{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:22:29Z","timestamp":1776100949004,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1145\/3491140.3528271","type":"proceedings-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T22:17:55Z","timestamp":1654035475000},"page":"48-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Scenario-based Exploration of Expected Usefulness, Privacy Concerns, and Adoption Likelihood of Learning Analytics"],"prefix":"10.1145","author":[{"given":"Xiaotian Vivian","family":"Li","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Mary Beth","family":"Rosson","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Jenay","family":"Robert","sequence":"additional","affiliation":[{"name":"EDUCAUSE, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375462.3375476"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027392"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/13562517.2019.1698540"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/874070.876055"},{"key":"e_1_3_2_2_5_1","volume-title":"Introduction: The scenario perspective on system development. Scenario-Based Design: Envisioning Work and Technology in System Development","author":"Carroll John M","year":"1995","unstructured":"John M Carroll. 1995. Introduction: The scenario perspective on system development. Scenario-Based Design: Envisioning Work and Technology in System Development, Ed Caroll, JM (1995), 1--17."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3303772.3303798"},{"key":"e_1_3_2_2_7_1","volume-title":"SNAPP: Realising the affordances of real-time SNA within networked learning environments. Networked Learning.","author":"Dawson Shane","year":"2010","unstructured":"Shane Dawson, Aneesha Bakharia, Elizabeth Heathcote, et al. 2010. SNAPP: Realising the affordances of real-time SNA within networked learning environments. Networked Learning."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027441"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.18608\/jla.2019.62.2"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170358.3170372"},{"key":"e_1_3_2_2_11_1","first-page":"58","article-title":"Design and implementation of a learning analytics toolkit for teachers","volume":"15","author":"Dyckhoff Anna Lea","year":"2012","unstructured":"Anna Lea Dyckhoff, Dennis Zielke, Mareike B\u00fcltmann, Mohamed Amine Chatti, and Ulrik Schroeder. 2012. Design and implementation of a learning analytics toolkit for teachers. J. Educ. Technol. Soc. 15, 3 (2012), 58--76.","journal-title":"J. Educ. Technol. Soc."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027434"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375462.3375478"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.18608\/jla.2019.63.8"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027436"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2212860"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027397"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12933"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2020.100726"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10758-017-9329-9"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-016-9477-y"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448139.3448143"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12528-019-09210-5"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2020.100788"},{"key":"e_1_3_2_2_25_1","unstructured":"LAK. 2021. What is learning analytics? https:\/\/www.solaresearch.org\/about\/ what-is-learning-analytics\/"},{"key":"e_1_3_2_2_26_1","first-page":"62","article-title":"Understanding situational online information disclosure as a privacy calculus","volume":"51","author":"Li Han","year":"2010","unstructured":"Han Li, Rathindra Sarathy, and Heng Xu. 2010. Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems 51, 1 (2010), 62--71.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448139.3448172"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.21125\/edulearn.2021.2488"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027401"},{"key":"e_1_3_2_2_30_1","volume-title":"Analyzing the Efficacy of ECoach in Supporting Gateway Course Success Through Tailored Support. In LAK21: 11th International Learning Analytics and Knowledge Conference. 216--225","author":"Matz Rebecca","year":"2021","unstructured":"Rebecca Matz, Kyle Schulz, Elizabeth Hanley, Holly Derry, Benjamin Hayward, Benjamin Koester, Caitlin Hayward, and Timothy McKay. 2021. Analyzing the Efficacy of ECoach in Supporting Gateway Course Success Through Tailored Support. In LAK21: 11th International Learning Analytics and Knowledge Conference. 216--225."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Michael Molenda. 2015. In search of the elusive ADDIE model. Performance improvement 54 2 (2015) 40--42.","DOI":"10.1002\/pfi.21461"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.14742\/ajet.4314"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292147.3292168"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723576.2723585"},{"key":"e_1_3_2_2_35_1","unstructured":"Yu Pu and Jens Grossklags. 2015. Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios. (2015)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Mary Beth Rosson and John M Carroll. 2002. Usability engineering: scenario-based development of human-computer interaction. Morgan Kaufmann.","DOI":"10.1016\/B978-155860712-5\/50002-3"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.512"},{"key":"e_1_3_2_2_38_1","volume-title":"Student privacy in learning analytics: An information ethics perspective. The information society 32, 2","author":"Rubel Alan","year":"2016","unstructured":"Alan Rubel and Kyle ML Jones. 2016. Student privacy in learning analytics: An information ethics perspective. The information society 32, 2 (2016), 143--159."},{"key":"e_1_3_2_2_39_1","volume-title":"Features students really expect from learning analytics. Computers in human behavior 78","author":"Schumacher Clara","year":"2018","unstructured":"Clara Schumacher and Dirk Ifenthaler. 2018. Features students really expect from learning analytics. Computers in human behavior 78 (2018), 397--407."},{"key":"e_1_3_2_2_40_1","volume-title":"EDEN Conference Proceedings. 291--300","author":"Slade Sharon","year":"2014","unstructured":"Sharon Slade and Paul Prinsloo. 2014. Student perspectives on the use of their data: Between intrusion, surveillance and care. In EDEN Conference Proceedings. 291--300."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3303772.3303796"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2729094.2742613"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027400"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170358.3170367"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375462.3375536"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-018-09639-y"},{"key":"e_1_3_2_2_47_1","volume-title":"Measuring teacher sense making strategies of learning analytics: A case study. Learning: research and practice 3, 1","author":"van Leeuwen Anouschka","year":"2017","unstructured":"Anouschka van Leeuwen, Margot van Wermeskerken, Gijsbert Erkens, and Nikol Rummel. 2017. Measuring teacher sense making strategies of learning analytics: A case study. Learning: research and practice 3, 1 (2017), 42--58."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375462.3375504"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375462.3375467"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12366"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.18608\/jla.2019.62.4"},{"key":"e_1_3_2_2_52_1","volume-title":"John M Carroll, and Mary Beth Rosson.","author":"Xu Heng","year":"2011","unstructured":"Heng Xu, Xin Robert Luo, John M Carroll, and Mary Beth Rosson. 2011. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems 51, 1 (2011), 42--52."}],"event":{"name":"L@S '22: Ninth (2022) ACM Conference on Learning @ Scale","location":"New York City NY USA","acronym":"L@S '22"},"container-title":["Proceedings of the Ninth ACM Conference on Learning @ Scale"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491140.3528271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491140.3528271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:55Z","timestamp":1750188655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491140.3528271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":52,"alternative-id":["10.1145\/3491140.3528271","10.1145\/3491140"],"URL":"https:\/\/doi.org\/10.1145\/3491140.3528271","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]},"assertion":[{"value":"2022-06-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}