{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T13:40:24Z","timestamp":1775050824639,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T00:00:00Z","timestamp":1426464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,16]]},"DOI":"10.1145\/2723576.2723623","type":"proceedings-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T12:27:54Z","timestamp":1426595274000},"page":"184-193","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["Penetrating the black box of time-on-task estimation"],"prefix":"10.1145","author":[{"given":"Vitomir","family":"Kovanovi\u0107","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Dragan","family":"Ga\u0161evi\u0107","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Shane","family":"Dawson","sequence":"additional","affiliation":[{"name":"University of South Australia, Adelaide, Australia"}]},{"given":"Sre\u0107ko","family":"Joksimovi\u0107","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby, Canada"}]},{"given":"Ryan S.","family":"Baker","sequence":"additional","affiliation":[{"name":"Columbia University, New York"}]},{"given":"Marek","family":"Hatala","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby, Canada"}]}],"member":"320","published-online":{"date-parts":[[2015,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ten years later. The Internet and Higher Education, 13(1--2)","author":"Special","year":"2010","unstructured":"Special issue on the community of inquiry framework : Ten years later. The Internet and Higher Education, 13(1--2) , 2010 . Special issue on the community of inquiry framework: Ten years later. The Internet and Higher Education, 13(1--2), 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018712914619"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2007.13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240785"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985741"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0037632"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v10i6.760"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.02.004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/016146816306400801"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(95)00043-7"},{"key":"e_1_3_2_1_11_1","first-page":"701","volume-title":"Proceedings of the 14th AIED Conference on Artificial Intelligence in Education","author":"Cetintas S.","year":"2009","unstructured":"S. Cetintas , L. Si , Y. P. Xin , C. Hord , and D. Zhang . Learning to identify students' off-task behavior in intelligent tutoring systems . In Proceedings of the 14th AIED Conference on Artificial Intelligence in Education , pages 701 -- 703 , 2009 . S. Cetintas, L. Si, Y. P. Xin, C. Hord, and D. Zhang. Learning to identify students' off-task behavior in intelligent tutoring systems. In Proceedings of the 14th AIED Conference on Artificial Intelligence in Education, pages 701--703, 2009."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2009.44"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0307-4412(89)90094-0"},{"issue":"3","key":"e_1_3_2_1_14_1","first-page":"78","article-title":"A survey on preprocessing methods for web usage data","volume":"7","author":"Chitraa V.","year":"2010","unstructured":"V. Chitraa and A. S. Davamani . A survey on preprocessing methods for web usage data . International Journal of Computer Science and Information Security , 7 ( 3 ): 78 -- 83 , 2010 . V. Chitraa and A. S. Davamani. A survey on preprocessing methods for web usage data. International Journal of Computer Science and Information Security, 7(3): 78--83, 2010.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203029053"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/876886.880104"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03325089"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.03.003"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1096-7516(00)00016-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/08923640109527071"},{"key":"e_1_3_2_1_21_1","volume-title":"Externally-facilitated regulation scaffolding and role assignment to develop cognitive presence in asynchronous online discussions. The Internet and Higher Education, in press","author":"Gasevic D.","year":"2014","unstructured":"D. Gasevic , A. Olusola , S. Joksimovic , and V. Kovanovic . Externally-facilitated regulation scaffolding and role assignment to develop cognitive presence in asynchronous online discussions. The Internet and Higher Education, in press , 2014 . D. Gasevic, A. Olusola, S. Joksimovic, and V. Kovanovic. Externally-facilitated regulation scaffolding and role assignment to develop cognitive presence in asynchronous online discussions. The Internet and Higher Education, in press, 2014."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(02)00020-9"},{"key":"e_1_3_2_1_23_1","first-page":"693","volume-title":"2009 Joint Conferences on Pervasive Computing (JCPC)","author":"Guo Y.","year":"2009","unstructured":"Y. Guo , J. Wang , J. Moore , M. Liu , and H.-L. Chen . A case study of usability testing on an asynchronous e-learning platform . In 2009 Joint Conferences on Pervasive Computing (JCPC) , pages 693 -- 698 , 2009 . Y. Guo, J. Wang, J. Moore, M. Liu, and H.-L. Chen. A case study of usability testing on an asynchronous e-learning platform. In 2009 Joint Conferences on Pervasive Computing (JCPC), pages 693--698, 2009."},{"key":"e_1_3_2_1_24_1","volume-title":"The elements of statistical learning: data mining, inference, and prediction","author":"Hastie T. J.","year":"2013","unstructured":"T. J. Hastie , R. J. Tibshirani , and J. H. Friedman . The elements of statistical learning: data mining, inference, and prediction . Springer , 2013 . T. J. Hastie, R. J. Tibshirani, and J. H. Friedman. The elements of statistical learning: data mining, inference, and prediction. Springer, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0742-051X(86)90002-8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/08923640701595373"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v14i4.1542"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIET.2010.5625730"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.08.013"},{"issue":"8","key":"e_1_3_2_1_30_1","first-page":"32","article-title":"Synthesis of research on time and learning","volume":"41","author":"Karweit N.","year":"1984","unstructured":"N. Karweit . Time-on-task reconsidered : Synthesis of research on time and learning . Educational Leadership , 41 ( 8 ): 32 -- 35 , 1984 . N. Karweit. Time-on-task reconsidered: Synthesis of research on time and learning. Educational Leadership, 41(8): 32--35, 1984.","journal-title":"Educational Leadership"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.74.6.844"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11412-011-9110-3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(00)00030-3"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2011.05.010"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.09.001"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.03.014"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.09.008"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018432.1021505"},{"key":"e_1_3_2_1_39_1","first-page":"19","volume-title":"Knowledge and Data Engineering Exchange, 1999.(KDEX'99) Proceedings. 1999 Workshop on","author":"Mobasher B.","year":"1999","unstructured":"B. Mobasher , R. Cooley , and J. Srivastava . Creating adaptive web sites through usage-based clustering of URLs . In Knowledge and Data Engineering Exchange, 1999.(KDEX'99) Proceedings. 1999 Workshop on , pages 19 -- 25 , 1999 . B. Mobasher, R. Cooley, and J. Srivastava. Creating adaptive web sites through usage-based clustering of URLs. In Knowledge and Data Engineering Exchange, 1999.(KDEX'99) Proceedings. 1999 Workshop on, pages 19--25, 1999."},{"key":"e_1_3_2_1_40_1","unstructured":"Moodle HQ. Homepage 2014. https:\/\/moodle.org\/.  Moodle HQ. Homepage 2014. https:\/\/moodle.org\/."},{"issue":"4","key":"e_1_3_2_1_41_1","first-page":"487","article-title":"Time on task, interaction, and information handling in multimedia learning environments","volume":"21","author":"Mooij E. S. a. T.","year":"2000","unstructured":"E. S. a. T. Mooij . Time on task, interaction, and information handling in multimedia learning environments . Journal of Educational Computing Research , 21 ( 4 ): 487 -- 502 , 2000 . E. S. a. T. Mooij. Time on task, interaction, and information handling in multimedia learning environments. Journal of Educational Computing Research, 21(4): 487--502, 2000.","journal-title":"Journal of Educational Computing Research"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.04.177"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.04.255"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.08.007"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460296.2460320"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.138"},{"issue":"1","key":"e_1_3_2_1_47_1","first-page":"179","article-title":"Knowledge discovery from web usage data: Complete preprocessing methodology","volume":"8","author":"Raju G. T.","year":"2008","unstructured":"G. T. Raju and P. S. Satyanarayana . Knowledge discovery from web usage data: Complete preprocessing methodology . International Journal of Computer Science and Network Security , 8 ( 1 ): 179 -- 186 , 2008 . G. T. Raju and P. S. Satyanarayana. Knowledge discovery from web usage data: Complete preprocessing methodology. International Journal of Computer Science and Network Security, 8(1): 179--186, 2008.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330601.2330657"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2053532"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2007.05.016"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.20456"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v12i5.999"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.001"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3102\/0013189X009011011"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11251-007-9039-0"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0361-476X(02)00006-1"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11251-012-9230-9"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460296.2460308"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/0883-0355(94)90021-3"}],"event":{"name":"LAK '15: the 5th International Learning Analytics and Knowledge Conference","location":"Poughkeepsie New York","acronym":"LAK '15"},"container-title":["Proceedings of the Fifth International Conference on Learning Analytics And Knowledge"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2723576.2723623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2723576.2723623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:26Z","timestamp":1750227386000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2723576.2723623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,16]]},"references-count":59,"alternative-id":["10.1145\/2723576.2723623","10.1145\/2723576"],"URL":"https:\/\/doi.org\/10.1145\/2723576.2723623","relation":{},"subject":[],"published":{"date-parts":[[2015,3,16]]},"assertion":[{"value":"2015-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}