Article review 1

Article1 review:
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/214/81
Mitigating Ransomware Risks in Manufacturing and the Supply chain: A comprehensive
Security Framework
It’s crucial for businesses to implement comprehensive security measures to protect
themselves against cyber threats. An organization’s security posture refers to the various
elements, including individuals, procedures, and technologies, that safeguard its information
systems, data, and assets against cyber threats. A framework has been developed to examine the
relationship between employee training, awareness, behavior, adherence, and the overall security
posture within a business. The organization’s security-related training and communication
programs, specifically focused on employee training and awareness, are the independent variable
in this case. The aim is to enhance employee behavior and adherence as mediating factors.
Efficient training awareness programs can help improve staff behavior and encourage adherence
to security protocols. The hypotheses explores how employee behavior and adherence mediate
technological solution implemntartion, supply chain resilience measures, and collaboration. The
study of this found that embracing these idea will improve the framework security
process.potheses The results of the study showed that all four hypotheses were approved based
on established criteria. Employee training and awareness, mediated by employee behavior and
adherence, significantly affect the comprehensive security posture of an organization. The
statistical study showed a strong association, with a p-value of 0.012 and a t-value of 3.01. The
study also found that employee behavior and adherence mediate the relationship between
organizational practices and training, technical solutions, supply chain resilience, cooperation,
and security posture. This topic relates to concepts from class, because we talk about how
important software security is, and how people working machines need to be trained and
prepared. This study makes a contribution to the cybersecurity world by taking a comprehensive
approach to evaluating security postutes. This article gives us an understanding that goes beyond
traditional technological solutions. The article ephasises the need for a thorough and unified
strategy that makes a consideration to advance technology as well as the human factor of it.

Leave a Reply

Your email address will not be published. Required fields are marked *