<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Making Sense of Learning Analytics with a Configurational Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ilias O. Pappas</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michail N. Giannakos</string-name>
          <email>michailg@idi.ntnu.no</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Demetrios G. Sampson</string-name>
          <email>demetrios.sampson@curt</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Curtin University Perth</institution>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Norwegian University of Science and Technology (NTNU)</institution>
          ,
          <addr-line>Trondheim</addr-line>
          ,
          <country country="NO">Norway</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper is an attempt to provide the basic guidelines on how to implement configurational analysis in the context of learning analytics. In detail, we offer a step by step approach on the fuzzy set qualitative comparative analysis (fsQCA). Learning analytics gain increased popularity, however studies use traditional symmetric statistical methods to analyze them. Building on the theory of complexity and configuration theory we suggest on using fsQCA in order to gain a deeper understanding of the data, which may lead to understanding different learning phenomena as well as to the creation of new theories. We further describe the steps on how to perform a contrarian case analysis, which will help in identifying asymmetric relations among the data. Finally, testing for predictive validity with fsQCA is explained. Many of the steps described here may be implemented in various contexts, however we tried to provide examples and instructions for learning analytics oriented research.</p>
      </abstract>
      <kwd-group>
        <kwd>learning analytics</kwd>
        <kwd>fuzzy-set qualitative comparative analysis</kwd>
        <kwd>fsQCA</kwd>
        <kwd>complexity theory</kwd>
        <kwd>configuration theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Studies in the area of learning analytics have been grounded mainly on symmetric
tests and regression based models (RBM), such as multiple regression analysis (MRA)
and structural equation modelling (SEM). Symmetric tests assume that a change on the
predictor variable will result in the same change on the outcome variable. These
methods estimate the significance of the effects between two variables in a model or compare
the effects among the variables between two or more models [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ]. Further, regression
based models build on variance theories, which suggest that a predictor variable needs
to be both necessary and sufficient condition in order to achieve the desired outcome
[
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. However, focusing on symmetric and net effects may be misleading, usually
because the observed net effects do not apply to all of the cases in a dataset [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and
most relationships in real life are not symmetrical [
        <xref ref-type="bibr" rid="ref1 ref7">1, 7</xref>
        ].
      </p>
      <p>
        Qualitative comparative analysis (QCA) has recently been applied in social sciences
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], including education and learning [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9-11</xref>
        ]. QCA has three main variations, that is
crisp set QCA (csQCA), multi-value QCA (mvQCA), and fuzzy set QCA (fsQCA)
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Although fsQCA is able to address various limitations of the other QCA variations
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], recent studies in the context of learning have not chosen to employ it [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
However, fsQCA and configurational analysis have been applied primarily in the last decade
in organizational research, and lately in the area of IS and business management in
order to examine user behavior [
        <xref ref-type="bibr" rid="ref1 ref5 ref6 ref7">1, 5-7</xref>
        ]. It is thus evident that configurational analysis
may offer valuable insights in the context of learning analytics. Nonetheless, there is
still little work on this area and many researchers are still unfamiliar with this method.
      </p>
      <p>This study aims to increase awareness and offer a step by step approach of fsQCA
in the context of learning analytics. fsQCA identifies patterns between independent and
dependent variables, which leads to outcomes and goes a step further from analyses of
variance, correlations and multiple regression models. Similarly, it is important to
extend the present application of QCA on learning analytics by employing fsQCA in this
area.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Benefits and limitations of configurational analysis</title>
      <p>
        As we have already mentioned, the majority of the studies in learning analytics (and
even in the wider area of educational technology) research apply regression based
methods (e.g., least squares, linear regression) in order to examine and predict learner
behavior and the learning outcome (e.g., [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]). A variable that affects the outcome in
only a small subset of cases cannot be identified by regression analysis. In the area of
learning analytics, where you always have different subsets (e.g., different learning
styles, competences, demographics) researchers’ capacity to investigate different
subsets of learners if of great importance. Thus, applying configurational analysis may
complement and extend the findings from RBMs. The benefits of configurational
analysis and fsQCA mainly occur from the limitations of RBMs [
        <xref ref-type="bibr" rid="ref1 ref3 ref4 ref5 ref6">1, 3-6</xref>
        ]. In detail, RBMs
take a net effect approach in examining the effects among the factors of interest and the
variables are examined in a competing environment. The covariance among the
variables in a model indicates that the presence or absence of a certain variable will influence
their effect on each other as well as on the expected outcome, adding to the importance
of applying configurational analysis, which is based on this notion [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        Configurational analysis focuses on the asymmetric relations that exist among the
examined variables and the outcome of interest, while at the same time the outcome of
interest may be achieved with various ways. For instance, students’ activity (e.g.,
materials views) and background knowledge (e.g., results from previous tests) can predict
the future learning outcome or dropouts only if they are examined in combination. It
is not possible to predict the learning outcome based only on students' activity or
background knowledge. Finally, configurational analysis may be more robust than RBMs
mainly as it is not sensitive to outliers. Employing fsQCA to analyze the data, the
sample is divided into multiple subsets, thus creating multiple combinations of
configurations. In effect, the outliers will not have influence all solutions (i.e., configurations)
but only on specific ones. To this end, every configuration represents only a subset of
the sample, hence the representativeness of the sample is not able to affect all the
configurations [
        <xref ref-type="bibr" rid="ref16 ref5">5, 16</xref>
        ]
      </p>
      <p>
        Nonetheless, configurational analysis has certain limitations, which should be taken
into account when implementing fsQCA [
        <xref ref-type="bibr" rid="ref1 ref2 ref5 ref6">1, 2, 5, 6</xref>
        ]. In detail, in order to apply fsQCA
the researcher is required to have substantial knowledge on the conditions and the
outcome of interest, which will be used to calibrate (i.e., transform variables into fuzzy
sets) the data, to simplify the solutions, as well as to interpret the results. This necessary
knowledge however may lead to a subjective bias on the results. Also, it is not able to
identify the unique contribution of every variable on every solution, but this is not the
case because the goal of fsQCA is to identify complex solutions and combinations of
the independent variables. Finally, fsQCA does not account for the validity and
reliability of the latent variables, as it was designed to be used with single-item variables.
To address this issue, before applying fsQCA the measurement model is tested for its
reliability and validity applying the traditional SEM techniques [
        <xref ref-type="bibr" rid="ref1 ref5">1, 5</xref>
        ]. Once reliability
and validity have been established, configurational analysis may be employed by
transforming the variables into fuzzy sets.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Conceptual model and formulation of propositions</title>
      <p>
        In order to conceptualize all the possible relationships among the examined factors
(i.e., independent variables) and the outcome of interest (i.e., dependent variable), the
researchers may use a Venn diagram [
        <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
        ]. Since, multiple relationships exist among
variables, depending on how they combine with each other they may predict high level
of learning outcomes. Figure 1 presents an example of a Venn diagram illustrating the
conceptual model.
When performing a configurational analysis the researchers need to present the
propositions based on which they will proceed to implement fsQCA. Typically, studies that
employ regression based models make hypotheses in order to examine the relations
among the variables of interest. However, in the case of configurational analysis, the
formulation of propositions is more appropriate. On the one hand, a proposition is
defined as a logically and theoretically valid statement, which explains relations among
constructs/parameters/concepts. On the other hand, a hypothesis is a logical statement,
based one or more propositions, and is to be tested for validity [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Building on the
assumptions of configuration theory and the theory of complexity the researchers may
create propositions that can be later verified through fsQCA. Configurational analysis
is theory driven and is up to the researchers to present the research questions, formulate
propositions and interpret the findings based on their knowledge.
      </p>
      <p>
        Complexity theory and configuration theory incorporate the principle of
equifinality, based on which the outcome of interest can be explained equally by alternative sets
of causal conditions that combine in sufficient configurations for the outcome [
        <xref ref-type="bibr" rid="ref16 ref6">6, 16</xref>
        ].
For example, including different learning analytics (log files from learners’ activity,
demographics, knowledge, attitudes) in our investigation it is possible to identify
different combinations of learning analytics that will explain the same outcome (e.g.,
dropouts, students’ learning). A proposition example in the area of learning technology,
consistent with figure 1, can be as follows: “No single best configuration of learning
analytics from students’ activities and demographics leads to high learning outcomes”.
Thus, researchers do not look for a single solution. Further, configuration theory
proposes the occurrence of causal asymmetry. Causal asymmetry means that for an
outcome to occur, the presence and absence of a causal condition depend on how this
condition combines with one or more others [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. For instance, in order to have high learning
outcome or low dropouts, the presence and absence of various learning analytics
depend on how these learning analytics combine together. Similarly, building on the
principle of causal asymmetry a proposition example can be the following “Single causal
conditions may be present or absent within configurations for high learning outcomes,
depending on how they combine with other causal conditions”.
4.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Methodology (Concepts and analysis)</title>
      <p>
        This paper provides basic steps on how to employ fuzzy set qualitative
comparative analysis, using fs/QCA 2.5 [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. fsQCA was developed by integrating fuzzy set
and fuzzy logic with QCA [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. fsQCA offers two types of configurations: necessary
and sufficient. Such configurations may be marked by their presence, their absence, or
a “do not care” condition. The necessary and the sufficient conditions create a
distinction among core and peripheral elements. Core elements are those with strong causal
relationships with the outcome, and peripheral elements are those with weaker ties [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <sec id="sec-4-1">
        <title>4.1. Data Collections</title>
        <p>In order to support the propositions made in the previous chapter the researcher need
to gather the appropriate data. The data that are typically used in the regression based
methodologies can be also used to perform configurational analysis with fsQCA.
Further, the data may be based on either single- or multi-item constructs. The constructs
may be both categorical (e.g., gender) or continuous. Regarding their values there is no
specific limitation for fsQCA, since all values need to be transformed into fuzzy sets
(see section Data calibration). Data gathering may be performed through the classical
tools, such as surveys, interviews, observations. Big data from various sectors (e.g.,
learning analytics) may be used as well to perform configurational analysis.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Reliability and validity</title>
        <p>
          As we have already mentioned, fsQCA does not address the reliability and validity
of measures. In order to overcome this issue, we suggest on applying the traditional
techniques applied on RBMs and SEM before proceeding to the implementation of
configurational analysis with fsQCA [
          <xref ref-type="bibr" rid="ref1 ref5">1, 5</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Contrarian case analysis</title>
        <p>
          When examining main relations between two variables, stating that a variable
positively or negatively affects the other, indicates that most cases in the sample verify this
relationship. However, the opposite relationship will occur for some of the cases in the
same sample; hence, researchers should test their data for such contrarian cases [
          <xref ref-type="bibr" rid="ref1 ref6">1, 6</xref>
          ].
Two variables may have positive, negative and no effect in the same dataset, regardless
of the significance of main effect of one on the other, thus, studies should employ
contrarian case analysis to identify such opposite relations [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          First, the sample should be divided in order to investigate the relations among the
examined variables. Due to the fact that splitting methods, such as median split, may
reduce statistical power and lead to false results when the variables are correlated [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ],
a different approach should be taken when splitting continuous variables. This can be
avoided by creating quintiles (i.e., dividing the sample into five equal groups) by
ranking the cases using the SPSS Rank Cases corresponding function with the Ntiles option.
Next, a cross-tabulation across the quintiles should be performed, using the SPSS
Crosstabs function, between every independent variable and the dependent variable.
This will create a 5x5 table for every set of variables, that represents all combinations
between the two variables for the whole sample. Thus, it is made clear the existence of
the cases that present an opposite relation to the main effects with the outcome variable,
supporting the importance of configurational analysis for explaining these relationships
[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. An example on how to clearly present the contrarian case analysis is offered by
Pappas et al. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Data calibration</title>
        <p>
          After gathering the data, the first step in fsQCA is to define the outcome and the
independent variables. Next, all variables need to be transformed into fuzzy sets with
values ranging from 0 to 1 [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. This procedure is called data calibration and its steps
may vary depending both on the data as well as on the researchers’ knowledge of the
relevant theory and context [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Various studies describe this process [
          <xref ref-type="bibr" rid="ref5 ref7">5, 7, 21, 22</xref>
          ].
Data calibration may be either direct or indirect. In the direct method, the researcher
chooses three qualitative breakpoints, whereas in the indirect method, the
measurements require rescaling based on qualitative assessments. The researcher may choose
either method depending on the data and the underlying theory [
          <xref ref-type="bibr" rid="ref5 ref7">5, 7</xref>
          ]. The direct method
of setting three values that correspond to full-set membership, full-set non-membership
and intermediate-set membership is recommended, unless there is substantive reason
to choose otherwise. For the present tutorial we choose to describe the direct method of
data calibration as performed by Pappas et al. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>
          The value of 1 stands for full-set membership and that of 0 stands for non-set
membership. Thus, all variables are continuous from 0 to 1, which defines the level of their
membership. Variables are transformed into calibrated sets with the fsQCA software
(using the “Calibrate” function) by setting the three thresholds. These represent a full
set membership threshold value (fuzzy score = 0.95), a full non-membership value
(fuzzy score = 0.05), and the crossover point (fuzzy score = 0.50) [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. The three
thresholds depend on the values of the variable in question (i.e., the variable to be calibrated).
When the researcher has limited knowledge of the variable (e.g., big data coming from
learners’ activity), a direct calibration method may be performed by choosing as
thresholds the variables 1, 0, and 0.5, with the rest of the values being calibrated based on a
liner function [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. For example, on a five point Likert scale the thresholds may 1,5 and
3 respectively. Following the procedure employed by [22], for a seven point Likert
scale, the thresholds may be set as 6,2, and 4 respectively as described on Pappas et al.
[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. In the case of LAs a straightforward direct calibration method would be to set the
thresholds at the minimum, median and maximum values. Nonetheless it is always up
to the researcher to choose the thresholds based on prior knowledge and theory [
          <xref ref-type="bibr" rid="ref1 ref5 ref6 ref7">1, 5-7,
23</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Obtaining the configurations</title>
        <p>Following the calibration, the researcher is ready to run the fsQCA algorithm on
the menu “Analyze” and choose “Fuzzy Truth Table Algorithm”. At this point the
researcher chooses the outcome of interest (i.e., dependent variable) and all the causal
conditions (i.e., independent variables). Regarding the outcome, the researcher may
choose to examine the presence of the outcome, and choose “Set”, or the absence of
the outcome “Set Negated”.</p>
        <p>Next, the fsQCA algorithm produces a truth table of 2k rows, with k representing
the number of outcome predictors and each row representing each possible
combination. For example, a truth table between two variables (i.e., conditions) would provide
four possible logical combinations between them. For every combination, the minimum
membership value is calculated; that is, the degree to which every case supports the
specific combination. fsQCA uses the threshold of 0.5 to identify the combinations that
are acceptably supported by the cases. Thus, all combinations that are not supported by
at least one case with membership over the threshold of 0.5 are automatically removed
from further analysis.</p>
        <p>
          The final step is to sort the truth table based on frequency and consistency (Ragin
2008). Frequency describes the number of observations for each possible combination.
Consistency refers to “the degree to which cases correspond to the set-theoretic
relationships expressed in a solution” [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. A frequency cut-off point needs to be set in
order to ensure that a minimum number of empirical observations is obtained for the
assessment of subset relationships. For small and medium-sized samples, a cut-off point
of 1 is appropriate, but for large-scale samples (e.g., 150 or more cases), the cut-off
point should be set higher [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], and maybe set at 3. The lowest acceptable consistency
should be higher than the recommended threshold of 0.75 [23]. Thus, after removing
the combinations with low frequency using the option on the “Edit” menu, the truth
table should be sorted based on their “raw consistency”. The final step is to insert the
value of 1 or 0 on the column with the outcome variable. Choosing 1 or 0, depends on
the consistency threshold that has been chosen. For example, for a consistency
threshold of 0.75, all combinations with consistency larger than 0.75 should be set at 1 and
the rest at 0. It is up to the researcher to choose how large this threshold will be. Once
this is complete, the researcher may proceed with the option of “Standard Analyses”
        </p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Obtaining the solutions</title>
        <p>
          Following the sorting of the truth table, the researcher is presented with the option
to choose if a single independent variable should be present or absent at all times on the
solutions. Unless otherwise needed, we suggest choosing “Present or Absent” in order
to be obtain with all the possible combinations. Next, fsQCA provides the following
three sets of solutions: complex, parsimonious, intermediate. The complex solution
presents all the possible combinations of conditions when traditional logical operations are
applied. Complex solutions are simplified into parsimonious and intermediate
solutions, which are simpler and up for interpretation. The parsimonious solution is a
simplified version of the complex solution and presents the most important conditions
which cannot be left out from any solution. These are called “core conditions” [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]
and are identified automatically but fsQCA. Finally, the intermediate solution is
obtained when performing counterfactual analysis on the complex and parsimonious
solution [
          <xref ref-type="bibr" rid="ref5 ref7">5, 7</xref>
          ]. In essence, the intermediate solution depends on simplifying assumptions
that are applied by the researcher, which at all times should be consistent with
theoretical and empirical knowledge. The intermediate solution is part of the complex
solutions and includes the parsimonious solution. The conditions that are part of the
intermediate solution and not part of the parsimonious, are called “peripheral conditions”
[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-7">
        <title>4.7. Interpreting the solutions</title>
        <p>
          FsQCA presents the complex and parsimonious solution regardless of any
simplifying assumptions employed by the researcher, while the intermediate solution depends
directly on these assumptions. A combination of the parsimonious and intermediate
solution is recommended as the main point of reference for interpreting the fsQCA
results. In detail, the researchers should create a table that will include both core and
peripheral conditions [
          <xref ref-type="bibr" rid="ref1 ref16">1, 16</xref>
          ]. In order to do this, the researcher should identify the
conditions of the parsimonious solution in the intermediate solution. This will lead to a
combined solution, which will clearly present all core and peripheral conditions, thus
helping the interpretation of the findings. Typically, the presence of a condition is
presented with a black circle (●), the absence with a crossed-out circle (⊗), and the “do
not care” condition with a blank space [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. The distinction between core and peripheral
is made by using large and small circles respectively. The researchers should also
present the overall solution consistency as well as the overall solution coverage. The
overall coverage describes the extent to which the outcome of interest may be explained by
the configurations, and may be compared with the R-square reported on RBMs [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. The
next figure offers an example of how findings from fsQCA should be presented.
        </p>
      </sec>
      <sec id="sec-4-8">
        <title>4.8. Predictive validity</title>
        <p>
          After obtaining the fsQCA findings researchers should test for predictive validity,
which examines how well the model predicts the outcome in additional samples [
          <xref ref-type="bibr" rid="ref1 ref6">1, 6,
24</xref>
          ]. Predictive validity is important because achieving only good model fit does not
necessarily mean that the model offers good predictions. In order to test for predictive
validity, the first step is to divide the sample into two subsamples and ran the same
analysis for both subsamples, as it was described in the previous sections. Thus, the
second step is to run the fsQCA for the first sample, and then the obtained findings
should be tested against the second sample.
        </p>
        <p>After obtaining the findings from the first subsample, the researcher must use the
second sample to proceed with the predictive validity testing. From the findings of the
first subsample, each solution, which contains the various combinations of present and
absent variables, should be modeled as one variable by using “Compute” from the
“Variable” menu. Thus, the fsQCA function “fuzzynot(x)” is used for every variable
that is absent (~) in the solution. This function computes the negation (1-x) of a variable
(fuzzy set). Next, in order to model each solution, the function “fuzzyand(x,..,)” is used,
which takes as input all the variables that are present in each configuration and the new
variables that occurred as the outcome of the “fuzzynot(x)” function. The
“fuzzyand(x,…,)” function returns a minimum of two variables (fuzzy sets).</p>
        <p>Finally, the new variable is plotted against the outcome of interest using the second
subsample, from the fsQCA menu (“Graphs” – “Fuzzy” – “XY Plot”). Consistency
and coverage values are presented here, which they should not contradict the
consistency and coverage of the solution. The next figure offers an example on how to
present the findings from predictive validity.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>
        Learning analytics are rapidly implemented in various educational settings, and the
majority of the published work in the area are based on traditional tools to analyze such
data (e.g., MRA, SEM) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The goal of this paper is to offer a step by step approach
on how to perform fuzzy set qualitative comparative analysis in the context of learning
analytics and try make sense of diverse learning phenomena happening simultaneously.
This approach is of particular interest on heterogeneous learning analytics, coming from
datasets consisted of learners with different learning styles, backgrounds and so on.
fsQCA can help us to better understand and further develop teaching and learning
approaches enhancing learners’ dynamics and personalized needs in a ubiquitous learning
era. The implementation of configurational analysis dependents on the researchers’
previous knowledge of theory and empirical work, thus, it is not possible to offer a highly
detailed analysis in this paper. However, this is not the case here, since our goal is to
introduce fsQCA to researchers working with learning analytics, and provide a
springboard for them. fsQCA has received increased attention lately in various fields (e.g.,
management, business), and despite the great potential there are no learning analytics
studies utilizing this promising technique.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>Our thanks to thank the Norwegian Research Council for its financial support under
the projects FUTURE LEARNING (number: 255129/H20) and SE@VBL (number:
248523/H20).
21. Mendel, J.M., Korjani, M.M.: Charles Ragin’s fuzzy set qualitative comparative analysis (fsQCA) used
for linguistic summarizations. Information Sciences 202, 1-23 (2012)
22. Ordanini, A., Parasuraman, A., Rubera, G.: When the recipe is more important than the ingredients a
Qualitative Comparative Analysis (QCA) of service innovation configurations. Journal of Service
Research 1094670513513337 (2013)
23. Ragin, C.C.: Set relations in social research: Evaluating their consistency and coverage. Political</p>
      <p>Analysis 14, 291-310 (2006)
24. Gigerenzer, G., Brighton, H.: Homo heuristicus: Why biased minds make better inferences. Topics in
Cognitive Science 1, 107-143 (2009)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Pappas</surname>
            ,
            <given-names>I.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kourouthanassis</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giannakos</surname>
            ,
            <given-names>M.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chrissikopoulos</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Explaining online shopping behavior with fsQCA: The role of cognitive and affective perceptions</article-title>
          .
          <source>Journal of Business Research</source>
          <volume>69</volume>
          ,
          <fpage>794</fpage>
          -
          <lpage>803</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Pappas</surname>
            ,
            <given-names>I.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikalef</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giannakos</surname>
            ,
            <given-names>M.N.</given-names>
          </string-name>
          :
          <article-title>Video-Based Learning Adoption: A typology of learners</article-title>
          .
          <source>In: Proceedings of the workshop on Smart Environments and Analytics in Video-Based Learning (SE@VBL)</source>
          ,
          <year>LAK2016</year>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Woodside</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          :
          <article-title>Moving beyond multiple regression analysis to algorithms: Calling for adoption of a paradigm shift from symmetric to asymmetric thinking in data analysis and crafting theory</article-title>
          .
          <source>Journal of Business Research</source>
          <volume>66</volume>
          ,
          <fpage>463</fpage>
          -
          <lpage>472</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>El</given-names>
            <surname>Sawy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.A.</given-names>
            ,
            <surname>Malhotra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Pavlou</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.A.</surname>
          </string-name>
          :
          <article-title>Research Commentary-Seeking the Configurations of Digital Ecodynamics: It Takes Three to Tango</article-title>
          .
          <source>Information Systems Research</source>
          <volume>21</volume>
          ,
          <fpage>835</fpage>
          -
          <lpage>848</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mezei</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kostakos</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Applying configurational analysis to IS behavioural research: a methodological alternative for modelling combinatorial complexities</article-title>
          .
          <source>Information Systems Journal</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Woodside</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          :
          <article-title>Embrace• perform• model: Complexity theory, contrarian case analysis, and multiple realities</article-title>
          .
          <source>Journal of Business Research</source>
          <volume>67</volume>
          ,
          <fpage>2495</fpage>
          -
          <lpage>2503</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Ragin</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          :
          <article-title>Redesigning social inquiry: Fuzzy sets and beyond</article-title>
          . Wiley Online Library (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Schneider</surname>
            ,
            <given-names>C.Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagemann</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Set-theoretic methods for the social sciences: A guide to qualitative comparative analysis</article-title>
          . Cambridge University Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Glaesser</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooper</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Gender, parental education, and ability: their interacting roles in predicting GCSE success</article-title>
          .
          <source>Cambridge Journal of Education</source>
          <volume>42</volume>
          ,
          <fpage>463</fpage>
          -
          <lpage>480</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bakker</surname>
            ,
            <given-names>R.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cambré</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korlaar</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raab</surname>
          </string-name>
          , J.:
          <article-title>Managing the project learning paradox: A set-theoretic approach toward project knowledge transfer</article-title>
          .
          <source>International Journal of Project Management</source>
          <volume>29</volume>
          ,
          <fpage>494</fpage>
          -
          <lpage>503</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Mavroudi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hadzilacos</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalles</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gregoriades</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Teacher-led design of an adaptive learning environment</article-title>
          .
          <source>Interactive Learning Environments 1-15</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Schneider</surname>
            ,
            <given-names>C.Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagemann</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Standards of good practice in qualitative comparative analysis (QCA) and fuzzy-sets</article-title>
          .
          <source>Comparative Sociology</source>
          <volume>9</volume>
          ,
          <fpage>397</fpage>
          -
          <lpage>418</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Baker</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Inventado</surname>
            ,
            <given-names>P.S.</given-names>
          </string-name>
          :
          <article-title>Educational data mining and learning analytics</article-title>
          .
          <source>Learning Analytics</source>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>75</lpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Elbadrawy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Studham</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karypis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Collaborative multi-regression models for predicting students' performance in course activities</article-title>
          .
          <source>In: Proceedings of the Fifth International Conference on Learning Analytics And Knowledge</source>
          , pp.
          <fpage>103</fpage>
          -
          <lpage>107</lpage>
          . ACM, (
          <year>Year</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Fiss</surname>
          </string-name>
          , P.C.
          <article-title>: A set-theoretic approach to organizational configurations</article-title>
          .
          <source>Academy of management review 32</source>
          ,
          <fpage>1180</fpage>
          -
          <lpage>1198</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Fiss</surname>
            ,
            <given-names>P.C.</given-names>
          </string-name>
          :
          <article-title>Building better causal theories: A fuzzy set approach to typologies in organization research</article-title>
          .
          <source>Academy of Management Journal</source>
          <volume>54</volume>
          ,
          <fpage>393</fpage>
          -
          <lpage>420</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Reynolds</surname>
          </string-name>
          , P.D.:
          <article-title>Primer in Theory Construction: An A&amp;B Classics Edition</article-title>
          .
          <source>Routledge</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Ragin</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davey</surname>
          </string-name>
          , S.: fs/QCA [Computer Programme],
          <source>version 2</source>
          .5. Irvine, CA: University of California (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Ragin</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          :
          <article-title>Fuzzy-set social science</article-title>
          . University of Chicago Press (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Fitzsimons</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          :
          <article-title>Death to dichotomizing</article-title>
          .
          <source>Journal of Consumer Research</source>
          <volume>35</volume>
          ,
          <fpage>5</fpage>
          -
          <lpage>8</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>