{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T07:47:19Z","timestamp":1773042439879,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":53,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UK Engineering and Physical Sciences Research Council (EPSRC)","award":["EP\/J017728\/2"],"award-info":[{"award-number":["EP\/J017728\/2"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1145\/2883851.2883928","type":"proceedings-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T13:54:08Z","timestamp":1461333248000},"page":"314-323","source":"Crossref","is-referenced-by-count":62,"title":["Translating network position into performance"],"prefix":"10.1145","author":[{"given":"Sre\u0107ko","family":"Joksimovi\u0107","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, UK"}]},{"given":"Areti","family":"Manataki","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, UK"}]},{"given":"Dragan","family":"Ga\u0161evi\u0107","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, UK"}]},{"given":"Shane","family":"Dawson","sequence":"additional","affiliation":[{"name":"University of South Australia, Adelaide, Australia"}]},{"given":"Vitomir","family":"Kovanovi\u0107","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, UK"}]},{"given":"In\u00e9s Friss","family":"de Kereki","sequence":"additional","affiliation":[{"name":"Universidad ORT Uruguay, Montevideo, Uruguay"}]}],"member":"320","reference":[{"key":"key-10.1145\/2883851.2883928-1","doi-asserted-by":"crossref","unstructured":"K. Cela, M. Sicilia, and S. S&#225;nchez, \"Social Network Analysis in E-Learning Environments: A Preliminary Systematic Review,\"Educ. Psychol. Rev., vol. 27, no. 1, pp. 219--246, 2015.","DOI":"10.1007\/s10648-014-9276-0"},{"key":"key-10.1145\/2883851.2883928-2","doi-asserted-by":"crossref","unstructured":"S. Dawson, D. Ga&#353;evi&#263;, G. Siemens, and S. Joksimovic, \"Current state and future trends: A citation network analysis of the learning analytics field,\" inProceedings of the Fourth International Conference on Learning Analytics And Knowledge, 2014, pp. 231--240.","DOI":"10.1145\/2567574.2567585"},{"key":"key-10.1145\/2883851.2883928-3","unstructured":"B. V. Carolan,Social Network Analysis Education: Theory, Methods &#38; Applications. Social Network Analysis Education: Theory, Methods &#38; Applications. SAGE Publications, Inc.SAGE Publications, Inc., 2014."},{"key":"key-10.1145\/2883851.2883928-4","doi-asserted-by":"crossref","unstructured":"K. Stepanyan, K. Borau, and C. Ullrich, \"A Social Network Analysis Perspective on Student Interaction within the Twitter Microblogging Environment,\" inAdvanced Learning Technologies (ICALT), 2010 IEEE 10th International Conference on, 2010, pp. 70--72.","DOI":"10.1109\/ICALT.2010.27"},{"key":"key-10.1145\/2883851.2883928-5","doi-asserted-by":"crossref","unstructured":"S. Kellogg, S. Booth, and K. Oliver, \"A social network perspective on peer supported learning in MOOCs for educators,\"Int. Rev. Res. Open Distrib. Learn., vol. 15, no. 5, 2014.","DOI":"10.19173\/irrodl.v15i5.1852"},{"key":"key-10.1145\/2883851.2883928-6","doi-asserted-by":"crossref","unstructured":"D. McFarland, D. Diehl, and C. Rawlings, \"Methodological Transactionalism and the Sociology of Education,\" inFrontiers in Sociology of Education, vol. 1, M. T. Hallinan, Ed. Springer Netherlands, 2011, pp. 87--109.","DOI":"10.1007\/978-94-007-1576-9_5"},{"key":"key-10.1145\/2883851.2883928-7","doi-asserted-by":"crossref","unstructured":"L. M. Vaquero and M. Cebrian, \"The rich club phenomenon in the classroom,\"Sci Rep, vol. 3, Jan. 2013.","DOI":"10.1038\/srep01174"},{"key":"key-10.1145\/2883851.2883928-8","doi-asserted-by":"crossref","unstructured":"S. Goodreau, J. Kitts, and M. Morris, \"Birds of a Feather, or Friend of a Friend? Using Exponential Random Graph Models to Investigate Adolescent Social Networks,\"Demography, vol. 46, no. 1, pp. 103--125, 2009.","DOI":"10.1353\/dem.0.0045"},{"key":"key-10.1145\/2883851.2883928-9","doi-asserted-by":"crossref","unstructured":"L. C. Freeman, \"Centrality in social networks conceptual clarification,\"Soc. Netw., vol. 1, no. 3, pp. 215--239, 1979.","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"key-10.1145\/2883851.2883928-10","doi-asserted-by":"crossref","unstructured":"S. Wasserman,Social network analysis: Methods and applications, vol. 8. Cambridge university press, 1994.","DOI":"10.1017\/CBO9780511815478"},{"key":"key-10.1145\/2883851.2883928-11","unstructured":"N. Dowell, O. Skrypnyk, S. Joksimovi&#263;, A. C. Graesser, S. Dawson, D. Ga&#353;evi&#263;, P. de Vries, T. Hennis, and V. Kovanovi&#263;, \"Modeling Learners' Social Centrality and Performance through Language and Discourse,\" presented at the In Proceedings of the 8th International Conference on Educational Data Mining, Madrid, Spain, 2015."},{"key":"key-10.1145\/2883851.2883928-12","unstructured":"R. S. Burt,STRUCTURAL HOLES. Harvard University Press, 1995."},{"key":"key-10.1145\/2883851.2883928-13","unstructured":"M. S. Granovetter, \"The strength of weak ties,\"Am. J. Sociol., pp. 1360--1380, 1973."},{"key":"key-10.1145\/2883851.2883928-14","unstructured":"S. Jiang, S. M. Fitzhugh, and M. Warschauer, \"Social Positioning and Performance in MOOCs,\" inProceedings of the Workshops held at Educational Data Mining 2014, co-located with 7th International Conference on Educational Data Mining (EDM 2014), London, United Kingdom, 2014, vol. 1183, p. 14."},{"key":"key-10.1145\/2883851.2883928-15","doi-asserted-by":"crossref","unstructured":"D. Ga&#353;evi&#263;, S. Dawson, T. Rogers, and D. Ga&#353;evi&#263;, \"Learning analytics should not promote one size fits all: The effects of instructional conditions in predicting academic success,\"Internet High. Educ., vol. 28, pp. 68--84, 2016.","DOI":"10.1016\/j.iheduc.2015.10.002"},{"key":"key-10.1145\/2883851.2883928-16","unstructured":"D. Krackhardt, \"The Ties that Torture: Simmelian Tie Analysis in Organizations,\"Res. Sociol. Organ., vol. 16, pp. 183--210, 1999."},{"key":"key-10.1145\/2883851.2883928-17","doi-asserted-by":"crossref","unstructured":"D. Ga&#353;evi&#263;, V. Kovanovi&#263;, S. Joksimovi&#263;, and G. Siemens, \"Where is research on massive open online courses headed? A data analysis of the MOOC Research Initiative,\"Int. Rev. Res. Open Distrib. Learn., vol. 15, no. 5, 2014.","DOI":"10.19173\/irrodl.v15i5.1954"},{"key":"key-10.1145\/2883851.2883928-18","unstructured":"M. De Laat and F. Prinsen, \"Social learning analytics: Navigating the changing settings of higher education.,\"J. Res. Pract. Assess., vol. 9, no. 4, pp. 51--60, 2014."},{"key":"key-10.1145\/2883851.2883928-19","unstructured":"K. Jordan, \"Synthesising MOOC completion rates | MoocMoocher,\" 2015. [Online]. Available: https:\/\/moocmoocher.wordpress.com\/2013\/02\/13\/synthesising-mooc-completion-rates\/. [Accessed: 23-Aug-2015]."},{"key":"key-10.1145\/2883851.2883928-20","doi-asserted-by":"crossref","unstructured":"B. Schreurs, C. Teplovs, R. Ferguson, M. de Laat, and S. Buckingham Shum, \"Visualizing Social Learning Ties by Type and Topic: Rationale and Concept Demonstrator,\" inProceedings of the Third International Conference on Learning Analytics and Knowledge, New York, NY, USA, 2013, pp. 33--37.","DOI":"10.1145\/2460296.2460305"},{"key":"key-10.1145\/2883851.2883928-21","unstructured":"O. Skrypnyk, S. Joksimovi&#263;, V. Kovanovi&#263;, D. Ga&#353;evi&#263;, and S. Dawson, \"Roles of course facilitators, learners, and technology in the flow of information of a cMOOC,\"Int. Rev. Res. Online Distance Learn., vol. (in press), 2015."},{"key":"key-10.1145\/2883851.2883928-22","doi-asserted-by":"crossref","unstructured":"D. Krackhardt, \"Super Strong and Sticky,\"Power Influ. Organ., p. 21, 1998.","DOI":"10.4135\/9781483345291.n2"},{"key":"key-10.1145\/2883851.2883928-23","doi-asserted-by":"crossref","unstructured":"M. Morris, M. S. Handcock, and D. R. Hunter, \"Specification of Exponential-Family Random Graph Models: Terms and Computational Aspects,\"J. Stat. Softw., vol. 24, no. 4, 2008.","DOI":"10.18637\/jss.v024.i04"},{"key":"key-10.1145\/2883851.2883928-24","doi-asserted-by":"crossref","unstructured":"J. Scott,Social Network Analysis. SAGE Publications, 2012.","DOI":"10.1007\/978-1-4614-1800-9_178"},{"key":"key-10.1145\/2883851.2883928-25","doi-asserted-by":"crossref","unstructured":"T. C. Russo and J. Koesten, \"Prestige, centrality, and learning: A social network analysis of an online class,\"Commun. Educ., vol. 54, no. 3, pp. 254--261, 2005.","DOI":"10.1080\/03634520500356394"},{"key":"key-10.1145\/2883851.2883928-26","doi-asserted-by":"crossref","unstructured":"H. Cho, G. Gay, B. Davidson, and A. Ingraffea, \"Social networks, communication styles, and learning performance in a CSCL community,\"Comput. Educ., vol. 49, no. 2, pp. 309--329, Sep. 2007.","DOI":"10.1016\/j.compedu.2005.07.003"},{"key":"key-10.1145\/2883851.2883928-27","unstructured":"D. Ga&#353;evi&#263;, A. Zouaq, and R. Janzen, \"'Choose Your Classmates, Your GPA Is at Stake!': The Association of Cross-Class Social Ties and Academic Performance,\"Am. Behav. Sci., 2013."},{"key":"key-10.1145\/2883851.2883928-28","unstructured":"G. Simmel,The Sociology of Georg Simmel. Simon and Schuster, 1950, 1950."},{"key":"key-10.1145\/2883851.2883928-29","doi-asserted-by":"crossref","unstructured":"D. J. Brass, \"Being in the right place: A structural analysis of individual influence in an organization,\"Adm. Sci. Q., pp. 518--539, 1984.","DOI":"10.2307\/2392937"},{"key":"key-10.1145\/2883851.2883928-30","doi-asserted-by":"crossref","unstructured":"R. S. Burt, \"Structural Holes and Good Ideas,\"Am. J. Sociol., vol. 110, no. 2, pp. 349--399, 2004.","DOI":"10.1086\/421787"},{"key":"key-10.1145\/2883851.2883928-31","doi-asserted-by":"crossref","unstructured":"D. Krackhardt and M. Handcock, \"Heider vs Simmel: Emergent Features in Dynamic Structures,\" inStatistical Network Analysis: Models, Issues, and New Directions, vol. 4503, E. Airoldi, D. Blei, S. Fienberg, A. Goldenberg, E. Xing, and A. Zheng, Eds. Springer Berlin Heidelberg, 2007, pp. 14--27.","DOI":"10.1007\/978-3-540-73133-7_2"},{"key":"key-10.1145\/2883851.2883928-32","unstructured":"D. Krackhardt, \"The strength of strong ties: The importance of philos in organizations,\"Netw. Organ. Struct. Form Action, vol. 216, p. 239, 1992."},{"key":"key-10.1145\/2883851.2883928-33","doi-asserted-by":"crossref","unstructured":"F. Heider,The Psychology of Interpersonal Relations. Taylor &#38; Francis, 1958.","DOI":"10.1037\/10628-000"},{"key":"key-10.1145\/2883851.2883928-34","doi-asserted-by":"crossref","unstructured":"P. J. Carrington, J. Scott, and S. Wasserman,Models and methods in social network analysis, vol. 28. Cambridge university press, 2005.","DOI":"10.1017\/CBO9780511811395"},{"key":"key-10.1145\/2883851.2883928-35","unstructured":"W. Simpson and others, \"The quadratic assignment procedure (QAP),\" inNorth American Stata Users' Group Meetings 2001, 2001."},{"key":"key-10.1145\/2883851.2883928-36","unstructured":"C. DuBois, C. Butts, and P. Smyth, \"Stochastic blockmodeling of relational event dynamics,\" inProceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics, 2013, pp. 238--246."},{"key":"key-10.1145\/2883851.2883928-37","doi-asserted-by":"crossref","unstructured":"T. A. Snijders, \"Models for longitudinal network data,\"Models Methods Soc. Netw. Anal., vol. 1, pp. 215--247, 2005.","DOI":"10.1017\/CBO9780511811395.011"},{"key":"key-10.1145\/2883851.2883928-38","doi-asserted-by":"crossref","unstructured":"G. Robins, P. Pattison, Y. Kalish, and D. Lusher, \"An introduction to exponential random graph (p*) models for social networks,\"Soc. Netw., vol. 29, no. 2, pp. 173--191, 2007.","DOI":"10.1016\/j.socnet.2006.08.002"},{"key":"key-10.1145\/2883851.2883928-39","doi-asserted-by":"crossref","unstructured":"O. Frank and D. Strauss, \"Markov graphs,\"J. Am. Stat. Assoc., vol. 81, no. 395, pp. 832--842, 1986.","DOI":"10.1080\/01621459.1986.10478342"},{"key":"key-10.1145\/2883851.2883928-40","doi-asserted-by":"crossref","unstructured":"S. Wasserman and P. Pattison, \"Logit models and logistic regressions for social networks: I. An introduction to Markov graphs andp,\"Psychometrika, vol. 61, no. 3, pp. 401--425, 1996.","DOI":"10.1007\/BF02294547"},{"key":"key-10.1145\/2883851.2883928-41","doi-asserted-by":"crossref","unstructured":"P. Wang, G. Robins, P. Pattison, and E. Lazega, \"Exponential random graph models for multilevel networks,\"Soc. Netw., vol. 35, no. 1, pp. 96--115, 2013.","DOI":"10.1016\/j.socnet.2013.01.004"},{"key":"key-10.1145\/2883851.2883928-42","unstructured":"G. Edwards, \"Mixed-method approaches to social network analysis,\"Natl. Cent. Res. Methods, p. 30, 2010."},{"key":"key-10.1145\/2883851.2883928-43","doi-asserted-by":"crossref","unstructured":"S. L. Simpson, S. Hayasaka, and P. J. Laurienti, \"Exponential Random Graph Modeling for Complex Brain Networks,\"PLoS ONE, vol. 6, no. 5, p. e20039, 2011.","DOI":"10.1371\/journal.pone.0020039"},{"key":"key-10.1145\/2883851.2883928-44","doi-asserted-by":"crossref","unstructured":"M. de Laat, V. Lally, L. Lipponen, and R.-J. Simons, \"Investigating patterns of interaction in networked learning and computer-supported collaborative learning: A role for Social Network Analysis,\"Int. J. Comput.-Support. Collab. Learn., vol. 2, no. 1, pp. 87--103, 2007.","DOI":"10.1007\/s11412-007-9006-4"},{"key":"key-10.1145\/2883851.2883928-45","doi-asserted-by":"crossref","unstructured":"B. Nick, C.-K. Lee, P. Cunningham, and U. Brandes, \"Simmelian backbones: amplifying hidden homophily in facebook networks,\" inAdvances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE\/ACM International Conference on, 2013, pp. 525--532.","DOI":"10.1145\/2492517.2492569"},{"key":"key-10.1145\/2883851.2883928-46","unstructured":"M. E. Newman, \"Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality,\"Phys. Rev. E, vol. 64, no. 1, p. 016132, 2001."},{"key":"key-10.1145\/2883851.2883928-47","doi-asserted-by":"crossref","unstructured":"D. R. Hunter, M. S. Handcock, C. T. Butts, S. M. Goodreau, Morris, and Martina, \"ergm: A Package to Fit, Simulate and Diagnose Exponential-Family Models for Networks,\"J. Stat. Softw., vol. 24, no. 3, pp. 1--29, 2008.","DOI":"10.18637\/jss.v024.i03"},{"key":"key-10.1145\/2883851.2883928-48","doi-asserted-by":"crossref","unstructured":"J. S. Cramer, \"The standard multinomial logit model,\" inLogit Models from Economics and Other Fields, Cambridge University Press, 2003, pp. 104--125.","DOI":"10.1017\/CBO9780511615412.008"},{"key":"key-10.1145\/2883851.2883928-49","unstructured":"Y. Croissant,mlogit: multinomial logit model. 2013."},{"key":"key-10.1145\/2883851.2883928-50","doi-asserted-by":"crossref","unstructured":"D. Lusher, J. Koskinen, and G. Robins,Exponential Random Graph Models for Social Networks: Theory, Methods, and Applications. Cambridge University Press, 2012.","DOI":"10.1017\/CBO9780511894701"},{"key":"key-10.1145\/2883851.2883928-51","doi-asserted-by":"crossref","unstructured":"S. Hanneke, W. Fu, and E. P. Xing, \"Discrete temporal models of social networks,\"Electron. J. Stat., vol. 4, pp. 585--605, 2010.","DOI":"10.1214\/09-EJS548"},{"key":"key-10.1145\/2883851.2883928-52","doi-asserted-by":"crossref","unstructured":"S. Joksimovi&#263;, N. Dowell, O. Skrypnyk, V. Kovanovi&#263;, D. Ga&#353;evi&#263;, S. Dawson, and A. C. Graesser, \"How do you connect? Analysis of Social Capital Accumulation in connectivist MOOCs,\" presented at the The 5th International Learning Analytics and Knowledge (LAK) Conference (Accepted), 2015.","DOI":"10.1145\/2723576.2723604"},{"key":"key-10.1145\/2883851.2883928-53","unstructured":"G. Siemens, \"Connectivism: A learning theory for the digital age,\"Int. J. Instr. Technol. Distance Learn., vol. 2, no. 1, pp. 3--10, 2005."}],"event":{"name":"the Sixth International Conference","location":"Edinburgh, United Kingdom","acronym":"LAK '16","number":"6","start":{"date-parts":[[2016,4,25]]},"end":{"date-parts":[[2016,4,29]]}},"container-title":["Proceedings of the Sixth International Conference on Learning Analytics &amp; Knowledge - LAK '16"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2883851.2883928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2883928&amp;ftid=1708765&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:07Z","timestamp":1750222447000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2883851.2883928"}},"subtitle":["importance of centrality in different network configurations"],"proceedings-subject":"Learning Analytics & Knowledge","short-title":[],"issued":{"date-parts":[[2016]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1145\/2883851.2883928","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}