865 resultados para context-aware access control


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The provision of Internet access to large numbers has traditionally been under the control of operators, who have built closed access networks for connecting customers. As the access network (i.e. the last mile to the customer) is generally the most expensive part of the network because of the vast amount of cable required, many operators have been reluctant to build access networks in rural areas. There are problems also in urban areas, as incumbent operators may use various tactics to make it difficult for competitors to enter the market. Open access networking, where the goal is to connect multiple operators and other types of service providers to a shared network, changes the way in which networks are used. This change in network structure dismantles vertical integration in service provision and enables true competition as no service provider can prevent others fromcompeting in the open access network. This thesis describes the development from traditional closed access networks towards open access networking and analyses different types of open access solution. The thesis introduces a new open access network approach (The Lappeenranta Model) in greater detail. The Lappeenranta Model is compared to other types of open access networks. The thesis shows that end users and service providers see local open access and services as beneficial. In addition, the thesis discusses open access networking in a multidisciplinary fashion, focusing on the real-world challenges of open access networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the context of the evidence-based practices movement, the emphasis on computing effect sizes and combining them via meta-analysis does not preclude the demonstration of functional relations. For the latter aim, we propose to augment the visual analysis to add consistency to the decisions made on the existence of a functional relation without losing sight of the need for a methodological evaluation of what stimuli and reinforcement or punishment are used to control the behavior. Four options for quantification are reviewed, illustrated, and tested with simulated data. These quantifications include comparing the projected baseline with the actual treatment measurements, on the basis of either parametric or nonparametric statistics. The simulated data used to test the quantifications include nine data patterns in terms of the presence and type of effect and comprising ABAB and multiple baseline designs. Although none of the techniques is completely flawless in terms of detecting a functional relation only when it is present but not when it is absent, an option based on projecting split-middle trend and considering data variability as in exploratory data analysis proves to be the best performer for most data patterns. We suggest that the information on whether a functional relation has been demonstrated should be included in meta-analyses. It is also possible to use as a weight the inverse of the data variability measure used in the quantification for assessing the functional relation. We offer an easy to use code for open-source software for implementing some of the quantifications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

L’aplicació de tècniques respiromètriques és de recent innovació dins l’estudi dels tractaments d’aigües residuals. Aquest conjunt de tècniques ens permeten analitzar dos processos importants dins una planta de tractament biològic: el creixement de la biomassa i el consum del substrat. Això fa que siguin una eina amb gran potencial en l’avaluació dels sistemes de tractament biològic d’aigües residuals. L’objectiu principal d’aquest treball es la realització d’una aplicació capaç de controlar el funcionament de 6 respiròmetres, gestionant el procés del mostreig de les respirometries i l’anàlisi de les dades obtingudes, per obtenir el substrat ràpidament biodegradable (Ss) per a mostres d’aigua residual, i la taxa màxima de creixement específic per a mostres de compost. L’aplicació s’ha desenvolupat sobre l’entorn Microsoft Access, on s’integren la base de dades amb les mostres i els resultats de les respirometries, i els formularis de control que ens permeten gestionar i controlar els processos de mostreig i anàlisi. L’aplicació es comunica amb els sensors i actuadors dels respiròmetres a través del control ActiveX, ADS-OCX, subministrat per TwinCAT, que ens permet capturar les lectures dels sensors i controlar el funcionament dels actuadors. Aquests elements estan connectats a mòduls descentralitzats d’entrades i sortides, comunicats mitjançant el bus Ethernet amb el PC-Industrial, on s’executa l’aplicació. Un cop finalitzada l’aplicació, aquesta controla correctament el mostreig de les respirometries, registrant les lectures de les sondes a la base de dades i controlant l’activació de les vàlvules del respiròmetre. Partint de les mostres obtingudes, o de respirometries externes, importades des de Microsoft Excel, s’ha comprovat el correcte funcionament en el càlcul del substrat ràpidament biodegradable (Ss) i la taxa màxima de creixement específic. Amb l’aplicació desenvolupada, s’ha comprovat el funcionament i les possibilitats que ens ofereix TwinCAT alhora de controlar mòduls d’entrades i sortides, així com la seva comunicació amb aplicacions com Microsoft Access. Això pot afavorir a la utilització d’aquest tipus de tecnologia, per aplicacions futures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the past decade, organizations worldwide have begun to widely adopt agile software development practices, which offer greater flexibility to frequently changing business requirements, better cost effectiveness due to minimization of waste, faster time-to-market, and closer collaboration between business and IT. At the same time, IT services are continuing to be increasingly outsourced to third parties providing the organizations with the ability to focus on their core capabilities as well as to take advantage of better demand scalability, access to specialized skills, and cost benefits. An output-based pricing model, where the customers pay directly for the functionality that was delivered rather than the effort spent, is quickly becoming a new trend in IT outsourcing allowing to transfer the risk away from the customer while at the same time offering much better incentives for the supplier to optimize processes and improve efficiency, and consequently producing a true win-win outcome. Despite the widespread adoption of both agile practices and output-based outsourcing, there is little formal research available on how the two can be effectively combined in practice. Moreover, little practical guidance exists on how companies can measure the performance of their agile projects, which are being delivered in an output-based outsourced environment. This research attempted to shed light on this issue by developing a practical project monitoring framework which may be readily applied by organizations to monitor the performance of agile projects in an output-based outsourcing context, thus taking advantage of the combined benefits of such an arrangement Modified from action research approach, this research was divided into two cycles, each consisting of the Identification, Analysis, Verification, and Conclusion phases. During Cycle 1, a list of six Key Performance Indicators (KPIs) was proposed and accepted by the professionals in the studied multinational organization, which formed the core of the proposed framework and answered the first research sub-question of what needs to be measured. In Cycle 2, a more in-depth analysis was provided for each of the suggested Key Performance Indicators including the techniques for capturing, calculating, and evaluating the information provided by each KPI. In the course of Cycle 2, the second research sub-question was answered, clarifying how the data for each KPI needed to be measured, interpreted, and acted upon. Consequently, after two incremental research cycles, the primary research question was answered describing the practical framework that may be used for monitoring the performance of agile IT projects delivered in an output-based outsourcing context. This framework was evaluated by the professionals within the context of the studied organization and received positive feedback across all four evaluation criteria set forth in this research, including the low overhead of data collection, high value of provided information, ease of understandability of the metric dashboard, and high generalizability of the proposed framework.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Travel and Tourism field is undergoing changes due to the rapid development of information technology and digital services. Online travel has profoundly changed the way travel and tourism organizations interact with their customers. Mobile technology such as mobile services for pocket devices (e.g. mobile phones) has the potential to take this development even further. Nevertheless, many issues have been highlighted since the early days of mobile services development (e.g. the lack of relevance, ease of use of many services). However, the wide adoption of smartphones and the mobile Internet in many countries as well as the formation of so-called ecosystems between vendors of mobile technology indicate that many of these issues have been overcome. Also when looking at the numbers of downloaded applications related to travel in application stores like Google Play, it seems obvious that mobile travel and tourism services are adopted and used by many individuals. However, as business is expected to start booming in the mobile era, many issues have a tendency to be overlooked. Travelers are generally on the go and thus services that work effectively in mobile settings (e.g. during a trip) are essential. Hence, the individuals’ perceived drivers and barriers to use mobile travel and tourism services in on-site or during trip settings seem particularly valuable to understand; thus this is one primary aim of the thesis. We are, however, also interested in understanding different types of mobile travel service users. Individuals may indeed be very different in their propensity to adopt and use technology based innovations (services). Research is also switching more from investigating issues of mobile service development to understanding individuals’ usage patterns of mobile services. But designing new mobile services may be a complex matter from a service provider perspective. Hence, our secondary aim is to provide insights into drivers and barriers of mobile travel and tourism service development from a holistic business model perspective. To accomplish the research objectives seven different studies have been conducted over a time period from 2002 – 2013. The studies are founded on and contribute to theories within diffusion of innovations, technology acceptance, value creation, user experience and business model development. Several different research methods are utilized: surveys, field and laboratory experiments and action research. The findings suggest that a successful mobile travel and tourism service is a service which supports one or several mobile motives (needs) of individuals such as spontaneous needs, time-critical arrangements, efficiency ambitions, mobility related needs (location features) and entertainment needs. The service could be customized to support travelers’ style of traveling (e.g. organized travel or independent travel) and should be easy to use, especially easy to take into use (access, install and learn) during a trip, without causing security concerns and/or financial risks for the user. In fact, the findings suggest that the most prominent barrier to the use of mobile travel and tourism services during a trip is an individual’s perceived financial cost (entry costs and usage costs). It should, however, be noted that regulations are put in place in the EU regarding data roaming prices between European countries and national telecom operators are starting to see ‘international data subscriptions’ as a sales advantage (e.g. Finnish Sonera provides a data subscription in the Baltic and Nordic region at the same price as in Finland), which will enhance the adoption of mobile travel and tourism services also in international contexts. In order to speed up the adoption rate travel service providers could consider e.g. more local initiatives of free Wi-Fi networks, development of services that can be used, at least to some extent, in an offline mode (do not require costly network access during a trip) and cooperation with telecom operators (e.g. lower usage costs for travelers who use specific mobile services or travel with specific vendors). Furthermore, based on a developed framework for user experience of mobile trip arrangements, the results show that a well-designed mobile site and/or native application, which preferably supports integration with other mobile services, is a must for true mobile presence. In fact, travel service providers who want to build a relationship with their customers need to consider a downloadable native application, but in order to be found through the mobile channel and make contact with potential new customers, a mobile website should be available. Moreover, we have made a first attempt with cluster analysis to identify user categories of mobile services in a travel and tourism context. The following four categories were identified: info-seekers, checkers, bookers and all-rounders. For example “all-rounders”, represented primarily by individuals who use their pocket device for almost any of the investigated mobile travel services, constituted primarily of 23 to 50 year old males with high travel frequency and great online experience. The results also indicate that travel service providers will increasingly become multi-channel providers. To manage multiple online channels, closely integrated and hybrid online platforms for different devices, supporting all steps in a traveler process should be considered. It could be useful for travel service providers to focus more on developing browser-based mobile services (HTML5-solutions) than native applications that work only with specific operating systems and for specific devices. Based on an action research study and utilizing a holistic business model framework called STOF we found that HTML5 as an emerging platform, at least for now, has some limitations regarding the development of the user experience and monetizing the application. In fact, a native application store (e.g. Google Play) may be a key mediator in the adoption of mobile travel and tourism services both from a traveler and a service provider perspective. Moreover, it must be remembered that many device and mobile operating system developers want service providers to specifically create services for their platforms and see native applications as a strategic advantage to sell more devices of a certain kind. The mobile telecom industry has moved into a battle of ecosystems where device makers, developers of operating systems and service developers are to some extent forced to choose their development platforms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Väisälän palkinnon 2012 saaja.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Presentation at the Nordic Perspectives on Open Access and Open Science seminar, Helsinki, October 15, 2013

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Advancements in IC processing technology has led to the innovation and growth happening in the consumer electronics sector and the evolution of the IT infrastructure supporting this exponential growth. One of the most difficult obstacles to this growth is the removal of large amount of heatgenerated by the processing and communicating nodes on the system. The scaling down of technology and the increase in power density is posing a direct and consequential effect on the rise in temperature. This has resulted in the increase in cooling budgets, and affects both the life-time reliability and performance of the system. Hence, reducing on-chip temperatures has become a major design concern for modern microprocessors. This dissertation addresses the thermal challenges at different levels for both 2D planer and 3D stacked systems. It proposes a self-timed thermal monitoring strategy based on the liberal use of on-chip thermal sensors. This makes use of noise variation tolerant and leakage current based thermal sensing for monitoring purposes. In order to study thermal management issues from early design stages, accurate thermal modeling and analysis at design time is essential. In this regard, spatial temperature profile of the global Cu nanowire for on-chip interconnects has been analyzed. It presents a 3D thermal model of a multicore system in order to investigate the effects of hotspots and the placement of silicon die layers, on the thermal performance of a modern ip-chip package. For a 3D stacked system, the primary design goal is to maximise the performance within the given power and thermal envelopes. Hence, a thermally efficient routing strategy for 3D NoC-Bus hybrid architectures has been proposed to mitigate on-chip temperatures by herding most of the switching activity to the die which is closer to heat sink. Finally, an exploration of various thermal-aware placement approaches for both the 2D and 3D stacked systems has been presented. Various thermal models have been developed and thermal control metrics have been extracted. An efficient thermal-aware application mapping algorithm for a 2D NoC has been presented. It has been shown that the proposed mapping algorithm reduces the effective area reeling under high temperatures when compared to the state of the art.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Online sexual solicitation (solicitation) of youth has received widespread media and research attention during the last decade. The prevalence rates of youth who have experienced solicitation or solicitation attempts vary between studies depending on the methodology used (e.g., whether youth or adults are the target study group). In studies focusing on youth victims, the prevalence of solicitation attempts made by adults during the past year is typically reported to be between 5 and 9%. Adults who solicit youth online have been found to use deception and other manipulative behaviors to gain access to sexual activities with youth. However, previous studies have lacked a control group of adults who solicit other adults online. Without this comparison, one could argue that deceiving others online about one’s identity, and engaging in manipulative behaviors, is an inherent part of most online sexual interactions with strangers. Additionally, little is known about the associations between manipulative behaviors and the solicitation outcomes. In research concerning offline sexual behaviors, it has been noted that situational factors, such as sexual arousal, may alter both sexual interest and behavior. The effects of situational factors on online sexual behaviors have been less extensively studied (especially so with a quantitative approach); no studies have to date focused on adults’ solicitation of youth. Investigating the role of a lowered sexual age preference and the role of situational factors in the soliciting adults could be an important step in order to receive deeper knowledge of the role of traits and states in the context of solicitation. Additionally, there is a lack of knowledge of the effect of the age of the youth. Although previous studies on solicitation has found that older youth, compared with younger youth and children, are more often solicited, the possible reasons for this have not been investigated. Are adults who solicit youth affected by legal deterrence (through the legal age of consent), is it because older youth are more available online, or are the adults’ age preferences merely a product of a normally distributed age preference in the population? The purpose of the present thesis was fivefold: 1) to obtain an estimate of the frequency of adults’ solicitation of youth as self-reported and observed in actual behavior; 2) to explore whether the legal age of consent (LAC) affects solicitation frequency, or whether a normally distributed sexual age preference more accurately describe the proportion of solicited youth of different ages; 3) to investigate the associations of both traits (e.g., lower sexual age preference) and states (immediate situational factors, such as alcohol intoxication), and the solicitation target; 4) to explore whether adults who solicit youth and adults who solicit adults are equally deceitful and manipulative online, and whether the different solicitation outcomes are as common in both groups; and 5) to investigate whether the deceitful and manipulative behaviors engaged in had different associations with the solicitation outcomes depending on the age of the solicited. In the survey study, a convenience sample of 1393 adult participants (aged 18 years or older) self-reported any online communication with strangers during the past year. Of these, 56% (776 respondents) reported that they had solicited or attempted to solicit at least one stranger. Of the respondents, 453 (58.4%) were men, and 323 (41.6%) were women. Participants with only adult contacts (18 years or older) constituted the majority (640 respondents). In contrast, 136 individuals reported a youth contact (a 13 year old or younger, or a 14 to 17-year old). Approximately half of the participants were men in the adult contact group, while 75% of the participants were men in the youth contact group. Approximately 60% of the participants with youth contacts were recruited from two websites associated with a pedophilic sexual interest. In an online quasi-experimental study, with researchers impersonating youth of different ages (10–18 year olds) in chat rooms, 251 online conversations with chat room visitors made up the entire sample. All chat room visitors alleged to be men. The self-reported frequency of having solicited youth (0–17-year olds) during the past year was approximately 10% in our sample of adults who reported communicating with any strangers online. When we observed this behavior in chat rooms, we found that approximately 30% of the chat room visitors who believed they interacted with a 10 to 14 year old attempted to solicit the youth. We found that solicitation attempts increased equally much when increasing the age of the impersonated youth from 14 to 16, as from 16 to 18. Thus, we concluded that a normally distributed age preference in the population was a more plausible explanation to the effect of the age of the solicited, rather than the LAC (here; 15 and 16). If the chat room visitors would have been deterred only by the LAC, we would have expected that the change in amount of solicitation attempts from an illegal age group to a legal age group would have been significantly stronger than changes between age groups within illegal-illegal and legal-legal groups. Our subsample of survey participants from the pedophilia-related websites expectedly reported that they had solicited youth more often in comparison to the sample gathered through general (i.e., not associated with any particular sexual preference) websites. We also found that participants with a youth contact reported higher levels of sexual arousal and shame before the sexual interaction with their online contact, compared with participants with an adult contact. Additionally, the participants with youth contacts who reported consumption of child- and adolescent pornography also reported being more sexually aroused before the interaction, compared to the participants with youth contacts who did not report consumption of these kinds of pornography. We also found clear indications that the online sexual interaction had an alleviatory effect on reported levels of sadness, boredom and stress, independent of the age of the contact. Generally, the participants with youth and adult contacts reported deceiving their contacts as often and suggesting keeping the communication a secret from someone as often. Participants with a youth contact, however, reported using more persuasion techniques for online sexual purposes or for the purpose of an offline meeting, compared to those with an adult contact. In the chat rooms, we found that more indirect ways of future sexual communication (e.g., continuing chatting) was suggested by the chat room visitors that were under the assumption of interacting with youth aged 10 to 14, compared with more direct means (e.g., meeting offline). Survey participants with youth contacts who had used deception, suggested keeping the interactions a secret, and/or persuaded their contact by appealing to the contacts feelings of love and attachment for the participant had also more often engaged in cybersex with the contact. No other manipulative behaviors were associated with the other investigated solicitation outcomes (receiving a sexual picture, meeting offline, and engaging in sexual contact offline) within this group of participants. However, using deception, suggesting secrecy and using persuasion was also positively associated with certain solicitation outcomes within participants with an adult contact. In summary, adults’ solicitation of youth is much more frequent when observed in chat rooms than self-reported. Additionally, an underlying lowered sexual age preference seems to be a motivating factor on a group level in adults who solicit youth. We concluded that directed prevention efforts should be made on pedophiliarelated websites. Additionally, the role of situational factors, especially sexual arousal in persons with a pedo- or hebephilic sexual interest should be investigated further in the context of online sexual solicitation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tutkimuksessa tarkastellaan peruskoulun yläkouluvalintoja Turussa. Tarkastelun keskiössä ovat vuonna 1997 syntyneiden turkulaislasten vanhempien yläkouluvalintaa koskeva yleinen sekä omaan lapseen kiinnittyvä puhe ja toimijuus paikallisessa institutionaalisessa kouluvalintatilassa sekä vanhempien lapsen koulutukseen ja kouluvalintaan liittämät perustelut, merkitykset, arvot ja arvostukset. Tämän lisäksi tutkimuksessa tarkastellaan puheesta ja toimista rakentuvia perheiden kouluvalintastrategioita, joita peilataan äitien koulutuksellisiin ja sosiaalisiin resursseihin sekä paikalliseen toimintapolitiikkaan. Tutkimus ei kerro ainoastaan paikallisessa kontekstissa tapahtuvista kouluvalinnoista, vaan laajemmin yhteiskunnassa vallitsevista hierarkioista ja arvoista sekä koulutukseen ja sosioekonomiseen asemaan linkittyvistä normatiivisista toimintatavoista. Tutkimuksessa käytetään haastattelu- ja kyselyaineistoja. Aineistot kerättiin osana kahta laajempaa Suomen Akatemian rahoittamaa Helsingin ja Turun yliopistojen kanssa yhteistyössä tehtyä tutkimusprojektia Vanhemmat ja kouluvalinta – Perheiden koulutusstrategiat, eriarvoistuminen ja paikalliset koulupolitiikat suomalaisessa peruskoulussa (VAKOVA) 2009–2012 sekä Parents and School Choice. Family Strategies, Segregation and School Policies in Chilean and Finnish Basic Schooling (PASC) 2010–2013. Tutkimusaineistot koostuvat 87 turkulaisäidin haastattelusta ja kyselyaineistosta. Kyselyaineiston analyysissä on käytetty kuvailevia tilastollisia menetelmiä, ja sitä käytetään ensisijaisesti taustoittamaan haastatteluaineistoa. Haastatteluaineiston analyysi perustuu pääasiallisesti teema-analyysiin, mutta toimija-asema-analyysin osalta myös diskursiiviseen lähestymistapaan. Haastatteluaineiston pohjalta esiin nousseiden lasten koulutusta ja kouluvalintoja koskevien kuvausten perusteella perheiden yläkouluvalinnat jaettiin kolmeen erityyppiseen valintastrategiaan: perinteiseen lähikouluvalintastrategiaan (n=41), ambivalenttiseen kouluvalintastrategiaan (n=23) ja päämäärätietoiseen kouluvalintastrategiaan (n=23). Jokainen kolmesta strategiasta piti sisällään kahdenlaista toimijuutta kouluvalintakentällä. Ryhmittely kouluvalintastrategioittain ja toimija-asemittain perustui äitien puhetapaan kouluvalinnoista ja yleisemmin koulutukseen liitetyistä merkityksistä ja arvoista sekä konkreettiseen toimintaan kouluvalinnan suhteen. Lähikouluvalintastrategiaa suosivien jälkeläiset siirtyivät koulunsa yleisluokalle. Perheet toimivat valintakentällä kaupungin rajaavan toimintapolitiikan ohjaamina, jolloin kouluvalinta näytti passiiviselta. Osoitteenmukaiseen kouluun siirtymistä perusteltiin praktisilla syillä; koulumatkan pituudella, kulkuyhteyksillä ja lapsen kaverisuhteilla. Hyvinvointivaltion edellytykseksi nähtiin kaikille taattu samanvertainen koulutus ja edelleen luotettiin perinteistä peruskoulua määrittävään mahdollisuuksien tasa-arvoon. Koulutuksen yhdeksi tärkeäksi tehtäväksi nähtiin lapsen kasvattaminen hyvinvoivaksi ja onnelliseksi. Vanhempien toiminta oli perinteisen kouluvalintastrategian mukaista. Ambivalenttista kouluvalintastrategiaa käyttävistä perheistä toiminta kouluvalintakentällä oli kahtalaista. Äidit joko harkitsivat kouluvalintoja tai vertailivat kouluja ja niihin pääsymahdollisuuksia realistisesti tasapainoillen ohjaavan ja mahdollistavan toimintapolitiikan välimaastossa. Tärkeintä oli olla tietoinen kaupungin kouluvalintapolitiikasta sekä siitä, että valinnoilla voi olla merkitystä jälkikasvun koulupolulle. Eri vaihtoehtojen punnitsemisen jälkeen päädyttiin useimmin lähikoulun painotettuun opetukseen. Lapsen peruskoulutusta haluttiin rikastaa painotetulla opetuksella ja hänen toivottiin pääsevän motivoituneeseen ja oppimismyönteiseen koululuokkaan. Valintoja tehtiin paikallisen toimintapolitiikan puitteissa lapsen parasta toivoen. Koulutuksen tehtäväksi nähtiin lapsen intellektuaalinen kasvu kiedottuna koulutuksen tuottamaan hyvinvointiin ja onnellisuuteen. Perheiden valintastrategiaksi muodostui ambivalenttinen strategia motivoituneen oppimisympäristön löytämiseksi. Päämäärätietoista kouluvalintastrategiaa käyttävät vanhemmat hyödynsivät aktiivisesti erilaisia reittejä tiettyihin yläkouluihin pääsemiseksi. Ennakoivien perheiden lapset olivat opiskelleet sellaisessa alakoulussa, joka ei kuulunut yläkoulun oppilasalueelle, mutta takasi lapselle reitin suosittuun yläkouluun. Määrätietoisten perheissä havahduttiin valintoihin puolestaan yläkouluun siirryttäessä, jolloin koulupaikkaa haettiin sopivimman painotetun opetuksen ja koulun maineen mukaan pois lähiyläkoulusta. Lähikoulu -periaate koettiin epäoikeudenmukaiseksi, sillä lapsella tulee olla oikeus toteuttaa omia kykyjään ja lahjakkuuttaan valikoidussa oppilasryhmässä ja perheillä mahdollisuus valita lapsen koulu. Paikallinen toimintapolitiikka ei näyttänyt rajaavan vanhempien kouluvalintoja. Koulutuksen tarkoitukseksi nähtiin intellektuaalinen kasvu ja akateemissivistävä tehtävä. Päämäärätietoisen kouluvalintavalintastrategian tavoitteena oli perheelle sopivan habituksen takaaminen. Paikallinen toimintapolitiikka mahdollisti vanhempien erilaisten kouluvalintastrategioiden rakentumisen ohjaten ensisijaisesti lähiyläkouluun, mutta samalla mahdollistaen koulun valinnan toissijaisen haun kriteerein. Kouluvalintastrategioihin ja toimintatapaan kouluvalintakentällä kytkeytyi vanhempien koulutukseen liittämät arvot sekä kulttuuriset ja sosiaaliset resurssit ja se, miten niitä käytettiin.