{"id":314,"date":"2024-04-21T21:17:45","date_gmt":"2024-04-21T21:17:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/?p=314"},"modified":"2024-04-21T21:17:45","modified_gmt":"2024-04-21T21:17:45","slug":"article-review-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/2024\/04\/21\/article-review-1\/","title":{"rendered":"Article review 1"},"content":{"rendered":"Article1 review:<br \/>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/214\/81<br \/>Mitigating Ransomware Risks in Manufacturing and the Supply chain: A comprehensive<br \/>Security Framework<br \/>It&#8217;s crucial for businesses to implement comprehensive security measures to protect<br \/>themselves against cyber threats. An organization&#8217;s security posture refers to the various<br \/>elements, including individuals, procedures, and technologies, that safeguard its information<br \/>systems, data, and assets against cyber threats. A framework has been developed to examine the<br \/>relationship between employee training, awareness, behavior, adherence, and the overall security<br \/>posture within a business. The organization&#8217;s security-related training and communication<br \/>programs, specifically focused on employee training and awareness, are the independent variable<br \/>in this case. The aim is to enhance employee behavior and adherence as mediating factors.<br \/>Efficient training awareness programs can help improve staff behavior and encourage adherence<br \/>to security protocols. The hypotheses explores how employee behavior and adherence mediate<br \/>technological solution implemntartion, supply chain resilience measures, and collaboration. The<br \/>study of this found that embracing these idea will improve the framework security<br \/>process.potheses The results of the study showed that all four hypotheses were approved based<br \/>on established criteria. Employee training and awareness, mediated by employee behavior and<br \/>adherence, significantly affect the comprehensive security posture of an organization. The<br \/>statistical study showed a strong association, with a p-value of 0.012 and a t-value of 3.01. The<br \/>study also found that employee behavior and adherence mediate the relationship between<br \/>organizational practices and training, technical solutions, supply chain resilience, cooperation,<br \/>and security posture. This topic relates to concepts from class, because we talk about how<br \/>important software security is, and how people working machines need to be trained and<br \/>prepared. This study makes a contribution to the cybersecurity world by taking a comprehensive<br \/>approach to evaluating security postutes. This article gives us an understanding that goes beyond<br \/>traditional technological solutions. The article ephasises the need for a thorough and unified<br \/>strategy that makes a consideration to advance technology as well as the human factor of it.","protected":false},"excerpt":{"rendered":"<p>Article1 review:https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/214\/81Mitigating Ransomware Risks in Manufacturing and the Supply chain: A comprehensiveSecurity FrameworkIt&#8217;s crucial for businesses to implement comprehensive security measures to protectthemselves against cyber threats. An organization&#8217;s security posture refers to the variouselements, including individuals, procedures, and technologies, that safeguard its informationsystems, data, and assets against cyber threats. A framework has been developed to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/2024\/04\/21\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":28624,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/314"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/users\/28624"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/comments?post=314"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/314\/revisions"}],"predecessor-version":[{"id":315,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/314\/revisions\/315"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/media?parent=314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/categories?post=314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/tags?post=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}