<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2019.00777</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Taking a Closer Look: An Exploratory Analysis of Successful and Unsuccessful Strategy Use in Complex Problems</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Stadler</surname> <given-names>Matthias</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/524831/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Fischer</surname> <given-names>Frank</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Greiff</surname> <given-names>Samuel</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/175278/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Psychologie und P&#x00E4;dagogik, Ludwig-Maximilians-University Munich</institution>, <addr-line>Munich</addr-line>, <country>Germany</country></aff>
<aff id="aff2"><sup>2</sup><institution>Computer Based Assessment, University of Luxembourg, Luxembourg</institution>, <addr-line>Luxembourg City</addr-line>, <country>Luxembourg</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Qiwei He, Educational Testing Service, United States</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Hok Kan Ling, Columbia University, United States; Ulf Kroehne, German Institute for International Educational Research (LG), Germany</p></fn>
<corresp id="c001">&#x002A;Correspondence: Matthias Stadler, <email>Matthias.Stadler@lmu.de</email></corresp>
<fn fn-type="other" id="fn002"><p>This article was submitted to Educational Psychology, a section of the journal Frontiers in Psychology</p></fn></author-notes>
<pub-date pub-type="epub">
<day>07</day>
<month>05</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="collection">
<year>2019</year>
</pub-date>
<volume>10</volume>
<elocation-id>777</elocation-id>
<history>
<date date-type="received">
<day>14</day>
<month>09</month>
<year>2018</year>
</date>
<date date-type="accepted">
<day>21</day>
<month>03</month>
<year>2019</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2019 Stadler, Fischer and Greiff.</copyright-statement>
<copyright-year>2019</copyright-year>
<copyright-holder>Stadler, Fischer and Greiff</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>Influencing students&#x2019; educational achievements first requires understanding the underlying processes that lead to variation in students&#x2019; performance. Researchers are therefore increasingly interested in analyzing the differences in behavior displayed in educational assessments rather than merely assessing their outcomes. Such analyses provide valuable information on the differences between successful and unsuccessful students and help to design appropriate interventions. Complex problem-solving (CPS) tasks have proven to provide particularly rich process data as they allow for a multitude of behaviors several of which can lead to a successful performance. So far, this data has often been analyzed on a rather aggregated level looking at an average number of actions or predefined strategies with only a few articles investigating the specific actions performed. In this paper, we report the results of an exploratory analysis of CPS log-files that is aimed at distinguishing between students that applied the correct strategy to a problem but failed to solve it and those applying the strategy successfully. In that, the sequence of behavior displayed is reduced to interpretable parts (n-grams) that allow searching for meaningful differences between the two groups of students. This level of analysis allows finding previously undefined or unknown patterns within the data and increases our understanding of the processes underlying successful problem-solving behavior even further.</p>
</abstract>
<kwd-group>
<kwd>log-file</kwd>
<kwd>problem-solving</kwd>
<kwd>n-grams</kwd>
<kwd>process data</kwd>
<kwd>educational assessment</kwd>
</kwd-group>
<contract-sponsor id="cn001">Fonds National de la Recherche Luxembourg<named-content content-type="fundref-id">10.13039/501100001866</named-content></contract-sponsor>
<counts>
<fig-count count="1"/>
<table-count count="5"/>
<equation-count count="1"/>
<ref-count count="46"/>
<page-count count="10"/>
<word-count count="0"/>
</counts>
</article-meta>
</front>
<body>
<sec><title>Introduction</title>
<p>The advent of computers to psychological and educational assessment has made it possible to analyze behavioral processes and sequences of actions through information captured in computer-generated log-files (records of all actions taken while working on a computerized assessment; <xref ref-type="bibr" rid="B4">Bunderson et al., 1989</xref>). Researchers are no longer limited to measuring the final outcome of an assessment (e.g., solved vs. not solved) but can also investigate the steps and actions resulting in the specific outcome through analyzes of test-taking behaviors. In other words, analyzing log-files allows researchers to make inferences about the latent cognitive processes involved in solving tasks from overt behavior (<xref ref-type="bibr" rid="B14">Greiff et al., 2015b</xref>). Log-files may, for example, inform researchers of specific mistakes made while working on a problem that may be indicative of a misunderstanding of the problem at hand (<xref ref-type="bibr" rid="B19">Ifenthaler et al., 2012</xref>). Identifying specific test-taking behaviors that lead to successful and unsuccessful performance has proven to be a treasure chest for the improvement of interventions and teaching enabling the differentiation of instructions and scaffolding and providing students with avenues for learning individually tailored to their needs.</p>
<p>A field that has made much use of log-file analysis in the last years is the field of complex problem-solving (CPS; e.g., <xref ref-type="bibr" rid="B11">Goldhammer et al., 2014</xref>; <xref ref-type="bibr" rid="B12">Greiff et al., 2016</xref>). Analyzing students&#x2019; behavior through log-files, it was shown that the application of the vary-one-thing-at-a-time strategy (VOTAT; <xref ref-type="bibr" rid="B37">Tschirgi, 1980</xref>), also referred to as &#x201C;control of variables strategy&#x201D; (<xref ref-type="bibr" rid="B5">Chen and Klahr, 1999</xref>), could explain a great deal of students&#x2019; performance in solving complex problems (<xref ref-type="bibr" rid="B14">Greiff et al., 2015b</xref>). Others noted, however, that simply identifying those students that applied the VOTAT strategy is not sufficient to fully explain why some students successfully solve a task whereas others do not (<xref ref-type="bibr" rid="B24">Kuhn and Dean, 2005</xref>). There must be other differences in metastrategic behavior that distinguish students that apply the VOTAT strategy and successfully solve a problem and those students that apply the strategy but fail. The aim of this paper is to use data mining techniques to analyze CPS log-files to find differences in behavior that indicate successful and unsuccessful behavior beyond the already established strategies.</p>
</sec>
<sec><title>Log-Files in Complex Problem-Solving Tasks</title>
<p>Traces of behavior have been gathered in psychology studies since the 1930s (<xref ref-type="bibr" rid="B33">Skinner, 1938</xref>). Today, modern computer-based applications of psychological assessment make it very easy to capture a variety of interaction behaviors and save them to log files for later analysis. These interaction data have been referred to virtually synonymously as &#x201C;log-file data&#x201D; (<xref ref-type="bibr" rid="B1">Arroyo and Woolf, 2005</xref>), &#x201C;discrete action protocols&#x201D; (<xref ref-type="bibr" rid="B8">Fu, 2001</xref>), or &#x201C;process data&#x201D; (<xref ref-type="bibr" rid="B45">Zoanetti, 2010</xref>), only listing the most common names. Behavioral log-files are indicators of human behavior as observed by automatic sensors that capture and record actions displayed while interacting with the assessment. They may include behavior as diverse as rich audio and video recordings or low-level keystrokes.</p>
<p>Complex tasks, allowing for multiple behaviors that lead to a correct solution, produce valuable log-files with sufficient variation among participants for a meaningful interpretation. The study of how individuals engage with such complex tasks is therefore synonymous with problem-solving (<xref ref-type="bibr" rid="B40">Vista et al., 2016</xref>). Exploration of the processes employed in problem-solving or in engaging with complex tasks can provide information about the cognitive skills that underlie successful resolution of the problems or tasks (<xref ref-type="bibr" rid="B31">O&#x2019;Neil et al., 2003</xref>; <xref ref-type="bibr" rid="B16">Griffin and Care, 2015</xref>). Indicators of these cognitive skills can be deduced from behaviors, which are captured in the form of attempted or completed processes in problem-solving tasks.</p>
<p>Problem-solving tasks that are particularly rich in log-file data are CPS tasks. Throughout this paper, CPS is understood as &#x201C;(&#x2026;) the successful interaction with task environments that are dynamic (i.e., change as a function of the user&#x2019;s interventions and/or as a function of time) and in which some, if not all, of the environment&#x2019;s regularities, can only be revealed by successful exploration and integration of the information gained in that process&#x201D; (Buchner in <xref ref-type="bibr" rid="B7">Frensch and Funke, 1995</xref>, p. 14). CPS tasks thus differ from static problem-solving tasks in that they require active interaction between the problem solver and the problem resulting in very meaningful log-file data (<xref ref-type="bibr" rid="B13">Greiff et al., 2015a</xref>).</p>
</sec>
<sec><title>Analyzing Log-File Data</title>
<sec><title><italic>A priori</italic> Established Sequences of Behavior</title>
<p>Log-file data can be analyzed in two different ways: Based on <italic>a priori</italic> established sequences of behaviors (top&#x2013;down) or bottom&#x2013;up in an exploratory analysis that searches for patterns within the behavior displayed (<xref ref-type="bibr" rid="B40">Vista et al., 2016</xref>). Regarding CPS, various studies provided valuable findings by searching test-taking behavior for instances of specific, theoretically defined exploration strategies (e.g., <xref ref-type="bibr" rid="B23">Kr&#x00F6;ner et al., 2005</xref>; <xref ref-type="bibr" rid="B43">W&#x00FC;stenberg et al., 2014</xref>). One of the strategies investigated most often in CPS research is the application of the VOTAT; <xref ref-type="bibr" rid="B37">Tschirgi (1980)</xref>, also referred to as &#x201C;control of variables strategy&#x201D; (<xref ref-type="bibr" rid="B5">Chen and Klahr, 1999</xref>). When applying the VOTAT strategy, all variables of a problem are manipulated individually while the remaining variables are held constant to determine the effect of the varied independent variables on the dependent outcomes. VOTAT thus describes the principle of isolated variation of variables, which is the core component of scientific experimentation (<xref ref-type="bibr" rid="B24">Kuhn and Dean, 2005</xref>) and has been the almost exclusive focus of psychologists investigating the development of scientific reasoning (<xref ref-type="bibr" rid="B44">Zimmerman, 2000</xref>).</p>
<p>Empirically, multiple studies (e.g., <xref ref-type="bibr" rid="B23">Kr&#x00F6;ner et al., 2005</xref>; <xref ref-type="bibr" rid="B42">W&#x00FC;stenberg et al., 2012</xref>, <xref ref-type="bibr" rid="B43">2014</xref>) showed that application of VOTAT is strongly related to CPS performance (see also <xref ref-type="bibr" rid="B10">Funke, 2010</xref>). Most prominently, <xref ref-type="bibr" rid="B14">Greiff et al. (2015b)</xref> demonstrated the usefulness of the VOTAT strategy to explain performance differences within a problem-solving task that was part of the 2012 cycle of the Programme for International Student Assessment (PISA), one of the most widely recognized educational large-scale assessments (<xref ref-type="bibr" rid="B38">Turner and Adams, 2007</xref>). Their analysis of the <italic>Climate Control</italic> task showed, that applying the VOTAT strategy was strongly related to overall performance. This relation was observed both on the individual level and on the country level. However, not all students applying the VOTAT strategy solved the task leading researchers to search for other behaviors separating successful and unsuccessful problem-solvers (<xref ref-type="bibr" rid="B24">Kuhn and Dean, 2005</xref>).</p>
<p>As the empirical approach of searching for predefined behavioral patterns cannot explain why some students fail to solve tasks even though they apparently apply the correct strategy, it is necessary to take a closer look and conduct exploratory analyses searching for differences within the behaviors of students that apply the correct strategy and succeed and those that apply the correct strategy but fail, which is what we will attempt in this paper.</p>
</sec>
<sec><title>Exploratory Approaches</title>
<p>Especially if long sequences of behavior need to be analyzed, exploratory approaches provide a helpful description of the underlying patterns. An approach proposed to explorative search for repetitive patterns within long sequences is the n-gram method (<xref ref-type="bibr" rid="B6">Damashek, 1995</xref>). The n-gram method summarizes a long string of entries (e.g., letters in words or separate instances of behaviors) as sequences of n consecutive elements. While this method was originally developed to classify and mine text data (<xref ref-type="bibr" rid="B6">Damashek, 1995</xref>), data scientists quickly noticed that it was also useful to classify behavior (mostly in the domain of web data mining; <xref ref-type="bibr" rid="B29">Mobasher, 2007</xref>). In this paper, we will use the n-gram approach to exploratively search for differences in behavior displayed by students that applied the VOTAT strategy to solve a complex problem and succeeded in solving it and those who applied the VOTAT strategy but failed to solve the problem.</p>
<p>To illustrate the n-gram approach take a problem that only allows for two different behaviors (A and B). A potential string of behaviors for the problem-solving process of a problem solver could look like this:</p>
<p>AABBBABABBBABBBAAABBABBBA</p>
<p><xref ref-type="table" rid="T1">Table 1</xref> illustrates how this sequence could be summarized by n-grams of the lengths <italic>n</italic> = 2 (bigrams), <italic>n</italic> = 3 (trigrams), and <italic>n</italic> = 4 (four-grams), each representing an increasingly more complex but less frequently appearing set of consecutive actions. In that way, the behavior of each problem solver could be described based on a set of sequences, which could then be used to either classify problem-solvers or predict future behavior (<xref ref-type="bibr" rid="B26">Liu and Ke&#x0161;elj, 2007</xref>). Due to this flexibility, n-grams form the basis of many data mining techniques (<xref ref-type="bibr" rid="B3">Borges and Levene, 2000</xref>).</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Example of n-grams of different length with respective frequencies.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="center" colspan="2"><italic>n</italic> = 2</th>
<th valign="top" align="center" colspan="2"><italic>n</italic> = 3</th>
<th valign="top" align="center" colspan="2"><italic>n</italic> = 4</th></tr>
<tr>
<th valign="top" align="left" colspan="6"><hr/></th>
</tr>
<tr>
<th valign="top" align="left">Sequence</th>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">Sequence</th>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">Sequence</th>
<th valign="top" align="center">Frequency</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">AA</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">AAA</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">AAAA</td>
<td valign="top" align="center">0</td></tr>
<tr>
<td valign="top" align="left">AB</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">AAB</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">AAAB</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">BA</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">ABB</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">AABA</td>
<td valign="top" align="center">0</td></tr>
<tr>
<td valign="top" align="left">BB</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">ABA</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">AABB</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BAA</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">ABAA</td>
<td valign="top" align="center">0</td></tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BAB</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">ABAB</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BBA</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">ABBA</td>
<td valign="top" align="center">1</td></tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BBB</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">ABBB</td>
<td valign="top" align="center">4</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BAAA</td>
<td valign="top" align="center">1</td></tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BAAB</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BABA</td>
<td valign="top" align="center">1</td></tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BABB</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BBAA</td>
<td valign="top" align="center">1</td></tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BBAB</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BBBA</td>
<td valign="top" align="center">4</td></tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center">BBBB</td>
<td valign="top" align="center">0</td></tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec><title>This Study</title>
<p>The aim of this study is to use exploratory educational data mining techniques in explaining CPS behavior. We go beyond the already established VOTAT strategy, exploring differences in behavior between students that applied the VOTAT strategy to a complex problem and successfully solved it and those that applied the strategy but failed to solve the complex problem. To analyze students&#x2019; behavior, we chose the n-gram approach (<xref ref-type="bibr" rid="B6">Damashek, 1995</xref>) introduced above to classify students that applied the VOTAT strategy into successful and unsuccessful problem-solvers based on their behavior. Applying the n-gram approach, we summarize the participating students&#x2019; behavior while solving the complex problem into a set of short sequences that can be used to find behaviors that are indicative of whether a student that applied the VOTAT strategy will also solve the complex problem. Next to presenting the empirical example, we will illustrate the methodological steps necessary to apply the n-gram approach to log-file data of CPS behavior.</p>
</sec>
<sec><title>Empirical Example</title>
<sec><title>Sample</title>
<p>For the empirical example, we relied on a large sample (<italic>N</italic> = 1399) of students attending the ninth grade in a Finish municipality. The data were drawn from the Vantaa panel study for the development of learning to learn competencies in basic education. This panel is sampled to be representative for the Finish population based on several demographic and socioeconomic indicators (see <xref ref-type="bibr" rid="B39">Vainikainen, 2014</xref> for more information) and the findings gained are likely to be generalizable to other samples. The mean age of the students at the time of data collection was 15.8 years (<italic>SD</italic> = 0.43). 48% of the students were girls and 50% boys (2% missing information). The data used for this study can be found in an anonymized form on the open science framework repository created for this paper<sup><xref ref-type="fn" rid="fn01">1</xref></sup>. The research design and the scales were approved by the local Education Department. The same scales and design have been used also in national educational evaluations commissioned by the Ministry of Education and Culture, and by the Finnish National Board of Education, based on the Basic Education Act (1999). The measures and design have been approved, in relation with another study, also by the Ethical Committee of the Finnish National Institute for Health and Welfare. Both the students and their parents were asked to provide their informed consent in writing.</p>
</sec>
<sec><title>Task</title>
<p>Over the course of the assessment, students solved multiple CPS tasks based on the MicroDYN approach (<xref ref-type="bibr" rid="B13">Greiff et al., 2015a</xref>). The MicroDYN approach is based on linear structural equations (<xref ref-type="bibr" rid="B9">Funke, 2001</xref>) in which (in this study) three input variables were related to three output variables (see specific example below). The underlying relations were opaque to students at the onset of the task and needed to be determined by applying adequate strategies (i.e., the VOTAT strategy) to acquire knowledge about the problems&#x2019; structure and to apply that knowledge to achieve certain goals.</p>
<p>The example task used for this paper was the item &#x201C;Handball training,&#x201D; which is illustrated in <xref ref-type="fig" rid="F1">Figure 1</xref>. It illustrates problems based on the MicroDYN approach very well and is of sufficient difficulty to allow for variation in both behavior and successful solutions (<xref ref-type="bibr" rid="B34">Stadler et al., 2016</xref>). In this task&#x2019;s scenario, participants take over the role of the coach of a handball team trying to figure out how different types of training (labeled Training A, Training B, and Training C; left part of <xref ref-type="fig" rid="F1">Figure 1</xref>) influence certain attributes of the players (i.e., Motivation, Power of the throw, Exhaustion; right part of <xref ref-type="fig" rid="F1">Figure 1</xref>). The best strategy to solve such tasks based on the MicroDYN approach is to apply the VOTAT strategy; that is, to manipulate each variable individually (e.g., to put Training C on &#x201C;++&#x201D;), while keeping all other input variables constant, and to click on &#x201C;apply&#x201D; (in the center of <xref ref-type="fig" rid="F1">Figure 1</xref>). The resulting changes in the outcome variables indicate the relations between the input and the output variables. After working on the scenario, the resulting knowledge (i.e., the relation between the three training strategies and the three outcomes needed to be plotted in the model underneath the task; see the lower part of <xref ref-type="fig" rid="F1">Figure 1</xref>).</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption><p>Scenario (top) and model (bottom) of the &#x201C;Handball training&#x201D; task.</p></caption>
<graphic xlink:href="fpsyg-10-00777-g001.tif"/>
</fig>
</sec>
<sec><title>Extraction and Scoring of Log-Files</title>
<p>The task was implemented in the CBA item builder, a generic assessment platform, which has been designed to meet these requirements (for an overview see <xref ref-type="bibr" rid="B32">R&#x00F6;lke, 2012</xref>). This tool is provided by the German Institute for International Educational Research (DIPF) that organizes the development of the software and collects and coordinates new requirements. It allows users without programming experience to develop and deploy computer-based assessment tasks using a graphical user interface. After testing, log-files containing the response data can be downloaded in an XML format<sup><xref ref-type="fn" rid="fn02">2</xref></sup> from the test computer or server for further analysis. A detailed description of the embedding and scoring of CPS tasks implemented in the CBA item builder can be found in <xref ref-type="bibr" rid="B15">Greiff et al. (2013)</xref>. An exemplary XML file can be found on the open science framework repository see text footenote<sup>1</sup>.</p>
<p>For this study, we used two different scripts to extract the data from the log-files. To extract students&#x2019; scores, time on task, and the use of VOTAT, we used an SPSS script already used in various previous studies (e.g., <xref ref-type="bibr" rid="B15">Greiff et al., 2013</xref>). To score the application of the VOTAT strategy, log-files of students&#x2019; behavior were analyzed. Full credit was given if participants manipulated each input variable at least once while keeping all other variables constant; otherwise, no credit was assigned (<xref ref-type="bibr" rid="B43">W&#x00FC;stenberg et al., 2014</xref>). For the explorative n-gram analyses the complete string of behaviors was extracted by a customized python script<sup><xref ref-type="fn" rid="fn03">3</xref></sup>, using the built-in xml.etree.ElementTree package.</p>
<p><xref ref-type="table" rid="T2">Table 2</xref> shows some exemplary data from a log file of the &#x201C;Handball training&#x201D; task. Students could make and apply changes to the input variables (i.e., the rounds in the assessment). One round was recorded every time the &#x201C;Apply&#x201D; button was pressed applying changes from none to all of the input variables (i.e., working on the scenario, &#x201C;S&#x201D;) to the output variables. In the example, the participant applied the VOTAT strategy in manipulating each variable individually. The nature of the XML files does, however, not allow discerning the order in which variables were manipulated within each round. Changes in the model were recorded every time a line was drawn or removed between an input and an output variable to plot findings (i.e., working on the model, &#x201C;M&#x201D;). Our python script extracted the string of behavior as a vector of &#x201C;M&#x201D; or &#x201C;S&#x201D; for each participant allowing for an easy interpretation. In the example, the extracted string would be &#x201C;SSS&#x201D; as all three recorded behaviors were changes in the scenario. In addition, we extracted the total number of behaviors (length of the vectors) and the time spent working on the task (without reading the problem description, which was presented separately from the actual problem scenario). Use of the &#x201C;reset&#x201D; and &#x201C;help&#x201D; button was ignored as these do not provide any additional information on the solution process and were used by a marginal number of participants (N<sub>reset</sub> = 53; N<sub>help</sub> = 19). The python script can be found on the open science framework repository see text footnote<sup>1</sup>.</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Example data from a log file of the &#x201C;Handball training&#x201D; task (adapted from <xref ref-type="bibr" rid="B15">Greiff et al., 2013</xref>).</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="center" colspan="2">General information<hr/></th>
<th valign="top" align="center" colspan="3">Input variables<hr/></th>
<th valign="top" align="center" colspan="3">Output variables<hr/></th></tr>
<tr>
<th valign="top" align="left">Timestamp</th>
<th valign="top" align="left">Button pressed</th>
<th valign="top" align="center">Training A</th>
<th valign="top" align="center">Training B</th>
<th valign="top" align="center">Training C</th>
<th valign="top" align="center">Motivation</th>
<th valign="top" align="center">Power</th>
<th valign="top" align="center">Exhaustion</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">15:13:21</td>
<td valign="top" align="left">Apply</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">17</td>
<td valign="top" align="center">15</td>
<td valign="top" align="center">15</td>
</tr>
<tr>
<td valign="top" align="left">15:13:23</td>
<td valign="top" align="left">Apply</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">17</td>
<td valign="top" align="center">17</td>
<td valign="top" align="center">15</td>
</tr>
<tr>
<td valign="top" align="left">15:13:26</td>
<td valign="top" align="left">Apply</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">17</td>
<td valign="top" align="center">19</td>
<td valign="top" align="center">17</td></tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec><title>Statistical Analysis</title>
<p>In order to find behavioral differences between students that applied the VOTAT strategy and successfully solved the complex problem and those students that applied the VOTAT strategy but failed, we first identified the respective students, assigning a dummy coded variable. This variable separated successful and unsuccessful students that applied the VOTAT strategy and assigned missing values to all students that did not apply the VOTAT strategy.</p>
<p>To find the sequences of behaviors that led to success or failure in the problem-solving process, we applied the chi-square feature selection model, which is frequently used in natural language processing or other data mining contexts (<xref ref-type="bibr" rid="B30">Oakes et al., 2001</xref>). Recent publications have demonstrated how to apply this approach to problem-solving data, though (<xref ref-type="bibr" rid="B17">He and von Davier, 2015</xref>, <xref ref-type="bibr" rid="B18">2016</xref>). The chi-square feature selection model tests whether occurrence and non-occurrence of behaviors are independent for two groups. Under the null hypothesis, the behaviors would be equally likely for both groups. Based on the observed distribution of behaviors, a chi-square value can thus be computed to evaluate the departure from this null hypothesis. A problem with this approach is potentially over-interpreting the relevance of extremely common behaviors that have little or no discriminating power while under-estimating the relevance of rather infrequent behaviors. Moreover, the added relevance of a behavior is not linear. More occurrences of a behavior indicate higher importance, but not as much relative importance as an undamped count would suggest (<xref ref-type="bibr" rid="B28">Manning and Sch&#x00FC;tze, 2005</xref>). To solve this problem, a weight is assigned to the observed frequency of each sequence of behaviors based on the number of participants displaying the sequence of behavior, the sequence&#x2019;s total frequency, and the total number of behaviors observed for a more detailed description of the chi-square feature selection model see (<xref ref-type="bibr" rid="B18">He and von Davier, 2016</xref>). The weight function for sequence of behavior <italic>i</italic> in total behavior <italic>j</italic> (1) was defined as:</p>
<disp-formula id="E1"><label>(1)</label><mml:math id="M1"><mml:mrow><mml:mo>weigth</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mrow><mml:mo>{</mml:mo> <mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:mo>[</mml:mo> <mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>log</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mo>f</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow> <mml:mo>]</mml:mo></mml:mrow><mml:mi>log</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mfrac><mml:mi>N</mml:mi><mml:mrow><mml:mi>s</mml:mi><mml:msub><mml:mo>f</mml:mo><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2009;</mml:mo><mml:msub><mml:mo>f</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2265;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mn>0</mml:mn><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2009;</mml:mo><mml:mo>&#x2009;</mml:mo><mml:msub><mml:mo>f</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>N</italic> is the total number of sequences, f is the sequence&#x2019;s frequency and sf is the number of behaviors where the sequence i appears. The first clause applies to sequences occurring in the same behavior, whereas for sequences that do not appear (f<italic><sub>i,j</sub></italic> = 0), we use weight (<italic>i,j</italic>) = 0.</p>
<p>The scripts for all analyses can be found on the open science framework repository see text footnote<sup>1</sup>. <xref ref-type="table" rid="T3">Table 3</xref> provides the raw and weighted frequencies for all sequences of behavior of students applying the VOTAT strategy.</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>The raw and weighted frequency for all sequences of behavior.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Behavior sequence</th>
<th valign="top" align="center">Frequency of sequences</th>
<th valign="top" align="center">Frequency of actions</th>
<th valign="top" align="center">Weight</th>
<th valign="top" align="center" colspan="2">Freq. in correct<hr/></th>
<th valign="top" align="center" colspan="2">Freq. in incorrect<hr/></th>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<th valign="top" align="center">Raw</th>
<th valign="top" align="center">Wgt</th>
<th valign="top" align="center">Raw</th>
<th valign="top" align="center">Wgt</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Bigrams</td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
</tr>
<tr>
<td valign="top" align="left">MM</td>
<td valign="top" align="center">663</td>
<td valign="top" align="center">5063</td>
<td valign="top" align="center">0.01</td>
<td valign="top" align="center">4073</td>
<td valign="top" align="center">37.57</td>
<td valign="top" align="center">990</td>
<td valign="top" align="center">9.13</td></tr>
<tr>
<td valign="top" align="left">MS</td>
<td valign="top" align="center">159</td>
<td valign="top" align="center">221</td>
<td valign="top" align="center">2.08</td>
<td valign="top" align="center">166</td>
<td valign="top" align="center">345.36</td>
<td valign="top" align="center">55</td>
<td valign="top" align="center">114.43</td>
</tr>
<tr>
<td valign="top" align="left">SM</td>
<td valign="top" align="center">224</td>
<td valign="top" align="center">327</td>
<td valign="top" align="center">1.66</td>
<td valign="top" align="center">249</td>
<td valign="top" align="center">414.13</td>
<td valign="top" align="center">78</td>
<td valign="top" align="center">129.73</td></tr>
<tr>
<td valign="top" align="left">SS</td>
<td valign="top" align="center">81</td>
<td valign="top" align="center">226</td>
<td valign="top" align="center">3.07</td>
<td valign="top" align="center">156</td>
<td valign="top" align="center">478.76</td>
<td valign="top" align="center">70</td>
<td valign="top" align="center">214.83</td>
</tr>
<tr>
<td valign="top" align="left">Trigrams</td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
</tr>
<tr>
<td valign="top" align="left">MMM</td>
<td valign="top" align="center">628</td>
<td valign="top" align="center">4275</td>
<td valign="top" align="center">0.12</td>
<td valign="top" align="center">3454</td>
<td valign="top" align="center">408.11</td>
<td valign="top" align="center">821</td>
<td valign="top" align="center">97.01</td></tr>
<tr>
<td valign="top" align="left">MMS</td>
<td valign="top" align="center">125</td>
<td valign="top" align="center">159</td>
<td valign="top" align="center">2.33</td>
<td valign="top" align="center">120</td>
<td valign="top" align="center">279.12</td>
<td valign="top" align="center">39</td>
<td valign="top" align="center">90.71</td>
</tr>
<tr>
<td valign="top" align="left">MSM</td>
<td valign="top" align="center">118</td>
<td valign="top" align="center">147</td>
<td valign="top" align="center">2.38</td>
<td valign="top" align="center">113</td>
<td valign="top" align="center">269.00</td>
<td valign="top" align="center">34</td>
<td valign="top" align="center">80.94</td></tr>
<tr>
<td valign="top" align="left">MSS</td>
<td valign="top" align="center">54</td>
<td valign="top" align="center">66</td>
<td valign="top" align="center">3.08</td>
<td valign="top" align="center">47</td>
<td valign="top" align="center">144.59</td>
<td valign="top" align="center">19</td>
<td valign="top" align="center">58.45</td>
</tr>
<tr>
<td valign="top" align="left">SMM</td>
<td valign="top" align="center">206</td>
<td valign="top" align="center">267</td>
<td valign="top" align="center">1.75</td>
<td valign="top" align="center">208</td>
<td valign="top" align="center">363.20</td>
<td valign="top" align="center">59</td>
<td valign="top" align="center">103.02</td></tr>
<tr>
<td valign="top" align="left">SMS</td>
<td valign="top" align="center">28</td>
<td valign="top" align="center">33</td>
<td valign="top" align="center">3.47</td>
<td valign="top" align="center">25</td>
<td valign="top" align="center">86.66</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">27.73</td>
</tr>
<tr>
<td valign="top" align="left">SSM</td>
<td valign="top" align="center">79</td>
<td valign="top" align="center">96</td>
<td valign="top" align="center">2.76</td>
<td valign="top" align="center">72</td>
<td valign="top" align="center">198.80</td>
<td valign="top" align="center">24</td>
<td valign="top" align="center">66.27</td></tr>
<tr>
<td valign="top" align="left">SSS</td>
<td valign="top" align="center">50</td>
<td valign="top" align="center">128</td>
<td valign="top" align="center">3.49</td>
<td valign="top" align="center">82</td>
<td valign="top" align="center">286.51</td>
<td valign="top" align="center">46</td>
<td valign="top" align="center">160.73</td>
</tr>
<tr>
<td valign="top" align="left">Four-grams</td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
<td valign="top" align="center"></td>
</tr>
<tr>
<td valign="top" align="left">MMMM</td>
<td valign="top" align="center">495</td>
<td valign="top" align="center">3574</td>
<td valign="top" align="center">0.59</td>
<td valign="top" align="center">2895</td>
<td valign="top" align="center">1698.67</td>
<td valign="top" align="center">679</td>
<td valign="top" align="center">398.41</td></tr>
<tr>
<td valign="top" align="left">MMMS</td>
<td valign="top" align="center">80</td>
<td valign="top" align="center">101</td>
<td valign="top" align="center">2.77</td>
<td valign="top" align="center">79</td>
<td valign="top" align="center">218.45</td>
<td valign="top" align="center">22</td>
<td valign="top" align="center">60.83</td>
</tr>
<tr>
<td valign="top" align="left">MMSM</td>
<td valign="top" align="center">90</td>
<td valign="top" align="center">103</td>
<td valign="top" align="center">2.62</td>
<td valign="top" align="center">80</td>
<td valign="top" align="center">209.51</td>
<td valign="top" align="center">23</td>
<td valign="top" align="center">60.23</td></tr>
<tr>
<td valign="top" align="left">MMSS</td>
<td valign="top" align="center">41</td>
<td valign="top" align="center">48</td>
<td valign="top" align="center">3.25</td>
<td valign="top" align="center">34</td>
<td valign="top" align="center">110.37</td>
<td valign="top" align="center">14</td>
<td valign="top" align="center">45.45</td>
</tr>
<tr>
<td valign="top" align="left">MSMM</td>
<td valign="top" align="center">97</td>
<td valign="top" align="center">114</td>
<td valign="top" align="center">2.56</td>
<td valign="top" align="center">90</td>
<td valign="top" align="center">230.19</td>
<td valign="top" align="center">24</td>
<td valign="top" align="center">61.39</td></tr>
<tr>
<td valign="top" align="left">MSMS</td>
<td valign="top" align="center">14</td>
<td valign="top" align="center">15</td>
<td valign="top" align="center">3.65</td>
<td valign="top" align="center">11</td>
<td valign="top" align="center">40.15</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">14.60</td>
</tr>
<tr>
<td valign="top" align="left">MSSM</td>
<td valign="top" align="center">22</td>
<td valign="top" align="center">23</td>
<td valign="top" align="center">3.50</td>
<td valign="top" align="center">17</td>
<td valign="top" align="center">59.46</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">20.99</td></tr>
<tr>
<td valign="top" align="left">MSSS</td>
<td valign="top" align="center">36</td>
<td valign="top" align="center">41</td>
<td valign="top" align="center">3.31</td>
<td valign="top" align="center">28</td>
<td valign="top" align="center">92.70</td>
<td valign="top" align="center">13</td>
<td valign="top" align="center">43.04</td>
</tr>
<tr>
<td valign="top" align="left">SMMM</td>
<td valign="top" align="center">171</td>
<td valign="top" align="center">210</td>
<td valign="top" align="center">1.96</td>
<td valign="top" align="center">167</td>
<td valign="top" align="center">327.60</td>
<td valign="top" align="center">43</td>
<td valign="top" align="center">84.35</td></tr>
<tr>
<td valign="top" align="left">SMMS</td>
<td valign="top" align="center">24</td>
<td valign="top" align="center">28</td>
<td valign="top" align="center">3.53</td>
<td valign="top" align="center">22</td>
<td valign="top" align="center">77.70</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">21.19</td>
</tr>
<tr>
<td valign="top" align="left">SMSM</td>
<td valign="top" align="center">20</td>
<td valign="top" align="center">21</td>
<td valign="top" align="center">3.54</td>
<td valign="top" align="center">16</td>
<td valign="top" align="center">56.57</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">17.68</td></tr>
<tr>
<td valign="top" align="left">SMSS</td>
<td valign="top" align="center">12</td>
<td valign="top" align="center">12</td>
<td valign="top" align="center">3.63</td>
<td valign="top" align="center">9</td>
<td valign="top" align="center">32.64</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">10.88</td>
</tr>
<tr>
<td valign="top" align="left">SSMM</td>
<td valign="top" align="center">67</td>
<td valign="top" align="center">76</td>
<td valign="top" align="center">2.87</td>
<td valign="top" align="center">60</td>
<td valign="top" align="center">172.40</td>
<td valign="top" align="center">16</td>
<td valign="top" align="center">45.97</td></tr>
<tr>
<td valign="top" align="left">SSMS</td>
<td valign="top" align="center">11</td>
<td valign="top" align="center">11</td>
<td valign="top" align="center">3.64</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">29.10</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">10.91</td>
</tr>
<tr>
<td valign="top" align="left">SSSM</td>
<td valign="top" align="center">50</td>
<td valign="top" align="center">57</td>
<td valign="top" align="center">3.10</td>
<td valign="top" align="center">40</td>
<td valign="top" align="center">123.96</td>
<td valign="top" align="center">17</td>
<td valign="top" align="center">52.68</td></tr>
<tr>
<td valign="top" align="left">SSSS</td>
<td valign="top" align="center">25</td>
<td valign="top" align="center">71</td>
<td valign="top" align="center">4.06</td>
<td valign="top" align="center">42</td>
<td valign="top" align="center">170.71</td>
<td valign="top" align="center">29</td>
<td valign="top" align="center">117.87</td></tr>
</tbody></table>
<table-wrap-foot>
<attrib><italic>Freq., frequency; Wgt, weight; S, working on the scenario; M, changing the model.</italic></attrib>
</table-wrap-foot>
</table-wrap>
</sec>
</sec>
<sec><title>Results</title>
<p>As can be seen from <xref ref-type="table" rid="T4">Table 4</xref>, the task was relatively difficult with only 544 (38.9%) of the students solving the task correctly. Moreover, 666 (47.6%) of the students applied the VOTAT strategy. Applying the VOTAT strategy, generally, lead to a substantially higher likelihood of solving the problem (&#x03C7;<sup>2</sup> = 401.10; <italic>df</italic> = 1; <italic>p</italic> &#x003C; 0.001). However, 143 (21.5%) of the students that applied the VOTAT strategy did not solve the problem.</p>
<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>Distribution of students based on whether they solved the problem and applied the VOTAT strategy.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="center" colspan="5">Applied the VOTATstrategy<hr/></th>
</tr>
<tr>
<td valign="top" align="center"></td>
<th valign="top" align="center" colspan="2">No</th>
<th valign="top" align="center">Yes</th>
<th valign="top" align="center">Total</th></tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Solved the problem</td>
<td valign="top" align="center">No</td>
<td valign="top" align="center">712</td>
<td valign="top" align="center">143</td>
<td valign="top" align="center">855</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center">Yes</td>
<td valign="top" align="center">21</td>
<td valign="top" align="center">523</td>
<td valign="top" align="center">544</td></tr>
<tr>
<td valign="top" align="left">Total</td>
<td valign="top" align="center"></td>
<td valign="top" align="center">733</td>
<td valign="top" align="center">666</td>
<td valign="top" align="center">1399</td></tr>
</tbody>
</table>
</table-wrap>
<p>In the exploratory analysis, we attempt to understand this observation by finding behavioral differences among the students that applied the VOTAT strategy by using the n-gram approach. There was no significant difference between the absolute number of behaviors observed for either group of students [<italic>t</italic>(664) = 0.52; <italic>p</italic> = 0.601; <italic>d</italic> = 0.05] nor the time spent working on the task [<italic>t</italic>(664) = 0.27; <italic>p</italic> = 0.790; <italic>d</italic> = 0.03]. <xref ref-type="table" rid="T5">Table 5</xref> displays the results of the chi-square feature selection model analyzing differences in likelihoods of specific n-grams for students that applied the VOTAT strategy and solved the problem and those that did not. Note that the possible behaviors were reduced to working on the scenario (S) and changing the model (M). N-grams with higher chi-square values are more discriminative between the two groups. Moreover, <xref ref-type="table" rid="T5">Table 5</xref> indicates whether the n-grams were more typical of students that solved the problem or of those that did not.</p>
<table-wrap position="float" id="T5">
<label>Table 5</label>
<caption><p>Summary of the chi-square feature selection model for bigrams, trigrams, and four-grams.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="center" colspan="4"><italic>n</italic> = 2<hr/></th>
<th valign="top" align="center" colspan="4"><italic>n</italic> = 3<hr/></th>
<th valign="top" align="center" colspan="4"><italic>n</italic> = 4<hr/></th>
</tr>
<tr>
<th valign="top" align="left">Sequence</th>
<th valign="top" align="center">&#x03C7;<sup>2</sup></th>
<th valign="top" align="center"><italic>p</italic></th>
<th valign="top" align="center">Dir.</th>
<th valign="top" align="left">Sequence</th>
<th valign="top" align="center">&#x03C7;<sup>2</sup></th>
<th valign="top" align="center">Dir.</th>
<th valign="top" align="center"><italic>p</italic></th>
<th valign="top" align="left">Sequence</th>
<th valign="top" align="center">&#x03C7;<sup>2</sup></th>
<th valign="top" align="center">Dir.</th>
<th valign="top" align="center"><italic>p</italic></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">SS</td>
<td valign="top" align="center">31.98</td>
<td valign="top" align="center">&#x003C;0.001</td>
<td valign="top" align="center">-</td>
<td valign="top" align="left">SSS</td>
<td valign="top" align="center">59.98</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">&#x003C;0.001</td>
<td valign="top" align="left">SSSS</td>
<td valign="top" align="center">76.34</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">&#x003C;0.001</td>
</tr>
<tr>
<td valign="top" align="left">MM</td>
<td valign="top" align="center">0.92</td>
<td valign="top" align="center">0.337</td>
<td valign="top" align="center">+</td>
<td valign="top" align="left">MMM</td>
<td valign="top" align="center">12.16</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">&#x003C;0.001</td>
<td valign="top" align="left">MMMM</td>
<td valign="top" align="center">67.09</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">&#x003C;0.001</td>
</tr>
<tr>
<td valign="top" align="left">MS</td>
<td valign="top" align="center">0.23</td>
<td valign="top" align="center">0.632</td>
<td valign="top" align="center">-</td>
<td valign="top" align="left">MSS</td>
<td valign="top" align="center">4.08</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.043</td>
<td valign="top" align="left">MSSS</td>
<td valign="top" align="center">7.21</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.007</td>
</tr>
<tr>
<td valign="top" align="left">SM</td>
<td valign="top" align="center">0.05</td>
<td valign="top" align="center">0.823</td>
<td valign="top" align="center">+</td>
<td valign="top" align="left">SMM</td>
<td valign="top" align="center">1.95</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.163</td>
<td valign="top" align="left">SMMM</td>
<td valign="top" align="center">5.43</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.020</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">MSM</td>
<td valign="top" align="center">0.37</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.543</td>
<td valign="top" align="left">SSSM</td>
<td valign="top" align="center">5.30</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.021</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">SSM</td>
<td valign="top" align="center">0.17</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.680</td>
<td valign="top" align="left">MMSS</td>
<td valign="top" align="center">3.64</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.056</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">MMS</td>
<td valign="top" align="center">0.04</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.841</td>
<td valign="top" align="left">MSMM</td>
<td valign="top" align="center">2.70</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.100</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">SMS</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">1.00</td>
<td valign="top" align="left">SSMM</td>
<td valign="top" align="center">2.01</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.156</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">MMMS</td>
<td valign="top" align="center">1.52</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.218</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">MMSM</td>
<td valign="top" align="center">0.87</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.351</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">SMMS</td>
<td valign="top" align="center">0.69</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.406</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">SSMS</td>
<td valign="top" align="center">0.36</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.549</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">MSMS</td>
<td valign="top" align="center">0.32</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.572</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">MSSM</td>
<td valign="top" align="center">0.27</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.603</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">SMSS</td>
<td valign="top" align="center">0.03</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.862</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="3"></td>
<td valign="top" align="left">SMSM</td>
<td valign="top" align="center">0.01</td>
<td valign="top" align="center">+</td>
<td valign="top" align="center">0.920</td></tr>
</tbody></table>
<table-wrap-foot>
<attrib><italic>N-grams with higher chi-square values are more discriminative; Dir., Direction of the difference between groups. &#x201C;+&#x201D; represents behaviors that were more typical of students that solved the task &#x201C;-&#x201C; represents behaviors that were more typical of students that did not solve the task; S, working on the scenario; M, changing the model.</italic></attrib>
</table-wrap-foot>
</table-wrap>
<p>As can be seen from <xref ref-type="table" rid="T5">Table 5</xref>, the informational value of the n-grams increases with their length, while the general pattern does not change. The most discriminative sequence of behavior was consistently the one indicating working maximally long in the scenario (SS, SSS, and SSSS), which was always more typical of the students that did not solve the task. This was followed by the sequence of behavior indicating working maximally long in the model (only statistically significant for MMM and MMMM), which was always more typical of students solving the task. Generally, the sequences indicating repeated changes in the scenario were associated with failing to solve the problem (statistically significant for MSS, MSSS, and SSSM), whereas the sequences indicating repeated changes in the model were associated with solving the problem (statistically significant for SMMM). The discriminative value (high chi-square values) was highest for the sequences with the longest uninterrupted sequences of one specific behavior (M or S) and least for those that indicated frequent changes between working on the scenario and working on the model (e.g., SMSM).</p>
</sec>
<sec><title>Discussion</title>
<p>The aim of this study was to use exploratory educational data mining techniques in explaining problem-solving behavior. We chose one of the most established types of CPS tasks (based on the MicroDYN approach; <xref ref-type="bibr" rid="B13">Greiff et al., 2015a</xref>), for which the optimal strategy is well known (i.e., the VOTAT strategy; <xref ref-type="bibr" rid="B37">Tschirgi, 1980</xref>). However, not all students applying the VOTAT strategy also solved the tasks correctly implying that simply observing whether or not the strategy was applied is not sufficient to understand why some students succeed in solving CPS tasks while others do not (<xref ref-type="bibr" rid="B24">Kuhn and Dean, 2005</xref>).</p>
<p>Describing the whole string of behaviors observed for each individual student as a set of n-grams of different length (<xref ref-type="bibr" rid="B6">Damashek, 1995</xref>) allowed us to exploratively search for differences in the behavior observed within those students that applied the VOTAT strategy and successfully solved the task and those that applied the strategy but still failed to solve the task. The empirical example illustrates that given enough complexity, there are substantial differences in the frequencies of observed n-grams between the two groups. Interpreting those differences, however, requires some understanding of the task and what it takes to solve it (<xref ref-type="bibr" rid="B2">Banovic et al., 2016</xref>).</p>
<p>Correctly applied, the VOTAT strategy requires problem-solvers to make only minimal changes in the scenario, register the effects and then immediately plot the findings in the model (<xref ref-type="bibr" rid="B42">W&#x00FC;stenberg et al., 2012</xref>). Any deviations from this algorithm will increase the cognitive load (<xref ref-type="bibr" rid="B36">Sweller, 2011</xref>) on the problem-solver as important information (i.e., either changes made in the scenario or findings resulting from these changes) need to be stored in working memory (<xref ref-type="bibr" rid="B35">Sweller, 1988</xref>). Inspecting the differences in behaviors between students that applied the VOTAT strategy and successfully solved the task and those that applied the strategy but still failed, the general pattern seemed to be that the students that solved the task spent fewer rounds continuously working on the scenario (e.g., SS, SSS, or SSSS) but more rounds working on the model (e.g., MMM and MMMM). Students that did not solve the task, thus, did not immediately plot their findings, thereby increasing their cognitive load and, in turn, the task&#x2019;s difficulty (<xref ref-type="bibr" rid="B20">Kirschner, 2002</xref>). Our findings thus highlight the importance of metastrategic competencies that enable a person to not only apply the correct strategy to solve a problem but to make use of the information gained in the process. Metastrategic competencies encompass awareness, understanding, monitoring, and management of one&#x2019;s strategic performance of many kinds of cognitive tasks (<xref ref-type="bibr" rid="B25">Kuhn and Pearsall, 1998</xref>). As becomes obvious from our analyses, students that did not solve the problems correctly either lacked understanding of the VOTAT strategy or were not able to manage their use of the strategy. Due to the exploratory nature of our analyses, our interpretations are <italic>post hoc</italic> though and should be corroborated by experimental studies.</p>
<p>There are other limitations to be considered. In focusing only on the students applying the VOTAT strategy we reduced our sample to <italic>N</italic> = 666, excluding almost half of the initial sample from our analyses. However, since the aim of our paper was to find behavior differences between students that applied the VOTAT strategy and successfully solved the problem and those students that applied the VOTAT strategy but failed, students that did not apply the VOTAT strategy at all were irrelevant to our analyses. Future studies should extend our analyses to explore differences in behavior across all students not selected by <italic>a priori</italic> defined strategies.</p>
<p>Moreover, coding of the log-files into changes in the scenario and changes in the model does not allow differentiating between different changes applied to the input variables within one round of changes to the scenario (e.g., manipulations of only one variable vs. manipulations of multiple variables). However, this simplification allows for a relatively straight-forward interpretation of the resulting n-grams. A more detailed coding of changes to the scenario, on the other hand, would lead to an exponentially higher number of potential behavior sequences most of which would most likely have very little information value due to their specificity. The potential variance in changes in the input variables between successful and unsuccessful students is further reduced by the fact that all participants included in our analyses applied the VOTAT strategy (i.e., manipulated all input variables at least once individually while keeping the others constant). Since manipulating all input variables individually once is sufficient to solve the task, all further manipulations, regardless of whether single or multiple variables, will result in unnecessary additional information increasing cognitive load. Testing these assumptions will, however, require additional information to be logged (for more on the completeness of log data see <xref ref-type="bibr" rid="B22">Kroehne and Goldhammer, 2018</xref>).</p>
<p>Finally, the n-gram approach showcased in this paper is not the only explorative educational data mining approach applicable to CPS log-files, of course. Other studies have applied analyses of the interaction of behavior displayed while solving tasks such as Network Analysis (<xref ref-type="bibr" rid="B41">Wooldridge et al., 2018</xref>), or included the temporal order of behaviors in their analyses by displaying them as complex directed networks (<xref ref-type="bibr" rid="B40">Vista et al., 2016</xref>). All of these approaches share the aim of understanding problem-solving behavior on a very detailed level and the difficulties that come with that aim. Most importantly, any increase in task specificity (e.g., longer n-grams) comes, necessarily, with a decrease in generalizability. In that, perfect understanding of students&#x2019; behavior in one task may be meaningless to understand performance in another task unless the structural similarities between these tasks are well understood and theoretically described. Future studies should, therefore, investigate the generalizability of behavior across different problem-solving tasks.</p>
<p>The findings show the potential benefit of applying explorative educational data mining approaches such as the n-gram approach in addition to searching for <italic>a priori</italic> defined strategies. Knowledge about how and why students that actually apply the correct strategy to solve a problem fail to actually solve it has implications for the instruction or training of CPS tasks. So far, interventions aimed at increasing CPS performance have relied on repeatedly confronting problem-solvers with problems of a similar nature (e.g., <xref ref-type="bibr" rid="B21">Kretzschmar and S&#x00FC;&#x00DF;, 2015</xref>). Training lead to an increase in performance and, in fact, also to an increase in strategic prowess (<xref ref-type="bibr" rid="B27">Lotz et al., 2017</xref>). However, no dedicated strategy training has been published to the best of our knowledge. Based on our findings, such a strategy training should consider to not only teach the VOTAT strategy but also metastrategic knowledge such as the handling of information gained through the application of VOTAT (<xref ref-type="bibr" rid="B46">Zohar and Peled, 2008</xref>).</p>
</sec>
<sec><title>Conclusion</title>
<p>In summary, our paper showcased the n-gram approach on a CPS task. The detailed description of the data provided some indication toward behavioral differences within students that apply the correct strategy toward a problem and solve it as opposed to those that apply the correct strategy and fail. We hope that the paper will help other scholars in finding ways to analyze and interpret log-file data themselves. After all, the exploitation of this rich resource through dedicated analyses is still in its infancy and we believe that it is a treasure trove worth hunting for.</p>
</sec>
<sec><title>Ethics Statement</title>
<p>Ethics approval was granted for the data collection (see <xref ref-type="bibr" rid="B39">Vainikainen, 2014</xref>).</p>
</sec>
<sec><title>Author Contributions</title>
<p>All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.</p>
</sec>
<sec><title>Conflict of Interest Statement</title>
<p>SG is one of two authors of the commercially available COMPRO test that is based on the multiple complex systems approach and that employs the MicroDYN approach. However, for any research and educational purposes, a free version of MicroDYN tasks is available and he receives royalties for COMPRO. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</body>
<back>
<fn-group>
<fn fn-type="financial-disclosure">
<p><bold>Funding.</bold> This research was supported by a project funded by the Fonds National de la Recherche Luxembourg (The Training of Complex Problem Solving; &#x201C;TRIOPS&#x201D;).</p></fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="B1"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Arroyo</surname> <given-names>I.</given-names></name> <name><surname>Woolf</surname> <given-names>B.</given-names></name></person-group> (<year>2005</year>). <article-title>&#x201C;Inferring learning and attitudes from a Bayesian network of log file data,&#x201D; in</article-title> <source><italic>Proceedings of the AIED 05 12th International Conference on Artificial Intelligence in Education</italic></source> <publisher-loc>Chicago</publisher-loc>.</citation></ref>
<ref id="B2"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Banovic</surname> <given-names>N.</given-names></name> <name><surname>Buzali</surname> <given-names>T.</given-names></name> <name><surname>Chevalier</surname> <given-names>F.</given-names></name> <name><surname>Mankoff</surname> <given-names>J.</given-names></name> <name><surname>Dey</surname> <given-names>A. K.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x201C;Modeling and understanding human routine behavior,&#x201D; in</article-title> <source><italic>Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</italic></source> <role>eds</role> <person-group person-group-type="editor"><name><surname>Kaye</surname> <given-names>J.</given-names></name> <name><surname>Druin</surname> <given-names>A.</given-names></name> <name><surname>Lampe</surname> <given-names>C.</given-names></name> <name><surname>Morris</surname> <given-names>D.</given-names></name> <name><surname>Hourcade</surname> <given-names>J. P.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>) <fpage>248</fpage>&#x2013;<lpage>260</lpage>. <pub-id pub-id-type="doi">10.1145/2858036.2858557</pub-id></citation></ref>
<ref id="B3"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Borges</surname> <given-names>J.</given-names></name> <name><surname>Levene</surname> <given-names>M.</given-names></name></person-group> (<year>2000</year>). <article-title>&#x201C;Data mining of user navigation patterns,&#x201D; in</article-title> <source><italic>Lecture Notes in Computer Science Lecture Notes in Artificial Intelligence</italic></source> <volume>Vol. 1836</volume> <role>ed.</role> <person-group person-group-type="editor"><name><surname>Masand</surname> <given-names>B.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>) <fpage>92</fpage>&#x2013;<lpage>112</lpage>. <pub-id pub-id-type="doi">10.1007/3-540-44934-5_6</pub-id></citation></ref>
<ref id="B4"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bunderson</surname> <given-names>C. V.</given-names></name> <name><surname>Inouye</surname> <given-names>D. K.</given-names></name> <name><surname>Olsen</surname> <given-names>J. B.</given-names></name></person-group> (<year>1989</year>). <article-title>&#x201C;The four generations of computerized educational measurement,&#x201D; in</article-title> <source><italic>Educational Measurement</italic></source> <role>ed.</role> <person-group person-group-type="editor"><name><surname>Linn</surname> <given-names>R. L.</given-names></name></person-group> (<publisher-loc>Washington DC</publisher-loc>: <publisher-name>American Council on Education</publisher-name>) <fpage>367</fpage>&#x2013;<lpage>407</lpage>.</citation></ref>
<ref id="B5"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>Z.</given-names></name> <name><surname>Klahr</surname> <given-names>D.</given-names></name></person-group> (<year>1999</year>). <article-title>All other things being equal: acquisition and transfer of the control of variables strategy.</article-title> <source><italic>Child Dev.</italic></source> <volume>70</volume> <fpage>1098</fpage>&#x2013;<lpage>1120</lpage>. <pub-id pub-id-type="doi">10.1111/1467-8624.00081</pub-id> <pub-id pub-id-type="pmid">10546337</pub-id></citation></ref>
<ref id="B6"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Damashek</surname> <given-names>M.</given-names></name></person-group> (<year>1995</year>). <article-title>Gauging similarity with n-grams: language-independent categorization of text.</article-title> <source><italic>Science</italic></source> <volume>267</volume> <fpage>843</fpage>&#x2013;<lpage>848</lpage>. <pub-id pub-id-type="doi">10.1126/science.267.5199.843</pub-id> <pub-id pub-id-type="pmid">17813910</pub-id></citation></ref>
<ref id="B7"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Frensch</surname> <given-names>P. A.</given-names></name> <name><surname>Funke</surname> <given-names>J.</given-names></name></person-group> <comment>(eds)</comment> (<year>1995</year>). <source><italic>Complex Problem Solving: The European Perspective.</italic></source> <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>.</citation></ref>
<ref id="B8"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fu</surname> <given-names>W.-T.</given-names></name></person-group> (<year>2001</year>). <article-title>ACT-PRO action protocol analyzer: a tool for analyzing discrete action protocols.</article-title> <source><italic>Behav. Res. Methods Instrum. Comput.</italic></source> <volume>33</volume> <fpage>149</fpage>&#x2013;<lpage>158</lpage>. <pub-id pub-id-type="doi">10.3758/BF03195360</pub-id> <pub-id pub-id-type="pmid">11447667</pub-id></citation></ref>
<ref id="B9"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Funke</surname> <given-names>J.</given-names></name></person-group> (<year>2001</year>). <article-title>Dynamic systems as tools for analysing human judgement.</article-title> <source><italic>Think. Reason.</italic></source> <volume>7</volume> <fpage>69</fpage>&#x2013;<lpage>89</lpage>. <pub-id pub-id-type="doi">10.1080/13546780042000046</pub-id></citation></ref>
<ref id="B10"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Funke</surname> <given-names>J.</given-names></name></person-group> (<year>2010</year>). <article-title>Complex problem solving: a case for complex cognition?</article-title> <source><italic>Cogn. Process.</italic></source> <volume>11</volume> <fpage>133</fpage>&#x2013;<lpage>142</lpage>. <pub-id pub-id-type="doi">10.1007/s10339-009-0345-0</pub-id> <pub-id pub-id-type="pmid">19902283</pub-id></citation></ref>
<ref id="B11"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Goldhammer</surname> <given-names>F.</given-names></name> <name><surname>Naumann</surname> <given-names>J.</given-names></name> <name><surname>Stelter</surname> <given-names>A.</given-names></name> <name><surname>T&#x00F3;th</surname> <given-names>K.</given-names></name> <name><surname>R&#x00F6;lke</surname> <given-names>H.</given-names></name> <name><surname>Klieme</surname> <given-names>E.</given-names></name></person-group> (<year>2014</year>). <article-title>The time on task effect in reading and problem solving is moderated by task difficulty and skill: insights from a computer-based large-scale assessment.</article-title> <source><italic>J. Educ. Psychol.</italic></source> <volume>106</volume> <fpage>608</fpage>&#x2013;<lpage>626</lpage>. <pub-id pub-id-type="doi">10.1037/a0034716</pub-id></citation></ref>
<ref id="B12"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Greiff</surname> <given-names>S.</given-names></name> <name><surname>Niepel</surname> <given-names>C.</given-names></name> <name><surname>Scherer</surname> <given-names>R.</given-names></name> <name><surname>Martin</surname> <given-names>R.</given-names></name></person-group> (<year>2016</year>). <article-title>Understanding students&#x2019; performance in a computer-based assessment of complex problem solving: an analysis of behavioral data from computer-generated log files.</article-title> <source><italic>Comput. Hum. Behav.</italic></source> <volume>61</volume> <fpage>36</fpage>&#x2013;<lpage>46</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2016.02.095</pub-id></citation></ref>
<ref id="B13"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Greiff</surname> <given-names>S.</given-names></name> <name><surname>Stadler</surname> <given-names>M.</given-names></name> <name><surname>Sonnleitner</surname> <given-names>P.</given-names></name> <name><surname>Wolff</surname> <given-names>C.</given-names></name> <name><surname>Martin</surname> <given-names>R.</given-names></name></person-group> (<year>2015a</year>). <article-title>Sometimes less is more: comparing the validity of complex problem solving measures.</article-title> <source><italic>Intelligence</italic></source> <volume>50</volume> <fpage>100</fpage>&#x2013;<lpage>113</lpage>. <pub-id pub-id-type="doi">10.1016/j.intell.2015.02.007</pub-id></citation></ref>
<ref id="B14"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Greiff</surname> <given-names>S.</given-names></name> <name><surname>W&#x00FC;stenberg</surname> <given-names>S.</given-names></name> <name><surname>Avvisati</surname> <given-names>F.</given-names></name></person-group> (<year>2015b</year>). <article-title>Computer-generated log-file analyses as a window into students&#x2019; minds? A showcase study based on the PISA 2012 assessment of problem solving.</article-title> <source><italic>Comput. Educ.</italic></source> <volume>91</volume> <fpage>92</fpage>&#x2013;<lpage>105</lpage>. <pub-id pub-id-type="doi">10.1016/j.compedu.2015.10.018</pub-id></citation></ref>
<ref id="B15"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Greiff</surname> <given-names>S.</given-names></name> <name><surname>W&#x00FC;stenberg</surname> <given-names>S.</given-names></name> <name><surname>Holt</surname> <given-names>D. V.</given-names></name> <name><surname>Goldhammer</surname> <given-names>F.</given-names></name> <name><surname>Funke</surname> <given-names>J.</given-names></name></person-group> (<year>2013</year>). <article-title>Computer-based assessment of complex problem solving: concept, implementation, and application.</article-title> <source><italic>Educ. Technol. Res. Dev.</italic></source> <volume>61</volume> <fpage>407</fpage>&#x2013;<lpage>421</lpage>. <pub-id pub-id-type="doi">10.1007/s11423-013-9301-x</pub-id></citation></ref>
<ref id="B16"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Griffin</surname> <given-names>P.</given-names></name> <name><surname>Care</surname> <given-names>E.</given-names></name></person-group> (<year>2015</year>). <source><italic>Assessment and Teaching of 21st Century Skills.</italic></source> <publisher-loc>Dordrecht</publisher-loc>: <publisher-name>Springer</publisher-name>.</citation></ref>
<ref id="B17"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>He</surname> <given-names>Q.</given-names></name> <name><surname>von Davier</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>&#x201C;Identifying feature sequences from process data in problem-solving items with n-grams,&#x201D; in</article-title> <source><italic>Springer Proceedings in Mathematics &#x0026; Statistics: Volume 140. Quantitative Psychology Research: The 79th Annual Meeting of the Psychometric Society, Wisconsin, 2014</italic></source> <volume>Vol. 140</volume> <role>eds</role> <person-group person-group-type="editor"><name><surname>van der Ark</surname> <given-names>L. A.</given-names></name> <name><surname>Bolt</surname> <given-names>D.</given-names></name> <name><surname>Wang</surname> <given-names>W.-C.</given-names></name> <name><surname>Douglas</surname> <given-names>J. A.</given-names></name> <name><surname>Chow</surname> <given-names>S.-M.</given-names></name> <name><surname>Society</surname> <given-names>P.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>) <fpage>173</fpage>&#x2013;<lpage>190</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-19977-1_13</pub-id></citation></ref>
<ref id="B18"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>He</surname> <given-names>Q.</given-names></name> <name><surname>von Davier</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x201C;Analyzing process data from problem-solving items with n-grams,&#x201D; in</article-title> <source><italic>Advances in Higher Education and Professional Development Book Series. Handbook of Research on Technology Tools for Real-World Skill Development</italic></source> <volume>Vol. 1</volume> <role>ed.</role> <person-group person-group-type="editor"><name><surname>Rosen</surname> <given-names>Y.</given-names></name></person-group> (<publisher-loc>Hershey, PA</publisher-loc>: <publisher-name>Information Science Reference</publisher-name>) <fpage>750</fpage>&#x2013;<lpage>777</lpage>. <pub-id pub-id-type="doi">10.4018/978-1-4666-9441-5.ch029</pub-id></citation></ref>
<ref id="B19"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ifenthaler</surname> <given-names>D.</given-names></name> <name><surname>Eseryel</surname> <given-names>D.</given-names></name> <name><surname>Ge</surname> <given-names>X.</given-names></name></person-group> (<year>2012</year>). <article-title>&#x201C;Assessment for game-based learning,&#x201D; in</article-title> <source><italic>Assessment in Game-Based Learning: Foundations, Innovations and Perspectives</italic></source> <role>eds</role> <person-group person-group-type="editor"><name><surname>Eseryel</surname> <given-names>D.</given-names></name> <name><surname>Ge</surname> <given-names>X.</given-names></name> <name><surname>Ifenthaler</surname> <given-names>D.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Springer</publisher-name>) <fpage>1</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1007/978-1-4614-3546-4</pub-id></citation></ref>
<ref id="B20"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kirschner</surname> <given-names>P. A.</given-names></name></person-group> (<year>2002</year>). <article-title>Cognitive load theory: implications of cognitive load theory on the design of learning.</article-title> <source><italic>Learn. Instruct.</italic></source> <volume>12</volume> <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1016/S0959-4752(01)00014-7</pub-id></citation></ref>
<ref id="B21"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kretzschmar</surname> <given-names>A.</given-names></name> <name><surname>S&#x00FC;&#x00DF;</surname> <given-names>H.-M.</given-names></name></person-group> (<year>2015</year>). <article-title>A study on the training of complex problem solving competence.</article-title> <source><italic>J. Dyn. Decis. Mak.</italic></source> <volume>1</volume>:<issue>4</issue>. <pub-id pub-id-type="doi">10.11588/jddm.2015.1.15455</pub-id></citation></ref>
<ref id="B22"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kroehne</surname> <given-names>U.</given-names></name> <name><surname>Goldhammer</surname> <given-names>F.</given-names></name></person-group> (<year>2018</year>). <article-title>How to conceptualize, represent, and analyze log data from technology-based assessments? A generic framework and an application to questionnaire items.</article-title> <source><italic>Behaviormetrika</italic></source> <volume>45</volume> <fpage>527</fpage>&#x2013;<lpage>563</lpage>. <pub-id pub-id-type="doi">10.1007/s41237-018-0063-y</pub-id></citation></ref>
<ref id="B23"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kr&#x00F6;ner</surname> <given-names>S.</given-names></name> <name><surname>Plass</surname> <given-names>J. L.</given-names></name> <name><surname>Leutner</surname> <given-names>D.</given-names></name></person-group> (<year>2005</year>). <article-title>Intelligence assessment with computer simulations.</article-title> <source><italic>Intelligence</italic></source> <volume>33</volume> <fpage>347</fpage>&#x2013;<lpage>368</lpage>. <pub-id pub-id-type="doi">10.1016/j.intell.2005.03.002</pub-id></citation></ref>
<ref id="B24"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kuhn</surname> <given-names>D.</given-names></name> <name><surname>Dean</surname> <given-names>D.</given-names></name></person-group> (<year>2005</year>). <article-title>Is developing scientific thinking all about learning to control variables?</article-title> <source><italic>Psychol. Sci.</italic></source> <volume>16</volume> <fpage>866</fpage>&#x2013;<lpage>870</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-9280.2005.01628.x</pub-id> <pub-id pub-id-type="pmid">16262771</pub-id></citation></ref>
<ref id="B25"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kuhn</surname> <given-names>D.</given-names></name> <name><surname>Pearsall</surname> <given-names>S.</given-names></name></person-group> (<year>1998</year>). <article-title>Relations between metastrategic knowledge and strategic performance.</article-title> <source><italic>Cogn. Dev.</italic></source> <volume>13</volume> <fpage>227</fpage>&#x2013;<lpage>247</lpage>. <pub-id pub-id-type="doi">10.1016/S0885-2014(98)90040-5</pub-id></citation></ref>
<ref id="B26"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>H.</given-names></name> <name><surname>Ke&#x0161;elj</surname> <given-names>V.</given-names></name></person-group> (<year>2007</year>). <article-title>Combined mining of Web server logs and web contents for classifying user navigation patterns and predicting users&#x2019; future requests.</article-title> <source><italic>Data Knowl. Eng.</italic></source> <volume>61</volume> <fpage>304</fpage>&#x2013;<lpage>330</lpage>. <pub-id pub-id-type="doi">10.1016/j.datak.2006.06.001</pub-id></citation></ref>
<ref id="B27"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lotz</surname> <given-names>C.</given-names></name> <name><surname>Scherer</surname> <given-names>R.</given-names></name> <name><surname>Greiff</surname> <given-names>S.</given-names></name> <name><surname>Sparfeldt</surname> <given-names>J. R.</given-names></name></person-group> (<year>2017</year>). <article-title>Intelligence in action &#x2013; Effective strategic behaviors while solving complex problems.</article-title> <source><italic>Intelligence</italic></source> <volume>64</volume> <fpage>98</fpage>&#x2013;<lpage>112</lpage>. <pub-id pub-id-type="doi">10.1016/j.intell.2017.08.002</pub-id></citation></ref>
<ref id="B28"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Manning</surname> <given-names>C. D.</given-names></name> <name><surname>Sch&#x00FC;tze</surname> <given-names>H.</given-names></name></person-group> (<year>2005</year>). <source><italic>Foundations of Statistical Natural Language Processing.</italic></source> <publisher-loc>Cambridge, Mass</publisher-loc>: <publisher-name>MIT Press</publisher-name>.</citation></ref>
<ref id="B29"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mobasher</surname> <given-names>B.</given-names></name></person-group> (<year>2007</year>). <article-title>&#x201C;Data mining for web personalization,&#x201D; in</article-title> <source><italic>The Adaptive Web. Lecture Notes in Computer Science</italic></source> <volume>Vol. 4321</volume> <role>eds</role> <person-group person-group-type="editor"><name><surname>Brusilovsky</surname> <given-names>P.</given-names></name> <name><surname>Kobsa</surname> <given-names>A.</given-names></name> <name><surname>Nejdl</surname> <given-names>W.</given-names></name></person-group> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>).</citation></ref>
<ref id="B30"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Oakes</surname> <given-names>M.</given-names></name> <name><surname>Gaaizauskas</surname> <given-names>R.</given-names></name> <name><surname>Fowkes</surname> <given-names>H.</given-names></name> <name><surname>Jonsson</surname> <given-names>A.</given-names></name> <name><surname>Wan</surname> <given-names>V.</given-names></name> <name><surname>Beaulieu</surname> <given-names>M.</given-names></name></person-group> (<year>2001</year>). <article-title>&#x201C;A method based on the chi-square test for document classification,&#x201D; in</article-title> <source><italic>Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR &#x2019;01</italic></source> <role>eds</role> <person-group person-group-type="editor"><name><surname>Kraft</surname> <given-names>D. H.</given-names></name> <name><surname>Croft</surname> <given-names>W. B.</given-names></name> <name><surname>Harper</surname> <given-names>D. J.</given-names></name> <name><surname>Zobel</surname> <given-names>J.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM Press</publisher-name>) <fpage>440</fpage>&#x2013;<lpage>441</lpage>. <pub-id pub-id-type="doi">10.1145/383952.384080</pub-id></citation></ref>
<ref id="B31"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>O&#x2019;Neil</surname> <given-names>H. F.</given-names></name> <name><surname>Chuang</surname> <given-names>S.-H.</given-names></name> <name><surname>Chung</surname> <given-names>G. K. W. K.</given-names></name></person-group> (<year>2003</year>). <article-title>Issues in the computer-based assessment of collaborative problem solving.</article-title> <source><italic>Assess. Educ.</italic></source> <volume>10</volume> <fpage>361</fpage>&#x2013;<lpage>373</lpage>. <pub-id pub-id-type="doi">10.1080/0969594032000148190</pub-id></citation></ref>
<ref id="B32"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>R&#x00F6;lke</surname> <given-names>H.</given-names></name></person-group> (<year>2012</year>). <article-title>&#x201C;The item builder: a graphical authoring system for complex item development,&#x201D; in</article-title> <source><italic>Proceedings of the E-Learn 2012&#x2013;World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 1</italic></source> (<publisher-loc>Chesapeake, VA</publisher-loc>: <publisher-name>AACE</publisher-name>) <fpage>344</fpage>&#x2013;<lpage>353</lpage>.</citation></ref>
<ref id="B33"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Skinner</surname> <given-names>B. F.</given-names></name></person-group> (<year>1938</year>). <source><italic>The Behavior of Organisms: An Experimental Analysis.</italic></source> <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Appleton-Century-Crofts</publisher-name>.</citation></ref>
<ref id="B34"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Stadler</surname> <given-names>M.</given-names></name> <name><surname>Niepel</surname> <given-names>C.</given-names></name> <name><surname>Greiff</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>Easily too difficult: estimating item difficulty in computer simulated microworlds.</article-title> <source><italic>Comput. Hum. Behav.</italic></source> <volume>65</volume> <fpage>100</fpage>&#x2013;<lpage>106</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2016.08.025</pub-id></citation></ref>
<ref id="B35"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sweller</surname> <given-names>J.</given-names></name></person-group> (<year>1988</year>). <article-title>Cognitive load during problem solving: effects on learning.</article-title> <source><italic>Cogn. Sci.</italic></source> <volume>12</volume> <fpage>257</fpage>&#x2013;<lpage>285</lpage>. <pub-id pub-id-type="doi">10.1207/s15516709cog1202_4</pub-id></citation></ref>
<ref id="B36"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sweller</surname> <given-names>J.</given-names></name></person-group> (<year>2011</year>). <article-title>&#x201C;Cognitive load theory,&#x201D; in</article-title> <source><italic>The Psychology of Learning and Motivation: v.55. Cognition in Education</italic></source> <volume>Vol. 55</volume> <role>eds</role> <person-group person-group-type="editor"><name><surname>Mestre</surname> <given-names>J. P.</given-names></name> <name><surname>Ross</surname> <given-names>B. H.</given-names></name></person-group> (<publisher-loc>San Diego, CA</publisher-loc>: <publisher-name>Academic Press</publisher-name>) <fpage>37</fpage>&#x2013;<lpage>76</lpage>. <pub-id pub-id-type="doi">10.1016/B978-0-12-387691-1.00002-8</pub-id></citation></ref>
<ref id="B37"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tschirgi</surname> <given-names>J. E.</given-names></name></person-group> (<year>1980</year>). <article-title>Sensible reasoning: a hypothesis about hypotheses.</article-title> <source><italic>Child Dev.</italic></source> <volume>51</volume> <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.2307/1129583</pub-id></citation></ref>
<ref id="B38"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Turner</surname> <given-names>R.</given-names></name> <name><surname>Adams</surname> <given-names>R. J.</given-names></name></person-group> (<year>2007</year>). <article-title>The programme for international student assessment: an overview.</article-title> <source><italic>J. Appl. Meas.</italic></source> <volume>8</volume> <fpage>237</fpage>&#x2013;<lpage>248</lpage>.</citation></ref>
<ref id="B39"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vainikainen</surname> <given-names>M.-P.</given-names></name></person-group> (<year>2014</year>). <source><italic>Finnish Primary School Pupils&#x2019; Performance in Learning to Learn Assessments: A Longitudinal Perspective on Educational Equity.</italic></source> <comment>Report No.</comment> <volume>360</volume> <publisher-loc>Helsinki</publisher-loc>: <publisher-name>Unigrafia</publisher-name>.</citation></ref>
<ref id="B40"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vista</surname> <given-names>A.</given-names></name> <name><surname>Awwal</surname> <given-names>N.</given-names></name> <name><surname>Care</surname> <given-names>E.</given-names></name></person-group> (<year>2016</year>). <article-title>Sequential actions as markers of behavioural and cognitive processes: extracting empirical pathways from data streams of complex tasks.</article-title> <source><italic>Comput. Educ.</italic></source> <volume>9</volume> <fpage>15</fpage>&#x2013;<lpage>36</lpage>. <pub-id pub-id-type="doi">10.1016/j.compedu.2015.10.009</pub-id></citation></ref>
<ref id="B41"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wooldridge</surname> <given-names>A. R.</given-names></name> <name><surname>Carayon</surname> <given-names>P.</given-names></name> <name><surname>Shaffer</surname> <given-names>D. W.</given-names></name> <name><surname>Eagan</surname> <given-names>B.</given-names></name></person-group> (<year>2018</year>). <article-title>Quantifying the qualitative with epistemic network analysis: a human factors case study of task-allocation communication in a primary care team.</article-title> <source><italic>IISE Trans. Healthc. Syst. Eng.</italic></source> <volume>8</volume> <fpage>72</fpage>&#x2013;<lpage>82</lpage>. <pub-id pub-id-type="doi">10.1080/24725579.2017.1418769</pub-id> <pub-id pub-id-type="pmid">30370395</pub-id></citation></ref>
<ref id="B42"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>W&#x00FC;stenberg</surname> <given-names>S.</given-names></name> <name><surname>Greiff</surname> <given-names>S.</given-names></name> <name><surname>Funke</surname> <given-names>J.</given-names></name></person-group> (<year>2012</year>). <article-title>Complex problem solving &#x2014; More than reasoning?</article-title> <source><italic>Intelligence</italic></source> <volume>40</volume> <fpage>1</fpage>&#x2013;<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1016/j.intell.2011.11.003</pub-id></citation></ref>
<ref id="B43"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>W&#x00FC;stenberg</surname> <given-names>S.</given-names></name> <name><surname>Stadler</surname> <given-names>M.</given-names></name> <name><surname>Hautam&#x00E4;ki</surname> <given-names>J.</given-names></name> <name><surname>Greiff</surname> <given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>The role of strategy knowledge for the application of strategies in complex problem solving tasks.</article-title> <source><italic>Technol. Knowl. Learn.</italic></source> <volume>19</volume> <fpage>127</fpage>&#x2013;<lpage>146</lpage>. <pub-id pub-id-type="doi">10.1007/s10758-014-9222-8</pub-id> <pub-id pub-id-type="pmid">29312032</pub-id></citation></ref>
<ref id="B44"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zimmerman</surname> <given-names>C.</given-names></name></person-group> (<year>2000</year>). <article-title>The development of scientific reasoning skills.</article-title> <source><italic>Dev. Rev.</italic></source> <volume>20</volume> <fpage>99</fpage>&#x2013;<lpage>149</lpage>. <pub-id pub-id-type="doi">10.1006/drev.1999.0497</pub-id></citation></ref>
<ref id="B45"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zoanetti</surname> <given-names>N.</given-names></name></person-group> (<year>2010</year>). <article-title>Interactive computer based assessment tasks: how problem-solving process data can inform instruction.</article-title> <source><italic>Australas. J. Educ. Technol.</italic></source> <volume>26</volume> <fpage>585</fpage>&#x2013;<lpage>606</lpage>. <pub-id pub-id-type="doi">10.14742/ajet.1053</pub-id></citation></ref>
<ref id="B46"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zohar</surname> <given-names>A.</given-names></name> <name><surname>Peled</surname> <given-names>B.</given-names></name></person-group> (<year>2008</year>). <article-title>The effects of explicit teaching of metastrategic knowledge on low- and high-achieving students.</article-title> <source><italic>Learn. Instruct.</italic></source> <volume>18</volume> <fpage>337</fpage>&#x2013;<lpage>353</lpage>. <pub-id pub-id-type="doi">10.1016/j.learninstruc.2007.07.001</pub-id></citation></ref>
</ref-list>
<fn-group>
<fn id="fn01"><label>1</label><p><ext-link ext-link-type="uri" xlink:href="http://osf.io/jycku">osf.io/jycku</ext-link></p></fn>
<fn id="fn02"><label>2</label><p><ext-link ext-link-type="uri" xlink:href="http://www.w3.org/XML">http://www.w3.org/XML</ext-link></p></fn>
<fn id="fn03"><label>3</label><p><ext-link ext-link-type="uri" xlink:href="http://www.python.org">www.python.org</ext-link></p></fn>
</fn-group>
</back>
</article>