Author of the publication

You Hacked and Now What?: - Exploring Outcomes of a Corporate Hackathon.

, , , , , and . Proc. ACM Hum. Comput. Interact., 2 (CSCW): 129:1-129:23 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effects and Antecedents of Conflict in Free and Open Source Software Development., and . CSCW, page 703-714. ACM, (2016)Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study., and . CSCW, page 502-513. ACM, (2016)Designing Corporate Hackathons With a Purpose: The Future of Software Development., , , , , and . IEEE Softw., 36 (1): 15-22 (2019)Hacking and Making at Time-Bounded Events: Current Trends and Next Steps in Research and Event Design., , , , , , , and . CSCW Companion, page 363-370. ACM, (2017)How to organize a hackathon - A planning kit., , , , , , , , and . CoRR, (2020)The dual role of conflict in free and open source software development.. OpenSym, page 35:1. ACM, (2013)Detecting and Characterizing Bots that Commit Code., , , , , , and . MSR, page 209-219. ACM, (2020)Mudslinging and Manners: Unpacking Conflict in Free and Open Source Software., and . CSCW, page 1393-1403. ACM, (2015)Evolutionary algorithms in high-dimensional radio access network optimization., , , , , , , , , and . GECCO Companion, page 1834-1841. ACM, (2021)'Welcome' Changes?: Descriptive and Injunctive Norms in a Wikipedia Sub-Community., and . PACMHCI, 2 (CSCW): 52:1-52:26 (2018)