivism?
Ultimately, we are interested in how within a highly mediated space, where people and digitalmedia technologies construct the social environment, participants contribute their personal
political agendas and objectives into a collective dynamic of a movement/initiative (for social
change); and inversely, how a consensus on the cultural make-up or political ideology of the
collective affects the individuals negotiation of his/her political identity and level of
involvement in the collective action.
Research Claim/Questions
Our claim is that people doing hacktivism form collectives, whether unwitting or intentional.
Hackathons are important, interposing virtual and physical events between individuals and
potential communities, where each informs
the other, helping establish their respective
identities and roles. With the necessary
planning and facilitation, a hackathon can
offer a particular spatial organization
conducive to enabling participants to form a
cultural dynamic and negotiate individual
agendas in order to arrive at a consensus
determining a set of goals and strategies
required for collective hacktivist action.
How do hackathons uniquely challenge the
notion that civic engagement through digital media isnt collective? And how can a hackathon
like the OccupyResearch/OccupyData enable hacktivism?
1 For a more in depth definition of the terms of hacker and hacktivism, see Gunkel, D J. Editorial:Introduction to Hacking and Hacktivism. New Media & Society (2005): n. pag. Print.
-
7/29/2019 Hackathons Final w Pics
4/20
Part of this involves some assumption, as to whether or not hackathon participants identify as
hacktivists, hackers, or merely technology enthusiasts or professionals. Whats important is how
they contribute and what their goals are for themselves and for the event.
Background Research
The expansion of the online digital media landscape and the proliferation of access to digital
media technologies have re-configured the spatial organizations of heterogeneous power
relations existing within the contemporary social environment. Over the past few decades,
techniques of controlling information have shifted dramatically, as the emergence of certain
technologies enabled or empowered more people to access sites of information exchange and
knowledge production. People with access to the right technology can engage in the processes of
collecting information previously reserved for the more privileged sectors of society (that had the
means of producing/transmitting information), and can make sense of the data to produce new
knowledge systems or even develop ideological claims.
The new set of global communication systems does not merely serve as an intermediary to
bilateral human-to-human interactions. Knowledge and information have been inscribed and
embedded into a digital network system that not only mediates cultural exchange but also
formulates new cultural expressions. The vertical approach to cultural production has become far
less relevant among information networks. Whereas those who owned the most influential
spheres of the culture and media industries (television broadcasting companies, Hollywood,
advertising industries) controlled the means of cultural production in the previous era, the so-
called Information Age provides the public with open access to the process of producing
communicative transmissions or media content. The defined roles of producing agent, who has
the power to transmit messages that contribute to formation of cultural codes, and passive
consumer, who accepts and consents to the formation of cultural codes by receiving the
messages, are becoming less distinguishable within the network society. As Manuel Castells
suggests, Culture is constructed by the actor, self-produced and self-consumed (Castells, 21).
The dissemination of these products has a new method of viral transmission through networks,
rather than the past form of top-down mass mediated cultural production. For these new viral
modes of transmission and distribution, greater exposure legitimizes the message or media
object. Where media is produced by numerous actors, going viral indicates a particular media
object is noteworthy, and legitimate.
The asymmetric dyad of transmitter/producer versus receiver/consumer had to be radically re-
structured for social actors to operate new information technologies under the logic of the
network system. This resulted in the de-centralization of culture production, thereby enabling a
larger populous with access to information technologies to become active participants in the
process of cultural formation. In terms of culture, power has been transferred to the social actors
who participate in sharing as well as collecting multi-lateral communication of knowledge,
-
7/29/2019 Hackathons Final w Pics
5/20
information, and meaning (Poster, 267). Cultural consensus or hegemony, based singularly on
historical precedence or a pre-existing set of common understandings, is gradually deconstructed
and replaced by multiple collections of codes to which a multi-vocality of meanings can be
attributed. Castells writes, The fragmentation of culture leads to the individualization of
cultural meaning in the communication of networks (22).
The democratization of technology also poses a challenge to technocapitalist values. At present,
information and systems are structured to maximize priorities of the establishment, embodying
the cultural horizon of capitalism. This namely comes in the form of efficiency, with other
concerns being displaced. Using technology in ways that contrast majority practice raises the
chance of democratic technological change without the destructive acts and insurmountable
challenge of dismantling such a technological infrastructure (Hands, 39-41).
With the introduction of information technologies to
the public and the surge of media activism, so-
called hacklabs emerged to account for changingsubjectivites of social actors, as they gained access
to producing new cultural dynamics and meanings.
Indeed, this work was seen as in continuation with
overturning those property relations in the area of
media, culture and technology (Maxigas, 3). We
understand in its initial emergence, the culture of
hacklabs has embraced acts of intervention that
disrupt the normative conditions of communication exchange and flow. This historically
subversive act can redistribute access to information databases and re-organize the power
relations around knowledge production that occurs within digital media networks.
The term hacker has contentious meaning, but is usually applied to actors behaving outside the
norms of these technological systems, beyond majority practice. The popular understanding of
the word is rooted in criminal acts of information theft and vandalism, but has an emerging
articulation used to describe a diverse body of actions and motivations (Coleman, Turgeman-
Goldschmidt). Hackathons themselves are not necessarily related to hacking, being more of a
programming marathon, but can involve work which falls under the description of hacktivism,
which Jordan describes as mass embodied online protest, internet infrastructure and
information politics, and communicative practices and organization" (258). For the sake of this
study, we are focusing on hackathons which fall under the second and third definitions.
Although there is an abundance of discussions around the vast networks of active individuals
expressing dissent over certain socio-political conditions and norms, it is critical to distinguish
the networks of interconnected nodes from more collectivized entities consisting of individuals
that have consciously organized themselves around consensus on action motives and strategies,
-
7/29/2019 Hackathons Final w Pics
6/20
which have been formed out of collective negotiations.2 Hacklabs are examples of conscious
efforts made by individual media/virtual activists to organize themselves into collectives and
collaboratively investigate strategies for political action or advocacy and support. As opposed to
merely retaining the properties of connectivity, which is more of a status of the relation or
affinity between individuated units. It is not the nature of the relation itself but indicates some
level of overlap or connection between individual nodes, particularly in social structuresconsisting of network systems. This distinction is necessary to make because the misconception
that connectivity automatically or inherently supposes collectivity leads to a kind of thinking that
simply participating in the trends of virtual activity can be considered to be political activism.
Hacktivism itself is part of a new set of strategies
that do not fit into current theoretical models of
activism. Mediated strategies do not just change
the scope of activism, but how it takes place, and
the nature of participation (Earl and Kimport,
29). It is important to critically think about theagency of technology in the process of motivating
social change and how people determine its social
purpose, as in the case of mediated political
movements and events like the Arab Spring, the
Iranian Revolution of 2009, and Occupy Wall
Street. New technologies enable certain types of political and social activism, yet it is unclear if
they determine the agendas of those movements (Earl and Kimport, 14). By examining the role
of individual actors and how they contribute to such movements, we can study whether
individual political agency is increased through the use of such technologies. New media
literacies (Jenkins et al, 19) affect the politics of information and in turn, public discourse. As westruggle to reconcile our dynamic relationship within the public sphere with changes to our
mediated experience of the world, we must find how people contribute to, and articulate the
reality in which we exist. Clearly, people play a role in this. To think otherwise suggest the sort
of technological determinism of Herbert Marcuse. Avoiding the view of technology as
monolithic and that social changes must occur through mass movements turns us away from
forms of change which are more localized yet cumulative, that lead to flexible instances that
contribute to larger examples of political or social resistance and protest (Hands, 37). It is our
belief that technology does not change the world, but people who use technology do.
We are looking at hacktivism as a mode of civic engagement emerging out of a longer tradition
of media activism. Like media activists have historically endeavored to do, hacktivists also
criticize the culture of intellectual property and attempt to re-program the systems of information
and knowledge privatization. Hacklabs, in particular, have historically been sites in which
2 In his article Networks, Swarms, Multitudes, Eugene Thacker discusses the emergence of mutationsor deviations from the contemporary body politic as symptomatic of a fundamental shift in the global
social structure. He explores the formations of alternative configurations of the body politic manifesting invarious modes of social organization including networks, swarms, and multitudes.
-
7/29/2019 Hackathons Final w Pics
7/20
hacktivists emerged to focus on re-appropriating computer networks and media technologies for
political uses. Maxigas describes, [D]ue to their historical situatedness in anticapitalist
movements and the barriers of access to contemporary communication infrastructure, hacklabs
tended to focus on the adoption of computer networks... for political uses... championing folk
creativity (Maxigas 4). These hacktivists engage in the practices of disseminating access to the
dispossessed and encouraging the masses to participate in producing as well as transmittingpolitically critical content. Thus, the politics of communication and information sharing become
re-shaped as the power relations around the flows of information are re-organized by hacktivism.
These iterations of hacktivism and new
forms of mediated activism also lead to a
change in the collective identity of a
cumulative movement. Shared concerns
and values contribute to the self-concept of
participants, which serves as a compelling
effect of collective action. This in turnfeeds a desire to participate more, but
shared identity is also leveraged against
desires for anonymity. Whether low-risk
actions (such as e-tactics that do not
require physical co-presence) or other
strategies requiring mediation of disparate of individuals through online networks creates a new,
less significant form of collective identity is not clear. However, dynamics of online protest
suggest new wrinkles in how we theorize collective identity (Earl and Kimport, 145) and
hackathons serve as sites to examine both the physical co-presence and mediated work of
individuals collaborating towards common goals. To understand these wrinkles, we chose tostudy hackathons and the potential they have to facilitate hacktivism and create collective
identities around shared goals and motivations.
Methodology
We approached this research with a social constructivist perspective. Given our concern over
how individuals form their political identities under various constraints, this seemed like the
most appropriate epistemological framework. Participants are dealing with prescribed cultural
norms, pre-existing social conditions, and commonly accepted political ideologies of the current
historical moment. As stated above, hacktivism and hackathons provide a case study and site forthis research. At each hackathon event, we attempted to learn about the processes by which
individual participants reach a consensus on the goals and conditions of their collective effort. It
was also important to take note of the ways in which individuals communicate with each other in
order to make sense of the multiplicity of ideas expressed in regards to collecting information
and utilizing digital media technologies as well as networks. During our participant observation,
we attempted to identify the common language employed by individuals in order to share and
-
7/29/2019 Hackathons Final w Pics
8/20
understand the knowledge needed to operate the tools used to facilitate the flows of information.
However, we assume that each hacker collective forms its own unique ethos and implements a
different belief or value system, under which to perform the work needed to achieve the
determined goals. While our results may not be representative, they serve as instantiations of this
process, and the differences between hackathons exemplify that.
An interview component to this work calls for reflexivity among subjects and ourselves, and
inviting the contributions of interviewees. Further work on this would allow significant portion
of the outcomes to emerge in the form of an action product, through which participants will be
able to both reflect on their involvement and to plan for more organized or collectivized work in
the future, creating a potential for this to be participatory action research (see Appendix).
Methods
In an attempt to understand the movement of individuals within particular collective/communal
environments, we have to consider ethnographic data collection strategies. In this case, we used
participant observation with various hacker communities, in which individuals convene in both
physical spaces as well as shared virtual media networks. Our goal was to study the events of co-
presence in physical and virtual space, as they relate
to this process of recursive identity construction.
What do participants bring to the table (physical and
virtual), and what do they leave there for others?
Our plan was to engage in participant observations to
find out how participants and members of
hackathons, hacklabs, or hackerspaces navigatethrough the physical spaces of such events. The
means of how they interact with other participants to
discuss the processes of constructing and fulfilling
meaningful objectives is crucial to understanding their roles in such work. As participant
observation is concerned with space, we observed both the environment of these hackathons and
the information space where they are involved in completing communal goals. We were also
concerned with who was drawn to participating in the physical gatherings, what their
contributions to forming the cultural dynamic and identity of the hacker collective were, and how
individual participants distinguish themselves from other members moving through the same
space. By observing their physical co-presence at these events, we examined how individualhackers were coming together to share knowledge about information technologies, creating new
knowledge, and taking control of digital media software and tools.
In addition, studying the mediated information networks organized by hacker communities was
useful. In the information space, we can see how the data (central to such events) are being used
and shared with others. We will also observe where data is located, who is privileged in these
encounters, and who is participating. We can also compare these physical and virtual encounters,
-
7/29/2019 Hackathons Final w Pics
9/20
how they contribute to the overall process of the event, and the ways they reflect on the
participants themselves.
Hackathons
Participating in three different hackathons with loosely related themes and agendas led to some
revelations about hackathon events and how it is difficult to correlate them with actual acts of
hacktivism. Between September and November 2012, we attended OccupyData III, EcoHack III
and Hack NJill II (in part). As the names imply, these were not the first gatherings of these
groups - they had met on previous occasions, and were each loosely organized by the same
groups and individuals, with similar goals and agendas as their previous iterations.
OccupyDataNYC
OccupyData, as the name implies, has been engendered by ideas and individuals inspired by orinvolved in the Occupy Wall Street Movement. The first hackathon took place in December of
2011, the second in March 2012, and the most recent (which we attended) September 2012.
Virtual documentation provided by organizers, public websites and repositories on the previous
two provided ample resources for us to study the outcomes and projects surrounding these
events. Organizers and participants of these events collaborated on projects using technology to
affect social/political agenda, and the footprints of their work are still visible on public web sites
such as http://searchunderoccupy.parsons.edu/, http://
occupydatanyc.org/, and collaborative Google docs
contianing a wealth of information.3 There is no evident
funding of these events.
Occupy Wall Street is perhaps the best documented and
over-represented example of a new political movement,
originating within the media space through Adbusters and
activist networks, and physically coming to fruition in the
media capital of the United States, where coverage
quickly went national. Iterations of Occupy groups across
the country and even overseas, as well as the colonizing aspect of how members identified and
associated their image with anti-austerity protests, the Arab spring, and other recent class
conflicts, ensured its totalizing appeal and encompassing nature. This gave researchers a huge
wealth of data to draw on, and a large banner with which they could identify causes and issues.Projects were conceived at the event without much prior thought, but used datasets which were
3 See the collaborative Google doc for Occupy Data Hackathon Data Mining and Visualization,
Accessed December 17, 2012. https://docs.google.com/document/d/11kSdBA42bbCw08Et1PG2VEtgHXHFlMaJzWaLoisNHI4/edit?hl=es
https://docs.google.com/document/d/11kSdBA42bbCw08Et1PG2VEtgHXHFlMaJzWaLoisNHI4/edit?hl=eshttp://occupydatanyc.org/http://searchunderoccupy.parsons.edu/http://occupydatanyc.org/https://docs.google.com/document/d/11kSdBA42bbCw08Et1PG2VEtgHXHFlMaJzWaLoisNHI4/edit?hl=eshttps://docs.google.com/document/d/11kSdBA42bbCw08Et1PG2VEtgHXHFlMaJzWaLoisNHI4/edit?hl=eshttps://docs.google.com/document/d/11kSdBA42bbCw08Et1PG2VEtgHXHFlMaJzWaLoisNHI4/edit?hl=eshttps://docs.google.com/document/d/11kSdBA42bbCw08Et1PG2VEtgHXHFlMaJzWaLoisNHI4/edit?hl=eshttp://occupydatanyc.org/http://occupydatanyc.org/http://occupydatanyc.org/http://occupydatanyc.org/http://searchunderoccupy.parsons.edu/http://searchunderoccupy.parsons.edu/ -
7/29/2019 Hackathons Final w Pics
10/20
either publicly available or previously built by participants.4
OccupyData I and II were explicitly multilocational, taking place in locations across the United
States (OccupyData I included a group in Utrecht, NL). These events were loosely organized,
working on different projects but taking place at the same time and having all their work
aggregated together. In contrast, OccupyDataNYC/OccupyData III (which we attended) wasopen to cooperation from participants who couldnt physically be present, but there was little to
no inclusion for them. During the event, participants talked about people online tweeting at them
and trying to get involved, but not being able to (after which they presumably lost interest).
OccupyDataNYC took place in the James Gallery in The Graduate Center at the City University
of New York. This setting somewhat repeated the choice of organizers to meet at the Arnold and
Sheila Aronson Gallery at The New School during the March event. Participants at this event
included researchers, students, developers and activists who were largely either technologically
literate (in coding and programming), invested in causes related to Occupy, or both. The lack of
technical skill in some participants was somewhat amended by the organizers designing aprocess where the importance of the research question (goal of a project) was just as privileged
as the development of that project and the results. Research questions were up for intense
discussion and formulation at the start of the hackathon, and while some coding work was done
the first day, the focus was the project questions and motivations.
EcoHack
EcoHack involves participants organized around
the theme of environmental issues. Organizers
include an activist and a genomicist, but they aremostly professional developers and self described
data geeks. EcoHack is presented by Vizzuality,
an open-source company that describes EcoHack
as an unconference5 while working with
conservation organizations in its regular business
operations.
EcoHack is also supported by other organizations,
including MailChimp, MapBox, The Public
Laboratory for Open Technology and Science, REDD Metrics, and CARTODB. It attracts a widebody of professional developers and programmers who, as they explained at the event, would be
doing this sort of work anyway.
4 See Datasets on the Occupy Data Hackathon Data Mining and Visualization Google Doc.
5 See Craig, Kathleen (June 6 2006). "Why "unconferences" are fun conferences". Business 2.0Magazine. http://money.cnn.com/2006/06/05/technology/business2_unconference0606/index.htm
http://money.cnn.com/2006/06/05/technology/business2_unconference0606/index.htmhttp://money.cnn.com/2006/06/05/technology/business2_unconference0606/index.htmhttp://money.cnn.com/2006/06/05/technology/business2_unconference0606/index.htmhttp://money.cnn.com/2006/06/05/technology/business2_unconference0606/index.htmhttp://money.cnn.com/2006/06/05/technology/business2_unconference0606/index.htmhttp://money.cnn.com/2006/06/05/technology/business2_unconference0606/index.htm -
7/29/2019 Hackathons Final w Pics
11/20
In the course of our participant observation, we spoke with programmers attending the event who
stated they were not as interested in the issues or topics of discussion at hackathons, but the
challenges of programming itself and the opportunity for collaboration. The projects at EcoHack
were somewhat preconceived - one group was using the setting as an intensive start to a 5 year
research project. Others brought an idea and drew from those assembled to develop it in the bestway possible.
Setting for EcoHack seemed less pertinent than it was for OccupyData or Hack NJill -
originally, organizers planned to hold the hackathon at the Museum of Natural History, but
instead it was held at an industrial building (formerly owned by Pfizer) in Bedford-Stuyvesant,
Brooklyn. A large, carpeted dining room served as a place to both assemble in the center and to
split off into larger groups in their own areas. Attendees estimated about half of those
participating had been at previous EcoHacks, and half were new. Many also implied that they
went to other hackathons regularly, and that this means of casual engagement with technology
and programing was a recreational activity stemming from their professional skills. This meantthat a significant portion of the participants had some level of pre-existing relationships or at
least encountered each other before even stepping into the physical space of the event.
Some of the participants indicated that the most difficult part about being immersed in the culture
of the EcoHack is learning the language of data analysis, visualization, mapping, etc. It is a kind
of rite of passage for those who desire to collaborate. For those who lacked technical skills or
even the language to talk about the different methods of approaching the data, it was difficult to
participate in projects because very few people reached out to explicitly demonstrate inclusivity
or invite them to contribute in whatever way possible. Generally, there was a sense that the
majority of participants still emphasized programming skills and application of data tools overthe issues of environmental sustainability and protection. We also have to be conscious of our
own situation, as those who lacked access to the common language and understanding of the
cultural dynamics. It was difficult for us to initiate contact and develop relationships that would
help us be more immersed in the action, without skills or knowledge of digital hacking
processes.
Hack NJill
Of the three hackathons, Hack NJill appeared to be the most structured event. Hack N Jill is
organized chiefly by four female professionals involved with tech companies as well as businessand public relations. It is also the most well sponsored by established, commercial entities.
Presented in collaboration with NYTechMeetUp, GirlDevelopIt and ControlGroup, Hack NJill
was hosted by Etsy in their offices in Brooklyn, and the preliminaries included an hour worth of
application programming interface (API) demos by companies such as Microsoft, RedHat,
Spotify and Mashery, among many others.
-
7/29/2019 Hackathons Final w Pics
12/20
We did not attend this hackathon during the day of
actual collaborative work, but we observed several
interesting features about the opening night. First, while
Hack NJill adopted the unconference guise of a
hackathon, its structure and organization privlidged the
commercial APIs and encouraged participants to workon including those features through a prize initiative.
Second, Hack NJills goals were not as explicitly
activist-oriented, as were OccupyData and EcoHack,
though the theme was to highlight the role of women in
the tech industry. There was a significantly more diverse
group of participants at Hack NJill, in terms of both race and gender. Third, organizers created
rules around the projects, including fresh code only - nothing the participants submitted as part
of the event could have been developed beforehand. These projects were also pitched by
participants immediately following the API presentations.
Another interesting feature: while the organizers were female and the participants who pitched
ideas and formed teams were female, nearly all of the commercial API presenters were male. The
event was geared to promote inclusiveness, and there were jokes and discussions about
companies specifically trying to hire women, and this event reflected that issue within the tech
industry.
While the agenda of female empowerment is inherently a political and social issue, the projects
did not need to be - however, the previous week Hurricane Sandy had made landfall in New
York. Due to the timing of the event, many of the projects focused around disaster relief efforts,
with few exceptions.
Analysis
No two hackathons are exactly alike. Depending on the organizers, the nature and goals of the
event, the participants, the level of corporate support, and even the setting, hackathons can have
wildly different atmospheres which encourage different sorts of work and agendas. They can be
aggressively casual, in the sense that participants are not concerned with formalities and
structure. One participant became agitated when we asked if they would sign a formal informed
consent form. At another point, an organizer asked our research work to be discrete and not
bother participants, because thats not what theyre here for. Participants attend for differentreasons, including networking, learning, and a desire to make something interesting.
One participant described to us the three different types of hackathons. There are API events,
where participants are encouraged to use a cool and interesting new piece of technology. In a
sense, participants are invited to do a companys work for them, by testing out and debugging
tools which they havent promoted to a wider audience yet. Participants are happy to do this
-
7/29/2019 Hackathons Final w Pics
13/20
because it means learning new skills and creating interesting solutions which benefit them
personally, by raising their professional skill set and allowing them to collaborate with others on
the same, normally esoteric issues. EcoHack featured some API opportunities, but not as strongly
as Hack NJill
Second, there are contest hackathons, where individuals compete to produce projects that arejudged by organizers or an independent panel. Hack NJill served as an example of both of these
first two categories, featuring tasty prizes from various API developers. This seems like a
minor incentive. Participants may not to come to a hackathon for prizes, but it could guide their
work in certain directions, and it rewards them for certain types of participation.
Lastly, there are the socially conscious hackathons. These include EcoHack and OccupyData.
These events are organized around the sort of political themes and efforts which we originally
wanted to investigate, and seem like the most probably site for hacktivism or civically engaged
hacking.
What we found was quite different from our initial assumptions. Unless there is a deliberative
effort, hackathons are not collectivizing. Instead they are collaborative, encouraging participants
to work with new individuals and groups, allowing for an open and free sharing of skills, ability
and information. While there is a need for formalized planning to make a hackathon happen,
participation is informal. Someone may show up one day and not the next. Groups working on
the same project may include members who drift in and out of discussion and work. Some
individuals may aid multiple groups at the same time, particularly if they have a high skill level.
Hacktivism is by no means integral to hackathons. Hacktivism may be a part of a hackathon, but
not all projects are hacktivism.
This is possibly because of a disconnect between policy, advocacy and technology. The
participants we met at hackathons were most likely to be developers, coders and people involved
in the technology industry attending to learn new skills, to network with other professionals, and
to work on projects they think are interesting. As one participant told us, these are projects that
they might consider during the week, but cant pursue in a professional capacity. These are by no
means necessarily political projects or social causes, but instead they are technical problems,
which improve the participants ability once it is solved.
There is a very social experience of organizing at a hackathon - the informality of the event
means that attendees have to navigate new social situations and groups quickly and effectively.
Informal conversations revolve around tech skills. People launch right into the work, and begin
collaboration as soon as possible. A hackathon is a recreational performance of skill, a social
experience of collaborative ability which encourages individuals to work together on whatever
piques their interest.
We noticed that part of the reason for such swift and efficient formation of working groups had
to do with the participants familiarity with each other. As we mentioned earlier, many
-
7/29/2019 Hackathons Final w Pics
14/20
participants of hackathons are not so new to them. Many frequently participate in different types
of hackathons, therefore a significant number of them encounter each other in previous
hackathon events. Based on this understanding, we can make the connection between these pre-
existing ties between participants and the cultural dynamics of the hackathon events. We think
that that participants regular attendance of different hackathon events and their prior
engagement in activities with one another gave them the experience to form groups andcollaboratively work on projects efficiently, without the need for the event organizers and
facilitators to explain protocols or rules for initiating projects and maintaining collaborative work
spaces. In fact, many of the activities, including group organizations, sharing of skills, and
division of labor, occurred organically and were largely participant led. At OccupyData,
participants were encouraged to circulate and see what different groups were doing, but
eventually settled into roles that they saw fit. A group focused around narratives of OWS
emerged from people who had both the skills and the interest to make it happen, without any
direction from the organizers.
In this sense, we can interpret hackathons, like the EcoHack event, to have facilitated theformation of a community of people interested in collecting and making sense of data related to
environmental science and contemporary ecological issues. There seemed to be an implicit
consensus and perhaps even a set of norms on how the participants physically present in the
space, called forth by the hackathon, would navigate through and interact with other participants
to achieve the goal of analyzing, making sense, and visualizing various data collected. On the
one hand, participants seem to have more agency in leading group discussions and coming up
with their own methods or approaches to collecting, organizing, analyzing, and making sense of
data. However, on the other hand, the dynamics of inclusion and exclusion become more
revealed, as those who lack the understanding of how the hackathon operates or lack the ability
to communicate using the shared language of those with more experience in hacking cultureshave a difficult time engaging themselves and contributing to the progress of the collaborative
projects.
Even at a socially conscious hackathon, solving those problems does not mean participants are
deliberately engaged in hacktivism, with the goal of answering social problems. Instead they are
interested in technology problems. Technology helps to inform agenda and goals of advocates for
issues, but itself does not to purport a solution. As stated above, there is a disconnect with
advocacy and technology. Additional participation by activists who are familiar with those
problems may improve this problem, but programmers who are interested in applying a dataset
to provide a visualization of some political issue seem to believe that the data itself will affect
change - there doesnt seem to be much concern with any long-term impact of their work, or
even with the way it lasts beyond the event. Many of these projects seem like digital ephemera,
not actually designed with the intent of lasting beyond the event itself, but just to satisfy a contest
or make something interesting. Whether or not the group that will meet again is unclear, but a
study over time would reveal more.
-
7/29/2019 Hackathons Final w Pics
15/20
Personal reflections
A crucial part of executing the data collection methods was thinking about how to situate
ourselves and perform our roles as researchers with specific preconceived assumptions and
biases. There were aspects of our data collection processes in which we attempted deductively to
find instances and moments that would constitute as evidentiary support for our initial
arguments. For example, we approached our participant observations with an assumption that
hackathons are sites at which hacktivists organized themselves into a collective with specific
action agendas or mission statements that guide the continued formation into active communities
with consensus on certain norms and operational protocol (in other words, how the group was to
function, for what purpose and to what extent). However, we found out that different hackathons
serve different purposes, but in most cases, they are more sites of collaborations than they are
organizations consisting of negotiations for collectivization. Therefore, we also had to take up
inductive strategies of data collection. This meant that we also needed to be opened to
participating in the activities of hackathons in the effort of allowing the data to emerge from the
engagement and interactions with other participants. However, this task proved to be difficult
and it required time and effort on our parts to adjust to the unconscious cultural norms of these
events.
Given our lack of skill in programming, we had to seek means of participation that did not rely
on performing tasks involving programming and coding. This made us more dependent on
participant interaction to fully understand and clarify what we do not understand in the
hackerspace. However, without much to contribute to the processes taken up by the different
project groups at hackathons, we found it difficult to engage in conversations or interact with
many participants. While many participants were able to identify the roles they could effectively
perform (programming, mapping, scraping, etc.), we had difficulties articulating which roleswould best fit our attributes. The fact of participants dividing up the work according to types of
skills indicated that the interactions amongst heterogeneous identities were more nuanced than
simply distinguishing the hackers from the non-hackers. On the contrary, participants rarely
used the term, hacker to identify themselves.
Many of the participants were goal-oriented and intently focused on their projects rather than
taking the time to include those like us, who lacked the ability to give constructive suggestions
on how to produce solutions for problems relating to the handling of digital data. This
observation was useful in revealing to us some of the internal social dynamics of hackathons,
which we have articulated to be distinctly social events. Each hackathon had a unique culturethat enabled people to work effectively on collaborations. However, a common theme that ran
through all of the attended events had to do with our struggle with engaging in activities and
contribute to the collaborative processes that are emphasized and fostered at hackathons. Often
times, we felt as though we could only observe from a distance without the necessary skills or
experiences to warrant interest from the other participants in what helpful attributes we might be
able to offer.
-
7/29/2019 Hackathons Final w Pics
16/20
Keeping that reflexivity as a feature of future research (see Appendix) helps to ensure the
legitimacy of our claims. In future studies, having participants evaluate themselves would be
helpful to guarantee that we do not misrepresent or misconstrue the subjects or their perceptions.
It will be useful to immerse ourselves into the diverse cultures of hackathons and develop
relationships with both organizers and participants in order to gauge how participants maintainconnections with one another, continue to collaborate on hacking processes, and/or habituate
themselves under particular cultural norms. If we are able to build rapport, learn basic skills, and
take the initiative to be more involved, we foresee possibilities of helping to support or even
facilitate the formation of communities arising out of the relationships made through the
collaborative processes emerging at hackathons. In order for us to see the different
manifestations of social or interpersonal relationships, we must actively seek to share how our
identities, understandings, skills, and thinking could fit into the group dynamics constituting
hackathons.
Conclusions
The hackathon is space where developers, designers and people who are interested or
experienced in relevant areas can join together to "crowdsource" the thought process and
development aspect of technological tools, which may or may not have social applications.
Hackathons are unique in the way they aggregate skill levels and encourage participants to
collaborate, but they do not coalesce those efforts, and participants do not become collectivized,
unless there is an explicitly deliberate effort on behalf of the organizers. In this case, those
barriers of entry may exclude people who would not already identify with those causes, and
hackathons become a site where they can work on those problems together.
While these events are participant driven, the individual stakes make collaboration a process of
mutual benefit within the event itself, and directing those efforts beyond the hackathon takes
effort on behalf of the organizers. To use a hackathon for hacktivism, there needs to be a specific
policy or cause that participants are encouraged to address. An action agenda driven by
technology solutions can be privileged in the same way that APIs and tech industry interests are
in contest driven hackathons. This may balance out some discouragement arising from
organization that is too strict or structured.
Further study is necessary to fully explore the potential of hackathons for hacktivism, and to
understand the relationship between the identities of the participants and the collective identity(or lack thereof, as this study indicates) of a hackathon.
-
7/29/2019 Hackathons Final w Pics
17/20
Appendix
Future Research
There is a wealth of additional questions and issues that come out of this work, which can be
addressed in future study. In what ways are the various processes of hacking action-oriented
and in what ways can the process mobilize participants to contribute to social change? How do
media technologies appropriated for the process of hacking help to form the political position
or identity of an individual? How does the specific usage of particular media tools help to define
the objectives and purpose of a unique gathering of hackers like a hackathon? These are
questions we started with, and would pursue with further study. How do participants they compel
others to become invested in their own personal stakes, and how do they become invested in the
stakes of others? Is this an authentic investment?
As to our original questions, it is important to follow up our observational approaches with semi-
structured interviews. These interviews are necessary to delve deeper into the insights ofindividuals that have participated in the hackathons. Due to the constraints of our timeline, this is
where further study could be done. Organizers and participants who are willing to consent can be
interviewed, and researches could ask questions specifically related to their experiences leading
up to such events and how they conceptualize their roles in the middle of this communal work. In
further work, researchers can ask participants questions such as, how they would describe
significant experiences in their lives that led them to their sociopolitical outlook. What are their
views on activism and hacktivism? Do hackathons (and their work in such a context) feel like the
work of a collective? Do they see themselves as part of such a group? The semistructured nature
of the interviews and the expertise of the participants means these questions should guide the
work but not restrictive. We feel a conversational approach would be most beneficial. This workwas part of our original study design and will be included in future results.
Ideally, in the course of research we would like to enable more control of the study by
participants over time (Garcia-Iriarte et al.). It would be key to formulate a way to leave the work
in the hands of the participants, as a means of continual refinement and improvement of their
own collective work. However, the existing ethics of this strategy mean that it could be co-opted
for causes and interests which may seek to generate a false sense of authenticity. Such a method
would be extremely useful to hegemonic interests at building false grounds for support, such as
government, corporate or commercial advocates of some purpose potentially not to the public
interest. The associational guise of such a study (Kindon, 22) and delegitimization of theoriginal positioning of participants would undermine the idea of natural, organic decision-
making and identity construction.
As part of future research, we would invite organizers and key participants of these hackathons
to a focus group, in which we will lead group discussions around the themes we have already
explored in our semi-structured interviews. Lastly, there is a wealth of information available
from previous hackathons, including raw data and the products. We can also search for any
-
7/29/2019 Hackathons Final w Pics
18/20
further documentation, which we can add to a retrospective analysis, such as comparing the most
recent OccupyResearch hackathon with previous iterations.
As researchers, we have to remain reflexive about our status as participants lacking the
knowledge particular to a hacker community that has been always in the process of production
since before our involvement. While this complicates our situation, being forced to rethink andre-evaluate how we categorize actual findings will provide a good critical weight against our
own assumptions imposed upon the community. This should not limit us to the extent that we do
not participate at all. Instead, we must carefully consider how we want to help pose the questions
needed to initiate hacker inquiry and find the desired sources of specific data production.
We would also like to incorporate a more participatory action research study design to this work,
by moving the research within the context of the hackathon itself. Conducting a meta-hack,
where we modify and repurpose the event to be more reflexive, and including the participants to
improve on a hackathon would be a useful way of creating an action agenda for future events.
Since this study is intended to produce understanding and inform us on the process of self-concept and crowd-sourced ideology, our use of an action oriented hackathon with political or
social agendas as a field of study rests heavily on the goals and intentions of the subjects.
Providing them with a stake in the work would be ethical. It would also give us richer findings,
better results and a proper application for the work.
-
7/29/2019 Hackathons Final w Pics
19/20
Works Cited
Alleyne, Brian. We Are All Hackers Now: Critical Sociological Reflections on the Hacking
Phenomenon._ Under Review (2011): n. pag. Print.
Castells, Manuel. "Materials for an Exploratory Theory of the Network Society."
British Journal of Sociology 51.1 (2000): 5-24. Print.
Coleman, G. Hacker Politics and Publics. Public Culture 23.3 65 (2011): 511516.
Web.
Earl, Jennifer, and Katrina Kimport.Digitally Enabled Social Change. Cambridge: The
MIT Press (2011)
Jordan T. The politics of technology: Three types of hacktivism. Net
Working/Networking: Citizen Initiated Internet Politics. Ed. Hayhtio T and Rinne J Tampere:
Tampere University Press, 2008. 254280. Print.
Hands, Joss. @ Is for Activism. New York, NY: Pluto Press (2011)
E. Garcia-Iriarte, J. C. Kramer, J. M. Kramer and J. Hamme. Who Did What?: A
Participatory Action Research Project to Increase Group Capacity for Advocacy.Journal of
Applied Research in Intellectual Disabilities 22 (2009): 1022.
Gunkel, D J. Editorial: Introduction to Hacking and Hacktivism.New Media & Society (2005):
n. pag. Print.
Fitri, N et al. Democracy Discourses Through the Internet Communication: Understanding the
Hacktivism for the Global Changing. Small(2011): n. pag. Print.
Jenkins, H. et al. Confronting the Challenges of Participatory Culture: Media Education for the
21st Century. Chicago: The MacArthur Foundation, 2006. Web.
Kindon, Sarah, Rachel Pain, and Mike Kesby. Paricipatory Action Research Approaches and
Methods: Connecting People, Participation and Place - Chapters 1-3. Participatory Action
Research Approaches and Methods: Connecting People, Participation and Place. Routledge,
London; New York., 2007. 125. Print.
Lapp, H et al. The 2006 NESCent Phyloinformatics Hackathon: a Field Report.Evolutionary
Bioinformatics Online 3 (2007): 287. Print.
-
7/29/2019 Hackathons Final w Pics
20/20
Lunceford, B. Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack.
Media History Monographs (2009): n. pag. Print.
Maxigas. "Hacklabs and Hackerspaces - Tracing Two Geneologies."Journal of Peer
Production 2 (2012): 1-10. Web.
Poster, Mark. Cyberdemocracy: the Internet and the Public Sphere.Internet Culture. Ed. David
Porter. New York, New York: Routledge, 1997. 201218. Print.
Samuel, A. Decoding Hacktivism: Purpose, Method, and Identity in a New Social Movement.
Harvard University. Unpublished Manuscript. http://www.itas.fzk.de/e-society/preprints/
egovernance/samuel. pdf Page viewed 7.31 (2001): 2003. Print.
Thacker, Eugene. "Networks, Swarms, Multitudes." (n.d.): n. pag. CTheory. Arthur and
Marilouise Kroker, 18 May 2004. Web. 20 Oct. 2012. .
Turgeman-Goldschmidt, O. Meanings That Hackers Assign to Their Being a Hacker.
International Journal of Cyber Criminology 2.2 (2008): n. pag. Print.
Woo, Hyung-jin, Yeora Kim, and Joseph Dominick. Hackers: Militants or Merry Pranksters? a
Content Analysis of Defaced Web Pages.Media Psychology 6.1 (2004): 6382. Web.
http://www.ctheory.net/articles.aspx?id=422http://www.ctheory.net/articles.aspx?id=422http://www.ctheory.net/articles.aspx?id=422http://www.ctheory.net/articles.aspx?id=422http://www.itas.fzk.de/e-society/preprints/egovernance/samuelhttp://www.itas.fzk.de/e-society/preprints/egovernance/samuelhttp://www.itas.fzk.de/e-society/preprints/egovernance/samuelhttp://www.itas.fzk.de/e-society/preprints/egovernance/samuel