42 resultados para IT capabilities
em Helda - Digital Repository of University of Helsinki
Resumo:
The main focus of the research is on the genealogy of women's same-sex fornication in Finnish criminal law from 1889/1894 to 1971. Why were women included in the concept of same-sex fornication in Finland and why, where, and when was the law put into effect? Which women were tried, how did the trial proceedings evolve, and what kind of effects did the trials have afterwards? Which concepts were used? These questions have been approached through the analysis of the Finnish Penal Code, the criminal law science and four trial proceedings in Eastern Finland during the 1950s. The research draws on the epistemology of the closet and the concept of heteronormativity adapted from queer theories. It is method critical in utilising ethnography, micro history and feminist ethical self-reflection. The research consists of six scientific refereed articles (see appendix) and of a theoretical introduction. The main results of the research are: 1) The genealogy of Finnish decency [Sittlichkeit] can not be researched without oral histories, due to the late modernisation of Finnish society and the legal system, which does not follow the pattern of English, French and German societies. 2) The inclusion of women's same-sex fornication in the Finnish Penal Code is not incomprehensible when compared to the early modern European legislations and court practices. Women have been punished for the sins of Sodom, though not directly under the 1734 Swedish law. 3) Fornication and decency were ambivalent concepts in the 1889/1894 law, and juridical authorities offered controversial interpretations of them during the late 19th and early 20th centuries. 4) A peak in women's convictions occurred in the 1950s, and most of the trial proceedings took place in rural Eastern Finland. Neither the state nor the police were active in prosecuting; instead, the trial proceedings began "by accident". 5) From 1940 to 1960 police training lacked instructions concerning the interrogation of women suspected of same-sex fornication. 6) The figure of the penitent woman was produced in the chiasmic encounter of confession and police interrogation which moulded and was moulded by the epistemological matrix of shame, honour, and decency. Women's speech acts were judicialised as confessions which enabled the disciplinary tampering with the women's bodies. 7) Gender and personality, more than sexuality, or "criminality" defined the status of the convicted women in their village communities after the trials. 8) Relations between police training, sexuality, and decency have not been well researched in Finland. 9) Decriminalisation in 1971 did not mark the end of homophobic legal discourse, even though the 1999 reform of sexual crimes took the form of gender neutral conceptualisation
Resumo:
This study examined year seven students´ proactive coping, self-efficacy and social support seeking. Proactive coping was defined as a behaviour where obstacles are seen as a challenge. In proactive coping, individuals set goals, build up resources and regulate their behaviour to achieve the goals. Self-efficacy can be seen as people’s beliefs about their capabilities. Social support seeking was divided into instrumental support seeking and emotional support seeking. According to the theoretical frame of this study self-efficacy and social support seeking were seen as resources to proactive coping (Greenglass 2002). The participants were 445 year seven students (Mo= 13 years) from seven secondary schools. The data was collected in March-May 2008. The survey consisted 37 Likert-scaled items from the Proactive Coping Inventory and from the General Self-Efficacy Scale. The survey consisted of four scales: Proactive Coping, Instrumental Support Seeking, Emotional Support Seeking and General Self-Efficacy. The participants' age, gender and studying in specialist streams were asked as background information. As a result, most of the participants (62 % girls, 38 % boys) reported fairly strong proactive coping: they can see obstacles as a challenge and they set goals and regulate their behaviour to achieve the goals. Most of the participants reported that they seek instrumental and emotional support when having troubles. Girls reported more social support seeking than did boys and the mean difference was statistically significant. Most of the participants had fairly high sense of self-efficacy. However, 4 % of the participants reported that they don’t believe in their capabilities. Some of these participants reported that they neither use proactive coping nor seek informational or emotional support when having troubles. Proactive coping correlated positively with self-efficacy and with social support seeking. In this study self-efficacy and social support seeking explained 47 % of proactive coping. It was discussed that children’s high sense of self-efficacy and social relationships can act as protective factors in transition to secondary school. When supporting children’s self-efficacy and social relationships one also assists children’s proactive coping. Proactive coping can be seen to support children’s personal growth.
Resumo:
The study concentrated on interdisciplinary teamwork of students in Helsinki University Department of Education and Helsinki University of Technology. Students worked in small interdisciplinary groups (n 12) to plan and teach in an information- and communication technology (ICT) club in elementary schools. The focus of the study was co-operation in the student groups and students learning experiences. Theoretical background of the study consists of theories of collaboration and socially shared cognition. Study was an qualitative case study and the data was collected with individual focus interviews and learning diaries. The data was categorised and the connections between categories were analysed with a table. Shared cognition appeared as a form of distribution of tasks and in the actual processes of shared expertise. The tasks were shared according to students expertise. Processes of shared expertise were joint knowledge building, integration of interests, awareness and exploitation of others expertise and allowing freedom for others to use their expertise. Additionally expression of ones own views and setting an example to others were one sided sharing of expertise. Students of technology were responsible of technical issues and the responsibility sphere of educational science students was more fragmented. For instance they concentrated in taking children s abilities into consideration. The sphere of shared cognition included also the need for tutoring and learning from others. Usually students did not directly learn from representative of other discipline, instead the learning for instance of social skills happened indirectly. Learning was fostered if learning was set as a goal and prevented if the differences in expertise were too minor. Sharing of cognition was prevented if co-operation was too problematic. Co-operation was usually successful. Good planning, good person chemistry and appreciation of expertise of others promoted success. Problems caused by different backgrounds were usually slight. Successful interaction was complementary and equal. Groups were usually able to circumvent problems in communication and use of justification in discussion promoted co-operation. When comparing the groups in the scope of the study, two were found to be notably opposed and the other groups located between these extreme cases, but the elements of success prevailed. Learning experiences concentrated on social skills, project management, school world and ICT. Essential was achieved field experience and observation of ones own capabilities. In organisation of student interdisciplinary co-operation is important to ensure sufficient differences in expertise and guide students to gain complementary interaction and appropriate setting of goals. Interdisciplinary field project prepared students to face the demands of
Resumo:
This study examines Finnish student teachers' images of The Middle East conflict and its parties and medias' influence on these images. The research problems are 1) how student teachers understand the Middle East as a geographical and a cultural area 2) what kind of conceptions they have of the Middle East conflict and its parties; Israelis, Palestinians and Arabs and societies and religions closely connected to them and 3) how the media has influenced on these conceptions. Theoretical background of this study concerns with different mental images, their construction and meaning, stereotypes, intercultural competence, media and its influence as well as media literacy. The methods used in this study were survey and theme interview. Also headlines of the news were analysed. The survey was directed at student teachers of the University of Helsinki (n = 75). Six of them were interviewed. The survey was conducted in February and interviews were made in the turn of May and June 2003. The headlines analysed dealt with the Middle East conflict in the newspaper "Helsingin Sanomat" in January, April and July 2003. Main results: Images of the Middle East area differed largely from respondent to another. Student teachers didn't know much about the Middle East conflict. Stereotypes occurred in the conceptions connected to the parties of the conflict. Stereotypes appeared especially in the negative conceptions of islam and muslims and one-sided conceptions of Arabs. The influence of the conflict was noticeable in conceptions related to Israelis, Israel and Palestinians. Palestinians were sympathized. Attitudes towards Israelis, Palestinians and Arabs were negative to some extend and their societies were not valued very equal, open or modern. On the basis of the research, student teachers' intercultural competence was not good enough. Media had influence on the conceptions. Also skills in critical use of media varied largely. Some trusted strongly in the objectivity of a picture and the news. It can be argued, on the grounds of the results, that teacher education should concentrate more on themes of intercultural competence and media literacy. These two are interrelated and are both needed in understanding and conceptualising the world.
Resumo:
The purpose of this study was to extend understanding of how large firms pursuing sustained and profitable growth manage organisational renewal. A multiple-case study was conducted in 27 North American and European wood-industry companies, of which 11 were chosen for closer study. The study combined the organisational-capabilities approach to strategic management with corporate-entrepreneurship thinking. It charted the further development of an identification and classification system for capabilities comprising three dimensions: (i) the dynamism between firm-specific and industry-significant capabilities, (ii) hierarchies of capabilities and capability portfolios, and (iii) their internal structure. Capability building was analysed in the context of the organisational design, the technological systems and the type of resource-bundling process (creating new vs. entrenching existing capabilities). The thesis describes the current capability portfolios and the organisational changes in the case companies. It also clarifies the mechanisms through which companies can influence the balance between knowledge search and the efficiency of knowledge transfer and integration in their daily business activities, and consequently the diversity of their capability portfolio and the breadth and novelty of their product/service range. The largest wood-industry companies of today must develop a seemingly dual strategic focus: they have to combine leading-edge, innovative solutions with cost-efficient, large-scale production. The use of modern technology in production was no longer a primary source of competitiveness in the case companies, but rather belonged to the portfolio of basic capabilities. Knowledge and information management had become an industry imperative, on a par with cost effectiveness. Yet, during the period of this research, the case companies were better in supporting growth in volume of the existing activity than growth through new economic activities. Customer-driven, incremental innovation was preferred over firm-driven innovation through experimentation. The three main constraints on organisational renewal were the lack of slack resources, the aim for lean, centralised designs, and the inward-bound communication climate.
Resumo:
A View into the World of Kitchen: Development and retention of a leading position in the market of kitchen interiors - a case study of 20 years. This study focuses on the development of a kitchen interiors company, presently called Novart Inc., into the leading company of the industry from 1980´s to the present. The objective of the study is to describe the effects of strategic choices, the decisions of the management and the owner´s direction and control to the build up and the retaining of the leading position in the market. From theory point of view, strategic choices refer to com-pany purchases as corporate-level strategies, and business and marketing strategies. The empirical research was carried out in two phases and it is based on various company documents and records, and on the intensive interviews of seven key executives in the company. An abductive research design was utilized. The company gained the leading position in the kitchen market in Finland by company purchases, and the company has been able to retain the position. Firstly the goal was to expand to retail market and, secondly, the company has maintained the balance of supply and demand by closing the purchased production units when needed. The simultaneous use of these two strategic goals is a kind of a new observation, and the strategy may be suitable only for market leaders. During the latter part of the research period the strategy of com-pany purchases has been abandoned and the leading position in the market has been main-tained by developing systematically business and marketing capability. In the business and marketing strategies the distribution channels and the brands have been emphasized. During the research period the company has almost totally abandoned the long distribution channels and started to use its own channels built and named after the main brands. These are A la Carte, Parma and Petra. At the moment, in the beginning of the 21st century, a new distribution channel, the concept of the Kitchen World, is being built in addition to the channels mentioned above. The management´s decision making and the implementation the decisions have been well-considered. The executives emphasized the valuing of the importance of the decisions dif-ferently except the two decisions named the most important ones, i.e., the decisions to start own production of the raw material and to concentrate the business only to one company. The executive staff has also succeeded in managing crisis and threats of bankruptcy, and the company has been managed profitable. During all the four terms of ownership: Puolimatka Corporation, the Hankkija/Novera Corporation, the ownership period of the "bank", and the Nobia Corporate the ownership direction and control has been somewhat different. All the owners have paid attention to economic issues. The direction of cash flows and investments was at its strongest during the Hankkija/Novera term. For the last owner Nobia the production and marketing of the kitchen interiors has been the core business, which thus has strengthened the business and marketing capabilities of the target company of this research. A common denominator during all the four terms of ownership has been owners' trust gained by the professional skills of the management of the target company. This has lead to greater independence of the management of the company and less owners´ direction. Keywords: leading position, marketing strategy, management decisions, acquisition, corporate governance
Resumo:
The molecular level structure of mixtures of water and alcohols is very complicated and has been under intense research in the recent past. Both experimental and computational methods have been used in the studies. One method for studying the intra- and intermolecular bindings in the mixtures is the use of the so called difference Compton profiles, which are a way to obtain information about changes in the electron wave functions. In the process of Compton scattering a photon scatters inelastically from an electron. The Compton profile that is obtained from the electron wave functions is directly proportional to the probability of photon scattering at a given energy to a given solid angle. In this work we develop a method to compute Compton profiles numerically for mixtures of liquids. In order to obtain the electronic wave functions necessary to calculate the Compton profiles we need some statistical information about atomic coordinates. Acquiring this using ab-initio molecular dynamics is beyond our computational capabilities and therefore we use classical molecular dynamics to model the movement of atoms in the mixture. We discuss the validity of the chosen method in view of the results obtained from the simulations. There are some difficulties in using classical molecular dynamics for the quantum mechanical calculations, but these can possibly be overcome by parameter tuning. According to the calculations clear differences can be seen in the Compton profiles of different mixtures. This prediction needs to be tested in experiments in order to find out whether the approximations made are valid.
Resumo:
Sensor networks represent an attractive tool to observe the physical world. Networks of tiny sensors can be used to detect a fire in a forest, to monitor the level of pollution in a river, or to check on the structural integrity of a bridge. Application-specific deployments of static-sensor networks have been widely investigated. Commonly, these networks involve a centralized data-collection point and no sharing of data outside the organization that owns it. Although this approach can accommodate many application scenarios, it significantly deviates from the pervasive computing vision of ubiquitous sensing where user applications seamlessly access anytime, anywhere data produced by sensors embedded in the surroundings. With the ubiquity and ever-increasing capabilities of mobile devices, urban environments can help give substance to the ubiquitous sensing vision through Urbanets, spontaneously created urban networks. Urbanets consist of mobile multi-sensor devices, such as smart phones and vehicular systems, public sensor networks deployed by municipalities, and individual sensors incorporated in buildings, roads, or daily artifacts. My thesis is that "multi-sensor mobile devices can be successfully programmed to become the underpinning elements of an open, infrastructure-less, distributed sensing platform that can bring sensor data out of their traditional close-loop networks into everyday urban applications". Urbanets can support a variety of services ranging from emergency and surveillance to tourist guidance and entertainment. For instance, cars can be used to provide traffic information services to alert drivers to upcoming traffic jams, and phones to provide shopping recommender services to inform users of special offers at the mall. Urbanets cannot be programmed using traditional distributed computing models, which assume underlying networks with functionally homogeneous nodes, stable configurations, and known delays. Conversely, Urbanets have functionally heterogeneous nodes, volatile configurations, and unknown delays. Instead, solutions developed for sensor networks and mobile ad hoc networks can be leveraged to provide novel architectures that address Urbanet-specific requirements, while providing useful abstractions that hide the network complexity from the programmer. This dissertation presents two middleware architectures that can support mobile sensing applications in Urbanets. Contory offers a declarative programming model that views Urbanets as a distributed sensor database and exposes an SQL-like interface to developers. Context-aware Migratory Services provides a client-server paradigm, where services are capable of migrating to different nodes in the network in order to maintain a continuous and semantically correct interaction with clients. Compared to previous approaches to supporting mobile sensing urban applications, our architectures are entirely distributed and do not assume constant availability of Internet connectivity. In addition, they allow on-demand collection of sensor data with the accuracy and at the frequency required by every application. These architectures have been implemented in Java and tested on smart phones. They have proved successful in supporting several prototype applications and experimental results obtained in ad hoc networks of phones have demonstrated their feasibility with reasonable performance in terms of latency, memory, and energy consumption.
Resumo:
In recent years, XML has been widely adopted as a universal format for structured data. A variety of XML-based systems have emerged, most prominently SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This popularity is helped by the excellent support for XML processing in many programming languages and by the variety of XML-based technologies for more complex needs of applications. Concurrently with this rise of XML, there has also been a qualitative expansion of the Internet's scope. Namely, mobile devices are becoming capable enough to be full-fledged members of various distributed systems. Such devices are battery-powered, their network connections are based on wireless technologies, and their processing capabilities are typically much lower than those of stationary computers. This dissertation presents work performed to try to reconcile these two developments. XML as a highly redundant text-based format is not obviously suitable for mobile devices that need to avoid extraneous processing and communication. Furthermore, the protocols and systems commonly used in XML messaging are often designed for fixed networks and may make assumptions that do not hold in wireless environments. This work identifies four areas of improvement in XML messaging systems: the programming interfaces to the system itself and to XML processing, the serialization format used for the messages, and the protocol used to transmit the messages. We show a complete system that improves the overall performance of XML messaging through consideration of these areas. The work is centered on actually implementing the proposals in a form usable on real mobile devices. The experimentation is performed on actual devices and real networks using the messaging system implemented as a part of this work. The experimentation is extensive and, due to using several different devices, also provides a glimpse of what the performance of these systems may look like in the future.
Resumo:
Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.
Resumo:
Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.
Resumo:
The mobile phone has, as a device, taken the world by storm in the past decade; from only 136 million phones globally in 1996, it is now estimated that by the end of 2008 roughly half of the worlds population will own a mobile phone. Over the years, the capabilities of the phones as well as the networks have increased tremendously, reaching the point where the devices are better called miniature computers rather than simply mobile phones. The mobile industry is currently undertaking several initiatives of developing new generations of mobile network technologies; technologies that to a large extent focus at offering ever-increasing data rates. This thesis seeks to answer the question of whether the future mobile networks in development and the future mobile services are in sync; taking a forward-looking timeframe of five to eight years into the future, will there be services that will need the high-performance new networks being planned? The question is seen to be especially pertinent in light of slower-than-expected takeoff of 3G data services. Current and future mobile services are analyzed from two viewpoints; first, looking at the gradual, evolutionary development of the services and second, through seeking to identify potential revolutionary new mobile services. With information on both current and future mobile networks as well as services, a network capability - service requirements mapping is performed to identify which services will work in which networks. Based on the analysis, it is far from certain whether the new mobile networks, especially those planned for deployment after HSPA, will be needed as soon as they are being currently roadmapped. The true service-based demand for the "beyond HSPA" technologies may be many years into the future - or, indeed, may never materialize thanks to the increasing deployment of local area wireless broadband technologies.
Resumo:
Delay and disruption tolerant networks (DTNs) are computer networks where round trip delays and error rates are high and disconnections frequent. Examples of these extreme networks are space communications, sensor networks, connecting rural villages to the Internet and even interconnecting commodity portable wireless devices and mobile phones. Basic elements of delay tolerant networks are a store-and-forward message transfer resembling traditional mail delivery, an opportunistic and intermittent routing, and an extensible cross-region resource naming service. Individual nodes of the network take an active part in routing the traffic and provide in-network data storage for application data that flows through the network. Application architecture for delay tolerant networks differs also from those used in traditional networks. It has become feasible to design applications that are network-aware and opportunistic, taking an advantage of different network connection speeds and capabilities. This might change some of the basic paradigms of network application design. DTN protocols will also support in designing applications which depend on processes to be persistent over reboots and power failures. DTN protocols could also be applicable to traditional networks in cases where high tolerance to delays or errors would be desired. It is apparent that challenged networks also challenge the traditional strictly layered model of network application design. This thesis provides an extensive introduction to delay tolerant networking concepts and applications. Most attention is given to challenging problems of routing and application architecture. Finally, future prospects of DTN applications and implementations are envisioned through recent research results and an interview with an active researcher of DTN networks.
Resumo:
One of the most tangled fields of research is the field of defining and modeling affective concepts, i. e. concepts regarding emotions and feelings. The subject can be approached from many disciplines. The main problem is lack of generally approved definitions. However, e.g. linguists have recently started to check the consistency of their theories with the help of computer simulations. Definitions of affective concepts are needed for performing similar simulations in behavioral sciences. In this thesis, preliminary computational definitions of affects for a simple utility-maximizing agent are given. The definitions have been produced by synthetizing ideas from theories from several fields of research. The class of affects is defined as a superclass of emotions and feelings. Affect is defined as a process, in which a change in an agent's expected utility causes a bodily change. If the process is currently under the attention of the agent (i.e. the agent is conscious of it), the process is a feeling. If it is not, but can in principle be taken into attention (i.e. it is preconscious), the process is an emotion. Thus, affects do not presuppose consciousness, but emotions and affects do. Affects directed at unexpected materialized (i.e. past) events are delight and fright. Delight is the consequence of an unexpected positive event and fright is the consequence of an unexpected negative event. Affects directed at expected materialized (i.e. past) events are happiness (expected positive event materialized), disappointment (expected positive event did not materialize), sadness (expected negative event materialized) and relief (expected negative event did not materialize). Affects directed at expected unrealized (i.e. future) events are fear and hope. Some other affects can be defined as directed towards originators of the events. The affect classification has also been implemented as a computer program, the purpose of which is to ensure the coherence of the definitions and also to illustrate the capabilities of the model. The exact content of bodily changes associated with specific affects is not considered relevant from the point of view of the logical structure of affective phenomena. The utility function need also not be defined, since the target of examination is only its dynamics.