• Title/Summary/Keyword: Protection systems

Search Result 2,324, Processing Time 0.031 seconds

Comparative Study of Security Services Industry Act and Police Assigned to Special Guard Act - Focused on special guards and police assigned to special guard duty - (경비업법과 청원경찰법의 비교 연구 특수경비원과 청원경찰을 중심으로)

  • Noh, Jin-keo;Lee, Young-ho;Choi, Kyung-cheol
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.177-203
    • /
    • 2018
  • Police Assigned to Special Guard Act was legislated in 1962 to solve issues regarding the protection of various staple industrial installations, and in 2001, the Security Services Industry Act was revised to establish an effective security system for important national facilities. Thereby the Special Guards System was instituted. The current law has two parts, with the Police Assigned to Special Guard System and Special Guards System, and many scholars have actively discussed the appropriateness of the integration of both systems to solve problems caused by a bimodal system. However, in spite of these discussions taking place in the academic world, the idea of unification lost its power when the guarantee of status regulation was established for the police assigned to special guard. Strictly speaking, police assigned to special guard is a self-guard, and a special guard is a contractual guard. So, both of them have pros and cons. Thus, it would be desirable to give a legal, constitutional guarantee for both systems by strengthening each of them and making up for the weakness of each of them rather than trying to unify police assigned to special guard and special guard. To begin this process, we need to revise unreasonable legal provisions of Security Services Industry Act and Police Assigned to Special Guard Act as below. First, since the actual responsibilities of special guards and police assigned to special guard duty are the same, we need to make the facilities which they use equal. Second, legal provisions need to be revised so that a special guard may perform the duties of a police officer, according to the Act on the Performance of Duties by Police Officers, within the facility that needs to be secured in order to prevent any vacancy in the guarding of an important national facility. Third, disqualifications for the special guards need to be revised to be the same as the disqualifications for the police assigned to special guard duty. Fourth, it is reasonable to unify the training institution for special guards and for police assigned to special guard duty, and it should be the training institution for police. On-the-job education for a security guard needs to be altered to more than 4 hours every month just like the one for police assigned to special guard duty. Fifth, for a special guard, it is not right to limit the conditions in their using weapons to 'use of weapon or explosives' only. If one possesses 'dangerous objects such as weapon, deadly weapon, and so on' and resists, a special guard should be able to use their weapon against that person. Thus, this legal provision should be revised. Sixth, penalty, range of fines, and so on for police assigned to special guard duty need to be revised to be the same as the ones for a special guard. If we revise these legal provisions, we can correct the unreasonable parts of Security Services Industry Act and Police Assigned to Special Guard Act without unifying them. Through these revisions, special guards and police assigned to special guard duty may develop the civilian guard industry wholesomely under the law, and the civilians would have a wider range of options to choose from to receive high quality security service.

A Study on Transfer Process Model for long-term preservation of Electronic Records (전자기록의 장기보존을 위한 이관절차모형에 관한 연구)

  • Cheon, kwon-ju
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.39-96
    • /
    • 2007
  • Traditionally, the concept of transfer is that physical records such as paper documents, videos, photos are made a delivery to Archives or Records centers on the basis of transfer guidelines. But, with the automation of records management environment and spreading new records creation and management applications, we can create records and manage them in the cyberspace. In these reasons, the existing transfer system is that we move filed records to Archives or Records centers by paper boxes, needs to be changed. Under the needing conditions of a new transfer paradigm, the fact that the revision of Records Act that include some provisions about electronic records management and transfer, is desirable and proper. Nevertheless, the electronic transfer provisions are too conceptional to apply records management practice, so we have to develop detailed methods and processes. In this context, this paper suggest that a electronic records transfer process model on the basis of international standard and foreign countries' cases. Doing transfer records is one of the records management courses to use valuable records in the future. So, both producer and archive have to transfer records itself and context information to long-term preservation repository according to the transfer guidelines. In the long run, transfer comes to be the conclusion that records are moved to archive by a formal transfer process with taking a proper records protection steps. To accomplish these purposes, I analyzed the 'OAIS Reference Model' and 'Producer-Archive Interface Methodology Abstract Standard-CCSDS Blue Book' which is made by CCSDS(Consultative committee for Space Data Systems). but from both the words of 'Reference Model' and 'Standard', we can understand that these standard are not suitable for applying business practice directly. To solve this problem, I also analyzed foreign countries' transfer cases. Through the analysis of theory and case, I suggest that an Electronic Records Transfer Process Model which is consist of five sub-process that are 'Ingest prepare ${\rightarrow}$ Ingest ${\rightarrow}$ Validation ${\rightarrow}$ Preservation ${\rightarrow}$ Archival storage' and each sub-process also have some transfer elements. Especially, to confirm the new process model's feasibility, after classifying two types - one is from Public Records center to Public Archive, the other is from Civil Records center to Public or Civil Archive - of Korean Transfer, I made the new Transfer Model applied to the two types of transfer cases.

Estimation of irrigation return flow from paddy fields on agricultural watersheds (농업유역의 논 관개 회귀수량 추정)

  • Kim, Ha-Young;Nam, Won-Ho;Mun, Young-Sik;An, Hyun-Uk;Kim, Jonggun;Shin, Yongchul;Do, Jong-Won;Lee, Kwang-Ya
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • Irrigation water supplied to the paddy field is consumed in the amount of evapotranspiration, underground infiltration, and natural and artificial drainage from the paddy field. Irrigation return flow is defined as the excess of irrigation water that is not consumed by evapotranspiration and crop, and which returns to an aquifer by infiltration or drainage. The research on estimating the return flow play an important part in water circulation management of agricultural watershed. However, the return flow rate calculations are needs because the result of calculating return flow is different depending on irrigation channel water loss, analysis methods, and local characteristics. In this study, the irrigation return flow rate of agricultural watershed was estimated using the monitoring and SWMM (Storm Water Management Model) modeling from 2017 to 2020 for the Heungeop reservoir located in Wonju, Gangwon-do. SWMM modeling was performed by weather data and observation data, water of supply and drainage were estimated as the result of SWMM model analysis. The applicability of the SWMM model was verified using RMSE and R-square values. The result of analysis from 2017 to 2020, the average annual quick return flow rate was 53.1%. Based on these results, the analysis of water circulation characteristics can perform, it can be provided as basic data for integrated water management.

New Insights on Mobile Location-based Services(LBS): Leading Factors to the Use of Services and Privacy Paradox (모바일 위치기반서비스(LBS) 관련한 새로운 견해: 서비스사용으로 이끄는 요인들과 사생활염려의 모순)

  • Cheon, Eunyoung;Park, Yong-Tae
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-56
    • /
    • 2017
  • As Internet usage is becoming more common worldwide and smartphone become necessity in daily life, technologies and applications related to mobile Internet are developing rapidly. The results of the Internet usage patterns of consumers around the world imply that there are many potential new business opportunities for mobile Internet technologies and applications. The location-based service (LBS) is a service based on the location information of the mobile device. LBS has recently gotten much attention among many mobile applications and various LBSs are rapidly developing in numerous categories. However, even with the development of LBS related technologies and services, there is still a lack of empirical research on the intention to use LBS. The application of previous researches is limited because they focused on the effect of one particular factor and had not shown the direct relationship on the intention to use LBS. Therefore, this study presents a research model of factors that affect the intention to use and actual use of LBS whose market is expected to grow rapidly, and tested it by conducting a questionnaire survey of 330 users. The results of data analysis showed that service customization, service quality, and personal innovativeness have a positive effect on the intention to use LBS and the intention to use LBS has a positive effect on the actual use of LBS. These results implies that LBS providers can enhance the user's intention to use LBS by offering service customization through the provision of various LBSs based on users' needs, improving information service qualities such as accuracy, timeliness, sensitivity, and reliability, and encouraging personal innovativeness. However, privacy concerns in the context of LBS are not significantly affected by service customization and personal innovativeness and privacy concerns do not significantly affect the intention to use LBS. In fact, the information related to users' location collected by LBS is less sensitive when compared with the information that is used to perform financial transactions. Therefore, such outcomes on privacy concern are revealed. In addition, the advantages of using LBS are more important than the sensitivity of privacy protection to the users who use LBS than to the users who use information systems such as electronic commerce that involves financial transactions. Therefore, LBS are recommended to be treated differently from other information systems. This study is significant in the theoretical point of contribution that it proposed factors affecting the intention to use LBS in a multi-faceted perspective, proved the proposed research model empirically, brought new insights on LBS, and broadens understanding of the intention to use and actual use of LBS. Also, the empirical results of the customization of LBS affecting the user's intention to use the LBS suggest that the provision of customized LBS services based on the usage data analysis through utilizing technologies such as artificial intelligence can enhance the user's intention to use. In a practical point of view, the results of this study are expected to help LBS providers to develop a competitive strategy for responding to LBS users effectively and lead to the LBS market grows. We expect that there will be differences in using LBSs depending on some factors such as types of LBS, whether it is free of charge or not, privacy policies related to LBS, the levels of reliability related application and technology, the frequency of use, etc. Therefore, if we can make comparative studies with those factors, it will contribute to the development of the research areas of LBS. We hope this study can inspire many researchers and initiate many great researches in LBS fields.

A Study on Improvements on Legal Structure on Security of National Research and Development Projects (과학기술 및 학술 연구보고서 서비스 제공을 위한 국가연구개발사업 관련 법령 입법론 -저작권법상 공공저작물의 자유이용 제도와 연계를 중심으로-)

  • Kang, Sun Joon;Won, Yoo Hyung;Choi, San;Kim, Jun Huck;Kim, Seul Ki
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.545-570
    • /
    • 2015
  • Korea is among the ten countries with the largest R&D budget and the highest R&D investment-to-GDP ratio, yet the subject of security and protection of R&D results remains relatively unexplored in the country. Countries have implemented in their legal systems measures to properly protect cutting-edge industrial technologies that would adversely affect national security and economy if leaked to other countries. While Korea has a generally stable legal framework as provided in the Regulation on the National R&D Program Management (the "Regulation") and the Act on Industrial Technology Protection, many difficulties follow in practice when determining details on security management and obligations and setting standards in carrying out national R&D projects. This paper proposes to modify and improve security level classification standards in the Regulation. The Regulation provides a dual security level decision-making system for R&D projects: the security level can be determined either by researcher or by the central agency in charge of the project. Unification of such a dual system can avoid unnecessary confusions. To prevent a leakage, it is crucial that research projects be carried out in compliance with their assigned security levels and standards and results be effectively managed. The paper examines from a practitioner's perspective relevant legal provisions on leakage of confidential R&D projects, infringement, injunction, punishment, attempt and conspiracy, dual liability, duty of report to the National Intelligence Service (the "NIS") of security management process and other security issues arising from national R&D projects, and manual drafting in case of a breach. The paper recommends to train security and technological experts such as industrial security experts to properly amend laws on security level classification standards and relevant technological contents. A quarterly policy development committee must also be set up by the NIS in cooperation with relevant organizations. The committee shall provide a project management manual that provides step-by-step guidance for organizations that carry out national R&D projects as a preventive measure against possible leakage. In the short term, the NIS National Industrial Security Center's duties should be expanded to incorporate national R&D projects' security. In the long term, a security task force must be set up to protect, support and manage the projects whose responsibilities should include research, policy development, PR and training of security-related issues. Through these means, a social consensus must be reached on the need for protecting national R&D projects. The most efficient way to implement these measures is to facilitate security training programs and meetings that provide opportunities for communication among industrial security experts and researchers. Furthermore, the Regulation's security provisions must be examined and improved.

  • PDF

The Role of Control Transparency and Outcome Feedback on Security Protection in Online Banking (계좌 이용 과정과 결과의 투명성이 온라인 뱅킹 이용자의 보안 인식에 미치는 영향)

  • Lee, Un-Kon;Choi, Ji Eun;Lee, Ho Geun
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Fostering trusting belief in financial transactions is a challenging task in Internet banking services. Authenticated Certificate had been regarded as an effective method to guarantee the trusting belief for online transactions. However, previous research claimed that this method has some loopholes for such abusers as hackers, who intend to attack the financial accounts of innocent transactors in Internet. Two types of methods have been suggested as alternatives for securing user identification and activity in online financial services. Control transparency uses information over the transaction process to verify and to control the transactions. Outcome feedback, which refers to the specific information about exchange outcomes, provides information over final transaction results. By using these two methods, financial service providers can send signals to involved parties about the robustness of their security mechanisms. These two methods-control transparency and outcome feedback-have been widely used in the IS field to enhance the quality of IS services. In this research, we intend to verify that these two methods can also be used to reduce risks and to increase the security protections in online banking services. The purpose of this paper is to empirically test the effects of the control transparency and the outcome feedback on the risk perceptions in Internet banking services. Our assumption is that these two methods-control transparency and outcome feedback-can reduce perceived risks involved with online financial transactions, while increasing perceived trust over financial service providers. These changes in user attitudes can increase the level of user satisfactions, which may lead to the increased user loyalty as well as users' willingness to pay for the financial transactions. Previous research in IS suggested that the increased level of transparency on the process and the result of transactions can enhance the information quality and decision quality of IS users. Transparency helps IS users to acquire the information needed to control the transaction counterpart and thus to complete transaction successfully. It is also argued that transparency can reduce the perceived transaction risks in IS usage. Many IS researchers also argued that the trust can be generated by the institutional mechanisms. Trusting belief refers to the truster's belief for the trustee to have attributes for being beneficial to the truster. Institution-based trust plays an important role to enhance the probability of achieving a successful outcome. When a transactor regards the conditions crucial for the transaction success, he or she considers the condition providers as trustful, and thus eventually trust the others involved with such condition providers. In this process, transparency helps the transactor complete the transaction successfully. Through the investigation of these studies, we expect that the control transparency and outcome feedback can reduce the risk perception on transaction and enhance the trust with the service provider. Based on a theoretical framework of transparency and institution-based trust, we propose and test a research model by evaluating research hypotheses. We have conducted a laboratory experiment in order to validate our research model. Since the transparency artifact(control transparency and outcome feedback) is not yet adopted in online banking services, the general survey method could not be employed to verify our research model. We collected data from 138 experiment subjects who had experiences with online banking services. PLS is used to analyze the experiment data. The measurement model confirms that our data set has appropriate convergent and discriminant validity. The results of testing the structural model indicate that control transparency significantly enhances the trust and significantly reduces the risk perception of online banking users. The result also suggested that the outcome feedback significantly enhances the trust of users. We have found that the reduced risk and the increased trust level significantly improve the level of service satisfaction. The increased satisfaction finally leads to the increased loyalty and willingness to pay for the financial services.

  • PDF

Outer Space Activities and an Observation of Related Laws of Korea (국내 우주활동과 관련법 소고)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.2
    • /
    • pp.163-186
    • /
    • 2009
  • The missile technology and its development in south Korea have been restrained to the limit of 180 km by America which instead provided to Korea with security protection. In the same vein, America pressured South Korea to abort its nuclear weapons program so as to prevent another possible military encounter that can easily develop into a war between South and North Korea. This restraint was a bit relaxed when South Korea joined the Missile Technology Control Regime (MTCR) in 2001 whereby the limit was 300 km. The situation of South Korea is in much contrast with its neighbor, North Korea, which has fired Taepo Dong 1 and Taepo Dong 2 to put its alleged satellite respectively into the Earth orbit. The range of this rocket believed to be reaching more than 5,500 km, a range of the intercontinental ballistic missile, without any rein. South Korea that has just geared its full powers for its outer space industry, with the current space projects of putting its satellites into the low Earth orbit, will in future put its satellite into the geostationary orbit, 36,000 km above the Earth. To do so, such restraint had better be resolved. Korean space industry, as it is alike in other countries, started with putting and manufacturing sounding rockets, producing satellites but relying on foreign launching facilities, and learning launching capacities. Experiencing three time launchings of KITSAT, the current satellite projects of Korea are undertaken as follows: - Koreasat - STSAT - Komsat - MBSAT - COMS (Communication, Ocean, and Meteorological Satellite) Koreans waked up to the things of outer space in 2008 with the first Korean astronaut Li So-yeon, a lady bio systems engineer. Although the first Korean made rocket in cooperation with a Russian company to fire last August 2009 was a failure, it should be considered as an inevitable process for future endeavors. There are currently three outer space related laws of Korea: Aerospace Industry Development Promotion Act 1987, Outer Space Development Promotions Act 2005, and Space Damage Compensation Act 2008. The first two stemming from the two different ministries are, however, overlapping in many aspects and have some shortcomings to be improved.

  • PDF

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

A Study on the Effectiveness of Care of Patients with Alzheimer s Disease According to Residence Arrangement and Types of Services (치매노인의 거주형태 및 서비스유형에 따른 간호관리의 효과분석)

  • 홍여신;박현애;조남옥
    • Journal of Korean Academy of Nursing
    • /
    • v.26 no.4
    • /
    • pp.768-781
    • /
    • 1996
  • The problem of care of patients and families with Alzheimer's disease has become a conscious raising social policy issue in Korea. The government of the Republic of Korea has become cognizant of the situation and has begun searching for ways to remedy it. Thus, there is a need for a comprehensive under-standing of the situation in which patients and their families are struggling and the enormous problems of care. With a realization of the urgent need, this study was done to investigate the situation and the care needs of families with patients with Alzheimer's Disease, and to compare the effectiveness of services utilized by the families in terms of cost and effects on patient's conditions and on family live. The Subjects for the study were 29 families with hospitalized patients, 25 families utilizing hospital outpatient clinics, 14 families utilizing day care facilities, and 16 families with homebound patients. A total of 84 families were interviewed by four trained interviewers using structured and semistructured questionnaires. The data produced from these interviews included : the patient's stage of Alzheimer's disease, patient's bizarre behavior, hours spent on patient care per day, family burden and quality of life, direct and indirect costs encountered in the care of patients, and the families' evaluation of the effectiveness of the services received. The data were analyzed to determine the relationships between family charactersistics, patient's conditions and services utilization. The effectiveness of each of the service entities was assessed through families evaluation and hoped for service and comparisons were made between services in terms of the cost-effectiveness ratios. After initial comparison of cost-effectiveness ratios, further analysis was done to compare between groups for incremental effectiveness for each incremental unit of cost to determine the most cost-effective service entities. The findings of the study are as fellows : 1. The choice of living arrangement and the types of services are a function of the stage of Alzheimer's condition and the economic status of the family. 2. Comparision of the cost of care showed that most expenses were encountered in by families with hospitalization, families using outpatient services, and families using day care services in that order. The least expense was involved in the care of homebound patients. The economic burden felt by families was in the same order as expenses. 3. The average number of hours spent on daily patient care was 9.9 hours for the outpatient clinic users, 9.7 hours for homebound patients, and 5.4 hours for day care users. 4. There were significant differences in the patient's conditions (CDRL), bizarre behaviors and the families's burden by living arrangement and /or types of service. However, no significant difference was found between groups in the family's quality of life. 5. The families rated the services of day care center as most effective for the care of the patients and families, except for a few families who had experienced some improvement in the patient's conditions. The outpatient clinic users expressed psychological comforts mainly in that the patient was being taken care of. For those hospitalized patients, families expressed the comfort of being relieved of the burden of care and that the patient is being professionally cared for. Form the analysis of the costs, hours of patient care, patient's bizarre behaviors, family's quality of life and burdens, and family's evaluation of services, it is concluded that up to the mid stage of Alzheimer's condition, the utilization of day care center services is found to be the most cost-effective, and toward the end stage of the Alzheimer's disease, it is hoped that there will be a establishment of long term or short term in-patient facilities for the protection of patients and preservation of the integrity of families for less cost. Thus. it was concluded that the family centered system of care is the most effective for Korea with systematic support systems developed for the care of patients and their families according to the needs of families as the patient's condition deteriorates.

  • PDF

Modulation of Cellulalr Quinone Reductase Inducibility by Roasting Treatment and Acid Hydrolysis of Perilla (들깨의 볶음처리와 산가수분해에 의한 세포모델계 Quinone Reductase 활성유도능의 변화)

  • Hong, Eun-Young;Kang, Hee-Jung;Kwon, Chong-Suk;Nam, Young-Jung;Suh, Myung-Ja;Kim, Jong-Sang
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.26 no.2
    • /
    • pp.186-192
    • /
    • 1997
  • Increased activities of phase 2 enzymes including quinone reductase(QR) have been reported to be associated with protection of animals from neoplastic, mutagenic, and other toxic effects of many carcinogens. In previous study, we found that methanol extract of roasted and defatted perilla meal induced the activity of quinone reductase, an anticarcinogenic marker enzyme, in murine hepalc1c7 cells. Current study showed that unroasted perilla had a limited QR-inducing activity, suggesting that roasting cause the generation of active component(s). Thus we hypothesized that QR inducer in perilla might be covalently linked to sugar moiety and released during roasting process. Methanol extract of defatted raw perilla was subject to acid treatment in order to hydrolyze the potential sugar moiety. Prolonged hydrolysis of methanol extract of defatted raw perilla at $98{\sim}100^{\circ}C$ increased the ability to induce cytosolic QR activity of hepalclc7 cells. Furthermore roasting at 180 and $200^{\circ}C$ resulted in significant induction of QR activity. The result strongly support the idea that QR inducer(s) is present in bound form in raw perilla and released during roasting. Cellular QR activity was induced proportionately with the increase of concentration of methanol extract of roasted perilla. The induction of QR by defatted perilla was also examined in the cytosols of liver, small intestine, stomach, lung and kidney of male ICR mice. Induction patterns showed specificity with respect to target tissue and roasting of perilla. Unroasted perilla meal (defatted) significantly induced QR in liver and lung, while roasted perilla meal induced QR in liver and stomach. The observation that raw perilla showed similar QR induction patterns to roasted perilla is consistent with our proposal that QR inducer(s) is present in bound form and released by physical and chemical treatments as digestive or microbial enzymes could release the inducers from inactive glycoside forms in gastrointestinal tract of mice. In conclusion, perilla could exert protective effect against chemically induced carcinogenesis by inducing phase 2 enzymes in biological systems regardless of chemical and physical process such as roasting.

  • PDF