• Title/Summary/Keyword: concept of space

Search Result 2,944, Processing Time 0.033 seconds

Legal Issues Regarding the Civil Injunction Against the Drone Flight (토지 상공에서의 드론의 비행자유에 대한 제한과 법률적 쟁점)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.2
    • /
    • pp.75-111
    • /
    • 2020
  • The civilian drone world has evolved in recent years from one dominated by hobbyists to growing involvement by companies seeking to profit from unmanned flight in everything from infrastructure inspections to drone deliveries that are already subject to regulations. Drone flight under the property right relation with the land owner would be deemed legal on the condition that expeditious and innocent passage of drone flight over the land be assured. The United Nations Convention on the Law of the Sea (UNCLOS) enshrines the concept of innocent passage through a coastal state's territorial sea. Passage is innocent so long as it is not prejudicial to the peace, good order or security of the coastal state. A vessel in innocent passage may traverse the coastal state's territorial sea continuously and expeditiously, not stopping or anchoring except in force majeure situations. However, the disturbances caused by drone flight may be removed, which is defined as infringement against the constitutional interest of personal rights. For example, aggressive infringement against privacy and personal freedom may be committed by drone more easily than ever before, and than other means. The cost-benefit analysis, however, has been recognjzed as effective criteria regarding the removal of disturbances or injunction decision. Applying that analysis, the civil action against such infringement may not find suitable basis for making a good case. Because the removal of such infringement through civil actions may result in only the deletion of journal article. The injunction of drone flight before taking the information would not be obtainable through civil action, Therefore, more detailed and meticulous regulation and criteria in public law domain may be preferable than civil action, at present time. It may be suitable for legal stability and drone industry to set up the detailed public regulations restricting the free flight of drone capable of acquiring visual information amounting to the infrigement against the right of personal information security.

A Study on Transfer Process Model for long-term preservation of Electronic Records (전자기록의 장기보존을 위한 이관절차모형에 관한 연구)

  • Cheon, kwon-ju
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.39-96
    • /
    • 2007
  • Traditionally, the concept of transfer is that physical records such as paper documents, videos, photos are made a delivery to Archives or Records centers on the basis of transfer guidelines. But, with the automation of records management environment and spreading new records creation and management applications, we can create records and manage them in the cyberspace. In these reasons, the existing transfer system is that we move filed records to Archives or Records centers by paper boxes, needs to be changed. Under the needing conditions of a new transfer paradigm, the fact that the revision of Records Act that include some provisions about electronic records management and transfer, is desirable and proper. Nevertheless, the electronic transfer provisions are too conceptional to apply records management practice, so we have to develop detailed methods and processes. In this context, this paper suggest that a electronic records transfer process model on the basis of international standard and foreign countries' cases. Doing transfer records is one of the records management courses to use valuable records in the future. So, both producer and archive have to transfer records itself and context information to long-term preservation repository according to the transfer guidelines. In the long run, transfer comes to be the conclusion that records are moved to archive by a formal transfer process with taking a proper records protection steps. To accomplish these purposes, I analyzed the 'OAIS Reference Model' and 'Producer-Archive Interface Methodology Abstract Standard-CCSDS Blue Book' which is made by CCSDS(Consultative committee for Space Data Systems). but from both the words of 'Reference Model' and 'Standard', we can understand that these standard are not suitable for applying business practice directly. To solve this problem, I also analyzed foreign countries' transfer cases. Through the analysis of theory and case, I suggest that an Electronic Records Transfer Process Model which is consist of five sub-process that are 'Ingest prepare ${\rightarrow}$ Ingest ${\rightarrow}$ Validation ${\rightarrow}$ Preservation ${\rightarrow}$ Archival storage' and each sub-process also have some transfer elements. Especially, to confirm the new process model's feasibility, after classifying two types - one is from Public Records center to Public Archive, the other is from Civil Records center to Public or Civil Archive - of Korean Transfer, I made the new Transfer Model applied to the two types of transfer cases.

Dynamic response of segment lining due to train-induced vibration (세그먼트 라이닝의 열차 진동하중에 대한 동적 응답특성)

  • Gyeong-Ju Yi;Ki-Il Song
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.25 no.4
    • /
    • pp.305-330
    • /
    • 2023
  • Unlike NATM tunnels, Shield TBM tunnels have split linings. Therefore, the stress distribution of the lining is different even if the lining is under the same load. Representative methods for analyzing the stress generated in lining in Shield TBM tunnels include Non-joint Mode that does not consider connections and a 2-ring beam-spring model that considers ring-to-ring joints and segment connections. This study is an analysis method by Break-joint Mode. However, we do not consider the structural role of segment lining connections. The effectiveness of the modeling is verified by analyzing behavioral characteristics against vibration loads by modeling with segment connection interfaces to which vertical stiffness and shear stiffness, which are friction components, are applied. Unlike the Non-joint mode, where the greatest stress occurs on the crown for static loads such as earth pressure, the stress distribution caused by contact between segment lining and friction stiffness produced the smallest stress in the crown key segment where segment connections were concentrated. The stress distribution was clearly distinguished based on segment connections. The results of static analysis by earth pressure, etc., produced up to seven times the stress generated in Non-joint mode compared to the stress generated by Break-joint Mode. This result is consistent with the stress distribution pattern of the 2-ring beam-spring model. However, as for the stress value for the train vibration load, the stress of Break-joint Mode was greater than that of Non-joint mode. This is a different result from the static mechanics concept that a segment ring consisting of a combination of short members is integrated in the circumferential direction, resulting in a smaller stress than Non-joint mode with a relatively longer member length.

OPERATIONAL MODEL OF TIME-KEEPING SYSTEMS OF HEUMGYEONGGAK-NU (흠경각루 시보시스템의 작동모델)

  • KIM, SANG HYUK;YUN, YONG-HYUN;MIHN, BYEONG-HEE;LEEM, BYONG GUEN;YOON, MYUNG KYOON;LEEM, BYONG SI
    • Publications of The Korean Astronomical Society
    • /
    • v.34 no.3
    • /
    • pp.31-40
    • /
    • 2019
  • We study the internal structure under the artificial mountain of Heumkyeonggak-nu, a Korean water-powered clock in the early Joseon dynasty. All the puppets on the artificial mountain are driven by the rotational force generated by the water wheel at their designated time. We design a model that work with three parts of the artificial mountain. At the upper part of the artificial mountain to the east, west, north and south, there are four puppets called the Four Mystical Animal Divinity and four ladies called the Jade Lady respectively. The former rotates a quarter every double hour and the latter rings the bell every hour. In the middle part of this mountain is the timekeeping platform with four puppets; the Timekeeping Official (Hour Jack), the Bell-, Drum-, and Gong-Warriors. The Hour Jack controls time with three warriors each hitting his own bell, drum, and gong, respectively. In the plain there are 12 Jade Lady puppets (the lower ladies) combined with 12 Oriental Animal Deity puppets. In his own time a lady doll pops out of the hole and her animal doll gets up. Two hours later, the animal deity lies down and his lady hides in the artificial plain. These puppets are regularly moved by the signal such as iron balls, bumps, levers, and so on. We can use balls and bumps to explain the concept of the Jujeon system. Iron balls were used to manipulate puppets of the timekeeping mechanism in Borugak-nu, another Korean water-powered clock in Joseon dynasty, which was developed earlier than Heumgyeonggak-nu. According to the North Korea's previous study (Choi, 1974), it is obvious that bumps were used in the internal structure of Heumgyeonggak-nu. In 1669, The armillary clock made by Song, I-young was also utilized bumps. Finally we presented mock-ups of three timekeeping systems.

A Study on the Determinants of Demand for Visiting Department Stores Using Big Data (POS) (빅데이터(POS)를 활용한 백화점 방문수요 결정요인에 관한 연구)

  • Shin, Seong Youn;Park, Jung A
    • Land and Housing Review
    • /
    • v.13 no.4
    • /
    • pp.55-71
    • /
    • 2022
  • Recently, the domestic department store industry is growing into a complex shopping cultural space, which is advanced and differentiated by changes in consumption patterns. In addition, competition is intensifying across 70 places operated by five large companies. This study investigates the determinants of the visits to department stores using the big data concept's automatic vehicle access system (pos) and proposes how to strengthen the competitiveness of the department store industry. We use a negative binomial regression test to predict the frequency of visits to 67 branches, except for three branches whose annual sales were incomplete due to the new opening in 2021. The results show that the demand for visiting department stores is positively associated with airport, terminal, and train stations, land areas, parking lots, VIP lounge numbers, luxury store ratio, F&B store numbers, non-commercial areas, and hotels. We suggest four strategies to enhance the competitiveness of domestic department stores. First, department store consumers have a high preference for luxury brands. Therefore, department stores need to form their own overseas buyer teams to discover and attract new luxury brands and attract customers who have a high demand for luxury brands. In addition, to attract consumers with high purchasing power and loyalty, it is necessary to provide more differentiated products and services for VIP customers than before. Second, it is desirable to focus on transportation hub areas such as train stations, airports, and terminals in Gyeonggi and Incheon. Third, department stores should attract tenants who can satisfy customers, given that key tenants are an important component of advanced shopping centers for department stores. Finally, the department store, a top-end shopping center, should be developed as a space with differentiated shopping, culture, dining out, and leisure services, such as "The Hyundai", which opened in 2021, to ensure future growth potential.

Evaluating Reverse Logistics Networks with Centralized Centers : Hybrid Genetic Algorithm Approach (집중형센터를 가진 역물류네트워크 평가 : 혼합형 유전알고리즘 접근법)

  • Yun, YoungSu
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.55-79
    • /
    • 2013
  • In this paper, we propose a hybrid genetic algorithm (HGA) approach to effectively solve the reverse logistics network with centralized centers (RLNCC). For the proposed HGA approach, genetic algorithm (GA) is used as a main algorithm. For implementing GA, a new bit-string representation scheme using 0 and 1 values is suggested, which can easily make initial population of GA. As genetic operators, the elitist strategy in enlarged sampling space developed by Gen and Chang (1997), a new two-point crossover operator, and a new random mutation operator are used for selection, crossover and mutation, respectively. For hybrid concept of GA, an iterative hill climbing method (IHCM) developed by Michalewicz (1994) is inserted into HGA search loop. The IHCM is one of local search techniques and precisely explores the space converged by GA search. The RLNCC is composed of collection centers, remanufacturing centers, redistribution centers, and secondary markets in reverse logistics networks. Of the centers and secondary markets, only one collection center, remanufacturing center, redistribution center, and secondary market should be opened in reverse logistics networks. Some assumptions are considered for effectively implementing the RLNCC The RLNCC is represented by a mixed integer programming (MIP) model using indexes, parameters and decision variables. The objective function of the MIP model is to minimize the total cost which is consisted of transportation cost, fixed cost, and handling cost. The transportation cost is obtained by transporting the returned products between each centers and secondary markets. The fixed cost is calculated by opening or closing decision at each center and secondary markets. That is, if there are three collection centers (the opening costs of collection center 1 2, and 3 are 10.5, 12.1, 8.9, respectively), and the collection center 1 is opened and the remainders are all closed, then the fixed cost is 10.5. The handling cost means the cost of treating the products returned from customers at each center and secondary markets which are opened at each RLNCC stage. The RLNCC is solved by the proposed HGA approach. In numerical experiment, the proposed HGA and a conventional competing approach is compared with each other using various measures of performance. For the conventional competing approach, the GA approach by Yun (2013) is used. The GA approach has not any local search technique such as the IHCM proposed the HGA approach. As measures of performance, CPU time, optimal solution, and optimal setting are used. Two types of the RLNCC with different numbers of customers, collection centers, remanufacturing centers, redistribution centers and secondary markets are presented for comparing the performances of the HGA and GA approaches. The MIP models using the two types of the RLNCC are programmed by Visual Basic Version 6.0, and the computer implementing environment is the IBM compatible PC with 3.06Ghz CPU speed and 1GB RAM on Windows XP. The parameters used in the HGA and GA approaches are that the total number of generations is 10,000, population size 20, crossover rate 0.5, mutation rate 0.1, and the search range for the IHCM is 2.0. Total 20 iterations are made for eliminating the randomness of the searches of the HGA and GA approaches. With performance comparisons, network representations by opening/closing decision, and convergence processes using two types of the RLNCCs, the experimental result shows that the HGA has significantly better performance in terms of the optimal solution than the GA, though the GA is slightly quicker than the HGA in terms of the CPU time. Finally, it has been proved that the proposed HGA approach is more efficient than conventional GA approach in two types of the RLNCC since the former has a GA search process as well as a local search process for additional search scheme, while the latter has a GA search process alone. For a future study, much more large-sized RLNCCs will be tested for robustness of our approach.

Liabilities of Air Carrier Who Sponsored Financially Troubled Affiliate Shipping Company (항공사(航空社)의 부실 계열 해운사(海運社) 지원에 따른 법적 책임문제)

  • Choi, June-Sun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.177-200
    • /
    • 2017
  • This writer have thus far reviewed the civil and criminal obligations of the directors of a parent company that sponsored financially troubled affiliates. What was discussed here applies to logistics companies in the same manner. Hanjin Shipping cannot expect its parent company, Korean Air to prop it up financially. If such financial aid is offered without any collateral, under Korean criminal law, the directors of the parent company bears the burden of civil and criminal responsibility. One way to get around this is to secure fairness in terms of the process and the content of aid. Fairness in terms of process refers to the board of directors making public all information and approving such aid. Fairness in terms of content refers to impartial transactions that block out any possibilities of the chairman of the corporate group acting in his private interest. In the case of Korean Air bailing out Hanjin, the meeting of board of directors were held five times and a thorough review was conducted on the risks involved in the loans being repaid or not. After the review, measures to guard against undesirable scenarios were established before finally deciding on bailing out Hanjin. As such, there are no issues. In terms of the fairness of content, too, there were practically no room for the majority shareholder or controlling shareholder to pocket profits at the expense of the company. This is because the continued aid offered to a financially troubled company (i.e. Hanjin Shipping) was a posing a burden to even the controlling shareholder. This writer argues that the concept of the interest of the entire corporate group needs to be recognized. That is, it must be recognized that the relationship of control and being controlled between parent company and affiliate company, or between affiliate companies serves a practical benefit to the ongoing concern and growth of the group and is therefore just. Moreover, the corporate group and its affiliates, as well as their directors and management must recognize that they have an obligation to prioritize the interests of the corporate group ahead of the interests of the company that they are directly associated with. As such, even if Korean Air offered a loan to Hanjin Shipping without collateral, the act cannot be treated as an offense to law, nor can the directors be accused of damages that they bear the responsibility of compensating under civil law.

  • PDF

The Characteristic of Laws on the Kind of Urban Green Spaces and the Legal Requirements for the Green Spaces of Urban Habitat in China (중국의 도시녹지 종류와 도시거주구 녹지의 설치 기준에 관한 법제도의 현황과 특성)

  • Shin, Ick-Soon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.3
    • /
    • pp.1-11
    • /
    • 2013
  • This study investigated Chinese Laws on the kind of urban green spaces and the legal requirements for the green spaces of urban habitat and analyzed the specificities of them intending to provide basic data to suggest bringing in or not the relevant Chinese Laws to Korea. This study can be summarized as follows: First, the concept of Chinese urban green spaces(g.s.) classified by 5 kinds(park g.s., production g.s., protection g.s., attachment g.s., the others g.s.) placed the park and green spaces in the same category unlike the Korean urban green spaces that only distinguishes between park and green spaces. The Chinese Urban Park is classified by 4 kinds(composite park, community park, special park, linear park) at the 'Standard for urban green spaces classification' which is below in rank of the legal system. Second, in case of calculation for green spaces ratio of urban green spaces in China, the green rooftop landscaping area should not be included as a green spaces area except the rooftop of a basement or semi basement building to which residents have easy access. The green spaces requirements and compulsory secure ratio by 3 habitat kinds(habitat, small habit, minimum habitat) of when to act as a residential plan is regulated. Third, the green spaces system is obligated to establish at habitat green spaces plan and is specified to conserve and improve existing trees and green spaces. The green spaces ratio on reconstruction for old habitat is relaxed to be lower than for new habitat and a gradient of green spaces is peculiarly clarified. The details and requirements for establishment and the minimum area intending for each classes of the central green spaces(habitat park, children park, minimum habitat's green spaces) are regulated. Especially at a garden style of minimum habitat's green spaces, intervals between the south and north houses and a compulsory security for green spaces area classifying into two groups(closing type green spaces and open type green spaces) by a middle-rise or high-rise building are clarified. System of calculation for green spaces area is presented at a special regulation. Fourth, a general index(area/person) of public green spaces within habitat to achieve by 3 habitat kinds is determined, in this case, the index on reconstruction for a deterioration zone can be relaxed to be lower to the extent of a specified quantity. A location and scale, minimum width and minimum area per place of public green spaces are regulated. A space plot principle including adjacent to a road, greening area ratio against total area, security of open space and the shadow line boundary of sunshine are also regulated to intend for public green spaces. Fifth, the minimum horizontal distance between the underground cables and the surrounding greening trees are regulated as the considerable items for green spaces when setting up the underground cables. The principle to establish green spaces within public service facilities is regulated according to the kind of service contents. It shall be examined in order to import or not the special regulations that only exist in Chinese Laws but not in Korean Laws. The result of this study will contribute to gain the domestic landscape architect's' sympathy of the research related to Chinese urban green spaces laws requiring immediate attention and will be a good chance to advance into the internationalization of Korean Landscape Architectural Laws.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF