Integration of ISMS into the Organization’s Strategy and Its Impact on Security Culture in the Digital Environment
Abstract
1. Introduction
2. Theoretical Background
2.1. Information Security Management and Related Roles
2.2. Culture of Information Security and Digital Transformation
3. Methodology
4. Results
5. Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Aftabi, N., Moradi, N., Mahroo, F., & Kianfar, F. (2025). SD-ABM-ISM: An integrated system dynamics and agent-based modeling framework for information security management in complex information systems with multi-actor threat dynamics. Expert Systems with Applications, 263, 125681. [Google Scholar] [CrossRef]
- Ahmad, A., Maynard, S. B., & Park, S. (2019). Information security strategies for digital transformation: The role of ISMS. Journal of Information Security and Applications, 48, 102345. [Google Scholar] [CrossRef]
- Alheadary, W. G. (2023). Towards development of a security risk assessment model for Saudi Arabian business environment based on the ISO/IEC 27005 ISRM standard. Journal of Information Security, 14(3), 195–211. [Google Scholar] [CrossRef]
- AlHogail, A. (2015). Design and validation of information security culture framework. Computers in Human Behavior, 49, 567–575. [Google Scholar] [CrossRef]
- Ali, R. F., Dominic, P. D. D., Ali, S. E. A., Rehman, M., & Sohail, A. (2021). Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance to compliance. Applied Sciences, 11(8), 3383. [Google Scholar] [CrossRef]
- Ali, S. E. A., Lai, F. W., Hassan, R., & Shad, M. K. (2021). The long-run impact of information security breach announcements on investors’ confidence: The context of efficient market hypothesis. Sustainability, 13(3), 1066. [Google Scholar] [CrossRef]
- Alzahrani, L., & Seth, K. P. (2021). The impact of organizational practices on the information security management performance. Information, 12(10), 398. [Google Scholar] [CrossRef]
- Antunes, M., Maximiano, M., & Gomes, R. (2024). A client-centered information security and cybersecurity auditing framework. Applied Sciences, 12(9), 4102. [Google Scholar] [CrossRef]
- Arredondo-Soto, K. C., Blanco-Fernandez, J., Miranda-Ackerman, M. A., Solis-Quinteros, M. M., Realyvasquez-Vargas, A., & Garcia-Alcaraz, J. L. (2021). A plan-do-check-act based process improvement intervention for quality improvement. IEEE Access, 9, 1. [Google Scholar] [CrossRef]
- Astakhova, L. V. (2020). A corporate employee as a subject of corporate information security management. Scientific and Technical Information Processing, 47(2), 113–118. [Google Scholar] [CrossRef]
- Azmi, N. A. A. M., Teoh, A. P., Vafaei-Zadeh, A., & Hanifah, H. (2021). Predicting information security culture among employees of telecommunication companies in an emerging market. Information and Computer Security, 29(5), 866–882. [Google Scholar] [CrossRef]
- Bagaryakov, A. V., & Nikulina, N. L. (2012). Investigation of economic security in terms of relations “innovation security—Innovation culture”. Ekonomika Regiona-Economy of Region, 4, 179–515. [Google Scholar] [CrossRef]
- Barton, K. A., Tejay, G., Lane, M., & Terrell, S. (2016). Information system security commitment: A study of external influences on senior management. Computers & Security, 59, 9–25. [Google Scholar] [CrossRef]
- Bell, J., Cooper, L., Nelson, A., & Qureshi, K. (2025). Human-centered cybersecurity: Building a culture of data protection in the digital era. Available online: https://www.researchgate.net/publication/396774678_Human-Centered_Cybersecurity_Building_a_Culture_of_Data_Protection_in_the_Digital_Era (accessed on 9 September 2025).
- Bernik, I., & Prislan, K. (2016). Measuring information security performance with 10 by 10 model for holistic state evaluation. PLoS ONE, 11(9), e0163050. [Google Scholar] [CrossRef] [PubMed]
- Blasková, M., Tumová, D., & Miciak, M. (2022). Taxonomy of factors involved in decision-making to sustain organization members’ creativity. Administrative Sciences, 12(1), 39. [Google Scholar] [CrossRef]
- Brezavšček, A., & Baggia, A. (2025). Recent trends in information and cyber security maturity assessment: A systematic literature review. Systems, 13(1), 52. [Google Scholar] [CrossRef]
- Brunner, M., Sauerwein, C., Felderer, M., & Breu, R. (2020). Risk management practices in information security: Exploring the status quo in the DACH region. Computers & Security, 92(1), 101776. [Google Scholar] [CrossRef]
- Cheimonidis, P., & Rantos, K. (2023). Dynamic risk assessment in cybersecurity: A systematic literature review. Future Internet, 15(10), 324. [Google Scholar] [CrossRef]
- Cho, H., & Cho, K. (2025). Impact of security management activities on corporate performance. Systems, 13(8), 633. [Google Scholar] [CrossRef]
- Colabianchi, S., Costantino, F., Nonino, F., & Palombi, G. (2025). Transforming threats into opportunities: The role of human factors in enhancing cybersecurity. Journal of Innovation & Knowledge, 10(3), 100695. [Google Scholar] [CrossRef]
- Creative Solution. (2025). ISMS|CeMS|Slovník pojmov. Cems.sk. Available online: https://www.cems.sk/clanok/796-isms (accessed on 28 August 2025).
- Creswell, J. W., & Plano Clark, V. L. (2018). Designing and conducting mixed methods research (3rd ed.). SAGE Publications. ISBN 9781483344379. Available online: https://bayanbox.ir/view/236051966444369258/9781483344379-Designing-and-Conducting-Mixed-Methods-Research-3e.pdf (accessed on 28 August 2025).
- Da Veiga, A., Astakhova, L. V., Botha, A., & Herselman, M. E. (2020). Defining organisational information security culture—Perspectives from academia and industry. Computers & Security, 92, 101713. [Google Scholar] [CrossRef]
- de la Paz, J. V. B., Picón, L. A. R., Rocha, V. M., & Argüelles, S. V. T. (2023). A Systematic review of risk management methodologies for complex organizations in industry 4.0 and 5.0. Systems, 11(5), 218. [Google Scholar] [CrossRef]
- Domínguez, R. D., Flores, O. A., & Sánchez-Valdez, J. A. (2023). Exploratory analysis of a measurement scale of an information security management system. arXiv. [Google Scholar] [CrossRef]
- Dornheim, P., & Zarnekow, R. (2024). Determining cybersecurity culture maturity and deriving verifiable improvement measures. Information and Computer Security, 32(2), 179–196. [Google Scholar] [CrossRef]
- Duc, A. N., & Chirumamilla, A. (2019, September 18–20). Identifying security risks of digital transformation—An engineering perspective [Lecture notes in computer science]. Conference on e-Business, e-Services and e-Society, Trondheim, Norway. [Google Scholar] [CrossRef]
- Ford, A., Al-Nemrat, A., Ghorashi, S. A., & Davidson, J. J. (2022, March 17–18). Impact of CISO appointment announcements on the market value of firms. International Conference on Cyber Warfare and Security, Albany, NY, USA. [Google Scholar] [CrossRef]
- Green, J. (2024). Information security management principles (4th ed.). O’Reilly. ISBN 9781780176932. [Google Scholar]
- Gschwandtner, M., Demetz, L., Gander, M., & Maier, R. (2019, August 27–30). Integrating threat intelligence to enhance an organization’s information security management. 13th International Conference on Availability, Reliability and Security (Ares 2018), Hamburg, Germany. [Google Scholar] [CrossRef]
- Guzmán, G. K. V., Chiquito-Penaranda, D. A., Vilche, A. E. A., Lozano, E. W. E., & Ferrer, S. J. C. (2025). Sustainable technological strategies for document management: Case study at the business technological university of Guayaquil. Revista Universidad Y Sociedad, 17(3), 1–10. [Google Scholar]
- Harris, J. D. (2011). Preparing to be the chief information officer. Journal of Leadership, Accountability, and Ethics, 8(5), 56–62. [Google Scholar]
- Hassan, Y., Ghazal, T. M., Yasir, S., Al-Adwan, A. S., Younes, S. S., Albahar, M. A., Ahmad, M., & Ikram, A. (2025). Exploring the mediating role of information security culture in enhancing sustainable practices through integrated systems infrastructure. Sustainability, 17(2), 687. [Google Scholar] [CrossRef]
- Haufe, K., Colomo-Palacios, R., Dzombeta, S., Brandis, K., & Stantchev, V. (2016). ISMS core processes: A study. Procedia Computer Science, 100, 339–346. [Google Scholar] [CrossRef]
- Hillman, D., Harel, Y., & Toch, E. (2023). Evaluating organizational phishing awareness training on an enterprise scale. Computer & Security, 132, 103364. [Google Scholar] [CrossRef]
- Hohan, A. I., Olaru, M., & Pirnea, I. C. (2015). Assessment and continuous improvement of information security based on TQM and business excellence principles. Procedia Economics and Finance, 32, 352–359. [Google Scholar] [CrossRef]
- Horne, C. A., Maynard, S. B., & Ahmad, A. (2017). Organisational information security strategy: Review, discussion and future research. Australasian Journal of Information Systems, 21. [Google Scholar] [CrossRef]
- ISO. (2022). Information security, cybersecurity and privacy protection—Information security management systems—Requirements (ISO/IEC Standard No. 27001:2022). ISO.
- IteraSec. (2025). ISO 27001 implementation: Comprehensive guide. online. Available online: https://iterasec.com/blog/iso-27001-implementation-guide-for-it-companies/ (accessed on 26 August 2025).
- Jankal, R. (2014). Software support of quality management in the service sector. Lumen 2014—From Theory to Inquiry in Social Sciences, 149, 443–448. [Google Scholar] [CrossRef]
- Jawaharrani, K., Lekshmi, R. S., Nirmala, G., & Dheenadhayalan, K. (2023, May 25–26). Role of CISO—Cyber security & risk management. 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India. [Google Scholar] [CrossRef]
- Jin, X. L., Cui, H. Z., Liu, F. W., Hu, Z. Q., & Cai, Y. H. (2025). Does cybersecurity regulation promote digital transformation? Evidence from the cyber security law in China. Finance Research Letters, 76, 1–9. [Google Scholar] [CrossRef]
- Kamil, Y., Lund, S., & Islam, M. S. (2023). Information security objectives and the output legitimacy of ISO/IEC 27001: Stakeholders’ perspective on expectations in private organizations in Sweden. Information Systems and E-Business Management, 21, 107041. [Google Scholar] [CrossRef]
- Kanaan, A., Mtair AL-Hawamleh, A., Aloun, M., Alorfi, A., & Abdalwahab Alrawashdeh, M. (2025). Fortifying organizational cyber resilience: An Integrated framework for business continuity and growth amidst escalating threat landscapes. International Journal of Computing and Digital Systems, 17(1), 1–14. [Google Scholar] [CrossRef]
- Kankanhalli, A., Teo, H. H., Tan, B. C., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139–154. [Google Scholar] [CrossRef]
- Karlsson, M., Karlsson, F., Åström, J., & Denk, T. (2022). The effect of perceived organizational culture on employees’ information security policy compliance. Information and Computer Security, 30(3), 382–401. [Google Scholar] [CrossRef]
- Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2023). The ISO/IEC 27001 information security management standard: How to extract value from data in the IT sector. Sustainability, 15(7), 5828. [Google Scholar] [CrossRef]
- Koman, G., Toamn, D., Jankal, R., & Borsos, P. (2023). Risk management in a human resource information system. Entrepreneurship and Sustainability Issues, 11(1), 331–352. [Google Scholar] [CrossRef] [PubMed]
- Kö, A., Tarján, G., & Mitev, A. Z. (2023). Information security awareness maturity: Conceptual and practical aspects in Hungarian organizations. Information Technology & People, 36(8), 174–195. [Google Scholar] [CrossRef]
- Krúpová, S., Koman, G., Soviar, J., & Holubcík, M. (2025). The role of business models in smart-city waste management: A framework for sustainable decision-making. Systems, 13(7), 556. [Google Scholar] [CrossRef]
- Linkov, I., Trump, B. D., & Keisler, J. (2013). Resilience metrics for cyber systems. Environment Systems and Decisions, 33(4), 471–476. [Google Scholar] [CrossRef]
- Magnusson, L., Iqbal, S., Elm, P., & Dalipi, F. (2025). Information security governance in the public sector: Investigations, approaches, measures, and trends. International Journal of Information Security, 24(4), 177. [Google Scholar] [CrossRef]
- Meglaras, L., Drivas, G., Chouliaras, N., Boiten, E., Lambrinoudakis, C., & Ioannidis, S. (2020, November 27–29). Cybersecurity in the era of digital transformation: The case of Greece. 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), Zhenjiang, China. [Google Scholar] [CrossRef]
- Mirtsch, M., Blind, K., Koch, C., & Dudek, G. (2021). Information security management in ICT and non-ICT sector companies: A preventive innovation perspective. Computers & Security, 109, 102383. [Google Scholar] [CrossRef]
- Mohamad, M., Steghöfer, J.-P., Knauss, E., & Scandariato, R. (2024). Managing security evidence in safety-critical organizations. Journal of Systems and Software, 214, 112082. [Google Scholar] [CrossRef]
- Monev, V. (2020, September 17–18). Organisational information security maturity assessment based on ISO 27001 and ISO 27002. 2020 International Conference on Information Technologies (InfoTech), Varna, Bulgaria. [Google Scholar] [CrossRef]
- Namuduri, K., & Varanasi, M. R. (2011, March 23–25). The chief security officer problem. Annual Conference on Information Sciences and Systems, Baltimore, MD, USA. [Google Scholar] [CrossRef]
- Naughton, E., Moran, R., Kharub, M., Sa, J. C., & McDermott, O. (2024). A structured model for continuous improvement methodology deployment and sustainment: A case study. Heliyon, 10(21), e40034. [Google Scholar] [CrossRef] [PubMed]
- NIST. (2020). Security and privacy controls for information systems and organizations (NIST Standard No. SP 800-53). Revision 5. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf (accessed on 9 September 2025).
- NIST. (2021). Framework for improving critical infrastructure cybersecurity. National Institute of Standards and Technology. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (accessed on 9 September 2025).
- Nurbojatmiko, N., Karimiyah, M. S. K., Asnadi, N. M., & Anisyah, R. (2025). ISO 27001 as information security solution in society 5.0 Era: Systematic literature review. SinkrOn, 9(1), 484–492. [Google Scholar] [CrossRef]
- Nurse, J. R. C., Milward, J., & Alashe, O. (2025, June 22–27). From security awareness and training to human risk management in cybersecurity. HCI For Cybersecurity, Privacy and Trust, HCI-CPT 2025, PT I (Vol. 15814, pp. 86–104), Gothenburg, Sweden. [Google Scholar] [CrossRef]
- Paek, S. Y., & Lee, J. L. (2025). Promoting employees’ information security vigilance by enhancing awareness: The roles of organizational climate and deterrence measures. Security Journal, 38(1), 12. [Google Scholar] [CrossRef]
- Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Computers & Security, 66(66), 40–51. [Google Scholar] [CrossRef]
- Patterson, C. M., Nurse, J. R. C., & Franqueira, V. N. L. (2023). Learning from cyber security incidents: A systematic review and future research agenda. Computer & Security, 132, 103309. [Google Scholar] [CrossRef]
- Peltier, T. R. (2016). Information security policies, procedures, and standards: Guidelines for effective information security management (312p.). Auerbach Publications. ISBN 9780429114717. [Google Scholar] [CrossRef]
- Prislan, K., Mihelič, A., & Bernik, I. (2020). A real-world information security performance assessment using a multidimensional socio-technical approach. PLoS ONE, 15(9), e0238739. [Google Scholar] [CrossRef] [PubMed]
- Qusef, A., Arafat, M., & Al-Taher, S. (2018, June 26–27). Organizational management role in information security management system. 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan. [Google Scholar] [CrossRef]
- Randaliev, P., Roure, D. D., Nurse, J. R. C., Nicolescu, R., Huth, M., Cannady, S., & Montalvo, R. M. (2019). Cyber risk impact assessment—Assessing the RISC from the IoT to the digital economy. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Applied Sciences, 169, 1–6. [Google Scholar] [CrossRef]
- Realyvásquez-Vargas, A., Arredondo-Soto, K., Carrillo-Gutiérrez, T., & Ravelo, G. (2018). Applying the plan-do-check-act (PDCA) cycle to reduce the defects in the manufacturing industry. A case study. Applied Sciences, 8(11), 2181. [Google Scholar] [CrossRef]
- Rogers, E. M. (2003). Diffusion of innovations (5th ed.). Free Press. Available online: https://teddykw2.wordpress.com/wp-content/uploads/2012/07/everett-m-rogers-diffusion-of-innovations.pdf (accessed on 29 August 2025).
- Rusu, D., & Mantulescu, M. (2025). Development of an application-based framework for information security management in SMEs. Sustainability, 17(18), 8314. [Google Scholar] [CrossRef]
- Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2020). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23(15), 6666. [Google Scholar] [CrossRef]
- Saeidi, P., Sofian, S., Rasid, S., & Saeid, S. P. (2012). The role of chief risk officer in adoption and implementation of enterprise risk management—A literature review. International Research Journal of Finance and Economics, 88, 18–123. [Google Scholar]
- Schein, E. H. (2010). Organizational culture and leadership (4th ed., 457p). Jossey-Bass a Wiley Imprint. ISBN 978-0-470-18586-5. [Google Scholar]
- Schmitz, C., Schmid, M., Harborth, D., & Pape, S. (2021). Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities. Computers & Security, 108, 102306. [Google Scholar] [CrossRef]
- Shojaie, B., Federrath, H., & Saberi, I. (2014, September 8–12). Evaluating the effectiveness of ISO 27001: 2013 based on annex A. 2014 Ninth International Conference on Availability, Reliability and Security, Fribourg, Switzerland. [Google Scholar] [CrossRef]
- Solomon, G., & Brown, I. (2021). The influence of organisational culture and information security culture on employee compliance behaviour. Journal of Enterprise Information Management, 34(4), 1203–1228. [Google Scholar] [CrossRef]
- Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215–225. [Google Scholar] [CrossRef]
- Stewart, H. (2023). Digital transformation security challenges. Journal of Computer Information Systems, 63(4), 919–936. [Google Scholar] [CrossRef]
- Sun, L., Zhang, H., & Fang, C. (2021). Data security governance in the era of big data: Status, challenges, and prospects. Data Science and Management, 2, 41–44. [Google Scholar] [CrossRef]
- Sun, Z., Zhang, J., Yang, H., & Li, J. (2020, June 12–14). Research on the effectiveness analysis of information security controls. 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China. [Google Scholar] [CrossRef]
- Susanto, H., Almunawar, M. N., & Tuan, Y. C. (2018). Information security challenges in digital transformation: A review. Journal of Computer Science, 14(3), 360–370. [Google Scholar] [CrossRef]
- Tolah, A., Sas, A., & Furnell, S. (2021). An empirical analysis of the information security culture key factors framework. Computers & Security, 108, 102354. [Google Scholar] [CrossRef]
- Tornatzky, L., & Fleischer, M. (1990). The processes of technological innovation. Lexington Books. Available online: https://www.scribd.com/document/852057567/The-Processes-of-Technological-Innovation (accessed on 1 September 2025).
- Tu, C. Z., Yuan, Y., Archer, N., & Connelly, C. E. (2018). Strategic value alignment for information security management: A critical success factor analysis. Information and Computer Security, 26(2), 150–170. [Google Scholar] [CrossRef]
- Uchendu, B., Nurse, J. R. C., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computer & Security, 109, 102387. [Google Scholar] [CrossRef]
- Varmus, M., Koman, G., & Holubcík, M. (2016). Globalization aspects of creating cooperation in sport environment with support of big data. In Globalization and its socio-economic consequences, 16th international scientific conference proceedings, PTS I-V (pp. 2307–2314). ZU–University of Zilina, The Faculty of Operation and Economics of Transport and Communications, Department of Economics, Published GEORG, Zilina, Slovakia. [Google Scholar]
- Vasiel’ev, Y. S., Zegzhda, D. P., & Poltavtseva, M. A. (2018). Problems of security in digital production and its resistance to cyber threats. Autoamtic Control and Computer Sciences, 52(8), 1090–1100. [Google Scholar] [CrossRef]
- Velasco, J., Ullauri, R., Pilicita, L., Jácome, B., Saa, P., & Moscoso-Zea, O. (2018, November 13–15). Benefits of implementing an ISMS according to the ISO 27001 standard in the Ecuadorian manufacturing industry. 2018 International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador. [Google Scholar] [CrossRef]
- von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102. [Google Scholar] [CrossRef]
- Von Solms, R., & Von Solms, B. (2004). The 10 deadly sins of information security management. Computers & Security, 23(5), 371–376. [Google Scholar] [CrossRef]
- Vroom, C., & Solms, R. (2004). Towards information security behavioural compliance. Computer & Security, 23(3), 191–198. [Google Scholar] [CrossRef]
- Wang, Z. Y., Wang, N. X., & Ge, S. L. (2025). Cloud computing data security management strategy based on incremental update of data value. Journal of Enterprise Information Management, 38(5), 1579–1598. [Google Scholar] [CrossRef]
- Whitman, M. E., & Mattord, H. J. (2017). Principles of information security (6th ed., 750p). Kennesaw State University. ISBN 978-1-337-10206-3. [Google Scholar]
- Willie, M. M. (2023). The role of organizational culture in cybersecurity: Building a security-first culture. Social Science Research Network, 2, 179–198. [Google Scholar] [CrossRef]
- Yin, R. K. (2018). Case study research and application (6th ed.). SAGE Publications. ISBN 9781506336169. Available online: https://books.google.sk/books/about/Case_Study_Research_and_Applications.html?id=6DwmDwAAQBAJ&redir_esc=y (accessed on 3 November 2025).



Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Staffenova, N.; Dupakova, D.; Kubina, M. Integration of ISMS into the Organization’s Strategy and Its Impact on Security Culture in the Digital Environment. Adm. Sci. 2026, 16, 26. https://doi.org/10.3390/admsci16010026
Staffenova N, Dupakova D, Kubina M. Integration of ISMS into the Organization’s Strategy and Its Impact on Security Culture in the Digital Environment. Administrative Sciences. 2026; 16(1):26. https://doi.org/10.3390/admsci16010026
Chicago/Turabian StyleStaffenova, Nikola, Dominika Dupakova, and Milan Kubina. 2026. "Integration of ISMS into the Organization’s Strategy and Its Impact on Security Culture in the Digital Environment" Administrative Sciences 16, no. 1: 26. https://doi.org/10.3390/admsci16010026
APA StyleStaffenova, N., Dupakova, D., & Kubina, M. (2026). Integration of ISMS into the Organization’s Strategy and Its Impact on Security Culture in the Digital Environment. Administrative Sciences, 16(1), 26. https://doi.org/10.3390/admsci16010026

