Search results for "AAV"

showing 10 items of 392 documents

Liikkumisen esteiden poistaminen vie kohti yhdenvertaisuutta

2023

Väestön liikkumisen lisäämiseksi on keskityttävä esteiden poistamiseen. Liikuntamahdollisuuksien saavutettavuudessa ei ole kyse yksinomaan liikuntapaikkojen tarjonnasta. nonPeerReviewed

Huhtasuo (Jyväskylä)lähiötliikuntapalvelutyhdenvertaisuussaavutettavuusliikuntapolitiikkaKontula (Helsinki)liikuntaliikuntaharrastusliikuntapaikat
researchProduct

Individual and shared digital repertoires : older adults managing digital services

2023

The rise of public and other non-recreational digital services is based on the idea of catering to the daily needs of the citizens cost-efficiently and with ease. Previous research has approached the use of digital services mainly from the perspective of an individual, while the significance of shared practices of use has attracted only a little attention. In this article, we (1) examine the incentives and limitations associated with the use of non-recreational digital services, which either encourage or discourage older adults to use them. Based on the first question, we then ask (2) how older adults in this study manage those non-recreational digital services they have chosen to use. Our …

Internetdigital repertoirekäyttäjätvanhuksetmedia repertoiredigital serviceuses and gratification theorykäyttöolder adultsaavutettavuussähköiset palvelutrajoituksetkäyttötutkimuskäyttäjäkokemusdigitalisaatioikääntyneetkannustimetwarm expertverkkopalvelut
researchProduct

Tarkkaavuuspulmaisten internetlukutaidot kuudennella luokalla

2016

Tutkimuksessa tarkastellaan, miten tarkkaavuuspulmat ja internetlukemisen taidot ovat yhteydessä toisiinsa kuudesluokkalaisilla lapsilla. Tarkkaavuuspulmat ovat aiemman tiedon perusteella yhteydessä lukemisen pulmiin, mutta niiden yhteyttä internetlukemiseen ei ole tätä ennen juurikaan tutkittu. Tutkimus on osa Suomen Akatemian rahoittamaa eSeek-hanketta. Tutkimukseen osallistui 402 kuudesluokkalaista (207 poikaa ja 195 tyttöä). Oppilaat suorittivat ongelmanratkaisutehtävän internetiä jäljittelevässä arviointiympäristössä. Internetlukemisen taitoja mitattiin neljällä osa-alueella: tiedonhaussa, kriittisessä arvioinnissa, synteesin muodostamisessa ja kommunikoinnissa. Opettajat arvioivat opp…

Internettoiminnanohjauksen taidottarkkaavuusvarhaisnuorettarkkaavaisuusinternetlukeminenlukeminen
researchProduct

"""Fluidity and flexibility of """"belonging"""": Uses of the concept in contemporary research"""

2016

Studies framing “belonging” as a key focus and a central concept of research have increased significantly in the 2000s. This article explores the dimensions of belonging as a scholarly concept. The investigation is based on a qualitative content analysis of articles published in academic journals covering a large number of different disciplines. The article poses and answers the following research questions: How is belonging understood and used in contemporary research? What added value does the concept bring to scholarly discussions? In the analysis, five topoi of conceptualizing belonging – spatiality, intersectionality, multiplicity, materiality, and non-belonging – were identified. Afte…

IntersectionalitySociology and Political Scienceemotional attachment05 social sciencesvulnerability0507 social and economic geographyintersektionaalisuusnon-belongingGender studies0506 political scienceEpistemologyFraming (social sciences)politics of belongingspatiality050602 political science & public administrationta616Sociology10. No inequalitybelonging050703 geographyintersectionalityhaavoittuvuusmaterialitymateriaalisuusActa Sociologica
researchProduct

HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants

2022

Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being an active area of research, prior work has mainly focused on vulnerability detection and exploitation, threat modelling, and protocol security. However, these methods are ineffective in preventing attacks against legacy and End-Of-Life devices that are already vulnerable. Current research mainly focuses on implementing and demonstrating the potential of malicious modifications. Hardening emerges as an effective solution to provide IoT devices with an additional layer of d…

IoTfirmware modificationcybersecurityend-of-lifesuojausSSL-proxyHTTPSlegacyfirmwaredefensive techniquesWAFretrofit securityesineiden internettietoturvakyberturvallisuusEOLverkkohyökkäyksetdeviceshaavoittuvuus
researchProduct

Security Controls for Smart Buildings with Shared Space

2022

In this paper we consider cyber security requirements of the smart buildings. We identify cyber risks, threats, attack scenarios, security objectives and related security controls. The work was done as a part of a smart building design and construction work. From the controls identified w e concluded security practices for engineering-in smart buildings security. The paper provides an idea toward which system security engineers can strive in the basic design and implementation of the most critical components of the smart buildings. The intent of the concept is to help practitioners to avoid ad hoc approaches in the development of security mechanisms for smart buildings with shared space. pe…

IoTturvallisuussuunnitteluälytalotrakennusautomaatiosmart buildingesineiden internetsecurity riskskyberturvallisuushaavoittuvuussecurity controls2022 6th International Conference on Smart Grid and Smart Cities (ICSGSC)
researchProduct

Lua Code: Security Overview and Practical Approaches to Static Analysis

2017

Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the rise in the last couple of years. Simple design and efficient usage of resources combined with its performance make it attractive for production web applications even to big organizations such as Wikipedia, CloudFlare and GitHub. In addition to this, Lua is one of the preferred choices for programming embedded and IoT devices. This context allows to assume a large and growing Lua codebase yet to be assessed. This growing Lua codebase could be potentially driving production servers and extremely large number of devices, some perhaps with mission-critical function for example i…

JavaComputer sciencevulnerabilityStatic program analysis02 engineering and technologyLuaJavaScriptSecurity testingohjelmointikielet020204 information systemsprogramming languages0202 electrical engineering electronic engineering information engineeringWeb applicationtietoturvadata securityhaavoittuvuuscomputer.programming_languageCodebaseta113business.industryComputingMilieux_PERSONALCOMPUTING020207 software engineeringPython (programming language)Static analysisAbstract syntax treeSoftware engineeringbusinesscomputer
researchProduct

Joint attention behaviour in remote collaborative problem solving : exploring different attentional levels in dyadic interaction

2021

AbstractThe current article describes an exploratory study that focussed on joint attention behaviour—the basis of interaction predicting productive collaboration—to better understand collaborative problem solving, particularly its social aspects during remote dyadic interaction. The study considered joint attention behaviour as a socio-linguistic phenomenon and relied on detailed qualitative interaction analysis on event-related measures of multiple observational data (i.e. log files, eye-tracking data). The aim was to illustrate and exemplify how the diverse attentional levels of joint attention behaviour (i.e. monitoring, common, mutual and shared attention) delineated by Siposova and Ca…

Joint attentionSocial PsychologyInteractionProcess-oriented researchExploratory researchContext (language use)Information technologysosiaalinen vuorovaikutus050105 experimental psychologyyhteistyöEducationLive eye trackingManagement of Technology and InnovationCommon knowledgeMedia Technologyetäosallistuminen0501 psychology and cognitive sciencesyhteisöllinen oppiminentarkkaavaisuus05 social sciencesCollaborative problem solvingEducational technology050301 educationCognitionJointnessT58.5-58.64Joint attention behaviourDyadic interactionkatseenseurantaongelmanratkaisuPsychology0503 educationCognitive psychology
researchProduct

Kvasikonveksisuus tasossa

2009

Jordan-käyrätjoukotkvasikonveksisuusmatemaattiset kaavat
researchProduct

Banks’ unfairness and the vulnerability of low-income unbanked consumers

2018

This paper’s objective was to explore low-income unbanked consumers’ perceptions of bank fairness and the way these perceptions were linked to consumer experiences of vulnerability. Qualitative data were used to analyse low-income consumers’ perceptions about banks’ services and communications. The study finds that although consumers’ financial inclusion is partially hindered by their personal circumstances, the perceived unfair treatment by banks has an even more negative impact on their financial inclusion. Low-income unbanked individuals report banks avoiding them, discriminating against them and impeding their financial inclusion. Banks’ perceived unfairness towards low-income consumers…

Low incomepankitPublic economicsStrategy and Managementvulnerability05 social sciencesUnbankedVulnerabilityfairnessunbanked consumerscustomersoikeudenmukaisuusbankstaloudellinen tilaasiakkaatManagement of Technology and Innovation0502 economics and businesspienituloiset050211 marketinglow-income customersBusinessta512incomeshaavoittuvuusThe Service Industries Journal
researchProduct