Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework
Abstract
1. Introduction
How do technological, organizational, and environmental factors influence the implementation of the Zero Trust security paradigm in organizations, and what mechanisms explain its effects on governance and compliance?
2. Theoretical Background: Technology–Organization–Environment Framework and the Zero Trust Paradigm
Intertwining TOE and Zero Trust: A Multi-Contextual View
3. Conceptual Model and Hypothesis Development
3.1. Direct Effects
3.2. Mediation Effects
3.3. Moderation Effects
4. Methodological Approach
4.1. Quantitative Method: Survey Design and Data Collection
4.1.1. Operationalization of Constructs
- Strategic Commitment to Zero Trust: The degree to which an organization aligns its security vision, planning, and governance priorities with ZT principles. It reflects strategic intent, awareness of business implications, prioritization of technical requirements, and the formal integration of ZT initiatives (e.g., “My company currently has a defined Zero Trust security initiative.”)
- Information Security Culture: The shared values, norms, and behaviors that shape collective commitment to information protection. It assesses how security best practices are embedded in daily routines and internalized as organizational norms rather than enforced solely through compliance (e.g., “At my company, best practices in information security are the accepted way of doing business.”)
- Investment in Zero Trust Security: The tangible and intangible commitments enabling ZT adoption, including financial capacity, technological modernization, and human-resource development (e.g., “My company invests in Zero Trust architecture.”)
- Technical Implementation of Zero Trust Controls: The extent to which technical mechanisms translate ZT principles into practice—such as multifactor authentication, contextual access control, network segmentation, and modernization of legacy systems (e.g., “My company employs multifactor authentication for external users and employees.”)
- Information Security Governance: The policies, compliance routines, and accountability structures that institutionalize ZT practices. Items capture risk reporting, communication of governance updates, and alignment with governance, risk, and compliance (GRC) functions (e.g., “My company provides timely risk management updates to GRC stakeholders.”)
4.1.2. Assessment of Common-Method Bias (CMB)
4.1.3. Method Application
4.2. Qualitative Method: Interview Design and Data Analysis
Coding Reliability and Validation Procedures
5. Findings
5.1. Quantitative Results
5.1.1. Structural Model and Hypothesis Testing
5.1.2. Robustness and Endogeneity Assessment
5.2. Qualitative Results
6. Discussion
6.1. Implications for Practice
6.2. Implications for Theory
6.3. Limitations and Future Research Directions
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| ZT | Zero Trust |
| TOE | Technology–Organization–Environment |
Appendix A
| Instrument Indicators | Loading | Mean | S.D. | T Statistics | p Values | VIF |
|---|---|---|---|---|---|---|
| Strategic Commitment to Zero Trust: Focuses on the strategic alignment of the organization with the Zero Trust model. | ||||||
| My company currently has a defined zero trust security initiative (SCZ1) | 0.888 | 0.888 | 0.017 | 51.997 | 0.000 | 2.817 |
| My company understands the impacts of the zero trust security model on business operations (SCZ2) | 0.889 | 0.888 | 0.016 | 56.494 | 0.000 | 3.061 |
| My company knows the priorities and technical requirements for the adoption of the zero trust paradigm (SCZ3) | 0.899 | 0.898 | 0.014 | 63.125 | 0.000 | 3.284 |
| My company considers zero trust architecture to define information security technologies (SCZ4) | 0.870 | 0.870 | 0.020 | 43.391 | 0.000 | 2.577 |
| Information Security Culture: Deals with the organizational culture focused on valuing information security. | ||||||
| My company has an organizational culture that promotes strong information security practices (ISC1) | 0.892 | 0.892 | 0.016 | 55.703 | 0.000 | 2.753 |
| At my company, information security is traditionally considered an important organizational value (ISC2) | 0.863 | 0.862 | 0.026 | 33.581 | 0.000 | 2.338 |
| At my company, best practices in information security is the accepted way of doing business (ISC3) | 0.857 | 0.857 | 0.022 | 39.769 | 0.000 | 2.286 |
| At my company, the business environment promotes information security thinking (ISC4) | 0.875 | 0.874 | 0.020 | 43.809 | 0.000 | 2.464 |
| Investment in Zero Trust Security: Focuses on investments and commitment to training and technologies based on ZT architecture. | ||||||
| My company invests in zero trust architecture (IZT1) | 0.908 | 0.909 | 0.012 | 74.536 | 0.000 | 2.651 |
| At my company, the information security investment includes training and education in zero trust paradigm (IZT2) | 0.874 | 0.873 | 0.018 | 48.710 | 0.000 | 2.137 |
| In my company, information security investment is periodically reassessed using emergent trends in zero-trust architecture (IZT3) | 0.909 | 0.909 | 0.012 | 73.428 | 0.000 | 2.666 |
| Technical Implementation of Zero Trust Controls: Groups together practical actions related to the application of technical controls according to the principles of Zero Trust. | ||||||
| My company implements security tools that act as a proxy to modernize legacy technologies (TIC1) | 0.743 | 0.741 | 0.038 | 19.673 | 0.000 | 1.409 |
| My company looks at user’s posture and device position for decision-making in accessing the data layers (TIC2) | 0.813 | 0.812 | 0.024 | 34.154 | 0.000 | 1.743 |
| My company employs multifactor authentication for external users and employees (TIC3) | 0.710 | 0.707 | 0.045 | 15.795 | 0.000 | 1.324 |
| My company has context-based access policies (TIC4) | 0.806 | 0.806 | 0.030 | 27.267 | 0.000 | 1.739 |
| Information Security Governance: Relates to aspects of policies, governance, and reporting and compliance practices. | ||||||
| At my company, security breaches are reported to the appropriate authority openly and effectively (ISG1) | 0.738 | 0.733 | 0.053 | 13.882 | 0.000 | 1.429 |
| My company provides timely risk management updates to governance, risk and compliance of stakeholders (ISG2) | 0.859 | 0.858 | 0.021 | 40.667 | 0.000 | 1.724 |
| My company has relevant security control policies in place to support zero trust paradigm (ISG3) | 0.837 | 0.838 | 0.020 | 41.748 | 0.000 | 1.472 |
| Indicators | Information Security Culture | Information Security Governance | Investment in Zero Trust Security | Strategic Commitment to Zero Trust | Technical Implementation of Zero Trust Controls |
|---|---|---|---|---|---|
| IZT1 | 0.556 | 0.445 | 0.908 | 0.504 | 0.327 |
| IZT2 | 0.537 | 0.469 | 0.874 | 0.229 | 0.295 |
| IZT3 | 0.543 | 0.271 | 0.909 | 0.371 | 0.306 |
| ISC1 | 0.892 | 0.583 | 0.555 | 0.392 | 0.540 |
| ISC2 | 0.863 | 0.444 | 0.489 | 0.438 | 0.545 |
| ISC3 | 0.857 | 0.365 | 0.517 | 0.376 | 0.509 |
| ISC4 | 0.875 | 0.317 | 0.555 | 0.321 | 0.505 |
| TIC1 | 0.460 | 0.555 | 0.224 | 0.430 | 0.743 |
| TIC2 | 0.533 | 0.409 | 0.338 | 0.522 | 0.813 |
| TIC3 | 0.580 | 0.534 | 0.384 | 0.443 | 0.710 |
| TIC4 | 0.537 | 0.579 | 0.314 | 0.385 | 0.806 |
| ISG1 | 0.523 | 0.738 | 0.416 | 0.379 | 0.382 |
| ISG2 | 0.638 | 0.859 | 0.592 | 0.582 | 0.452 |
| ISG3 | 0.650 | 0.837 | 0.341 | 0.233 | 0.379 |
| SCZ1 | 0.535 | 0.425 | 0.323 | 0.888 | 0.314 |
| SCZ2 | 0.355 | 0.361 | 0.317 | 0.889 | 0.440 |
| SCZ3 | 0.219 | 0.243 | 0.316 | 0.899 | 0.400 |
| SCZ4 | 0.460 | 0.315 | 0.482 | 0.870 | 0.294 |
Appendix B
Semi Structured Interview Protocol
- How much professional experience do you have (in years)?
- How long have you worked for this organization (in years)?
- Is the organization private, public, or another type of activity?
- Is the origin of the organization’s capital 100% Brazilian? If not, what other nationalities are involved in the organization, and which one prevails? Please elaborate.
- 5.
- Is ZT the future of data protection in organizations? Please elaborate.
- 6.
- What do you understand about the impacts of adopting ZT in organizations? Please elaborate.
- 7.
- Do you believe that implementing ZT has any effect on productivity at work? Please elaborate.
- 8.
- What are the three main challenges for the adoption of ZT principles in organizations? Please elaborate.
- 9.
- How does your organization understand the adoption of ZT?
- 10.
- What are the biggest barriers to adopting ZT in your organization?
- 11.
- Within information security, what is ZT’s priority for your organization?
Appendix C
| First-Order Codes (Quotations) | Second-Order Themes (Axial Codes) | Aggregate Dimensions |
|---|---|---|
| “Information security is always seen as something that should not cause, I would say, inconvenience… but it truly appears to be a hindrance to the business. Therefore, this is a big challenge.” (ID8) | Perception of Security as an Obstacle to Business | Strategic Commitment to Zero Trust |
| “…it is only in the security layer and does not interact with the business layer….” (ID21) | Disconnection Between Security and Business Value | |
| “So, I always work from a risky perspective, then we have to prioritize things and do things in priority order.” (ID15) | Prioritization of Security Based on Business Risk | |
| “Today, the board, the shareholders, they already understand that information security is crucial for business continuity.” (ID8) | Executive Support for Zero Trust Strategy | |
| “…you must have a strategy aimed at implementing zero-trust… to have this paradigm working in fact, you necessarily must have a very well-consolidated strategy…” (ID6) | Need for a Consolidated Security Strategy | |
| “…this is a project that not only involves technology, but I would also involve businesspeople right away…I would not implement something in a top down way…I would implement it within an area in such a way that it could generate a result, and if this result is beneficial, it could necessarily spread to the rest of the company.” (ID22) | Cross-Functional Integration in Strategy | |
| “The image of the brand that remains because you have lost data or have leaked data from a patient.” (ID1); “Especially, in a bank where an incident can undermine the bank’s credibility.” (ID6); “…the company is a giant… it already adopts all systems; it cannot sell something it does not use…” (ID17) | Brand Image and Reputation Depend on Security | Information Security Culture |
| “We sell security systems to the customer and if we don’t apply this ourselves…” (ID16) | Cultural Integrity and Internal Application | |
| “… for the company to make this decision to implement, it has to understand if this is part of it, if this is in line with the business model it has established…” (ID24) | Alignment with Corporate Identity | |
| “…the cultural impact, I think is the main impact you have within any security principle…” (ID1); “…the IT culture itself. I talked about the impact on users, budget, investments, and the IT culture itself.” (ID7); “Cultural aspects are extremely important from the point of view of trust.” (ID22) | Cultural Resistance to Change | |
| “…the training of professionals. Having a trained professional who understands the concept and who can overcome these first two barriers, which is to make management aware and to prepare the environment technologically.” (ID5) | Professional Capacity Building | Investment in Zero Trust Security |
| “And there are several trainings aimed at all levels of employees to work with data security.” (ID12); “…it should not be linked only to systems, but professional training, understanding and a lot of people at the various manufacturing levels.” (ID16); “Training and awareness… people are always a challenge.” (ID8) | Continuous Training for Security Maturity | |
| “…the financial issue in terms of architecture…I think it is essential to be able to implement zero-trust.” (ID20) | Financial Constraints and Prioritization | |
| “I think that any company has a barrier… which is investment in security. In other words, security is not cheap, it never was and never will be.” (ID1) | High Costs as Implementation Barrier | |
| “We spent six months planning zero-trust…” (ID15) | Planning Complexity and Uncertainty | Technical Implementation of Zero Trust Controls |
| “…adequacy of processes to the company’s business requirements with regard to zero-trust. I would say adequacy…maintenance, support of processes to adhere to zero-trust. More than adapting, you need to keep them updated.” (ID8); “…companies that do not have well-established process management will face great difficulty in putting this into practice, because it has a direct impact…” (ID24) | Process Readiness and Adaptation | |
| “…there can be many legacy systems in which zero-trust is not viable…” (ID13); “Companies use legacy software to trigger legacy, and this hinders zero-trust…” (ID15); “It is truly a complex business…because you have these legacy applications and they were not designed with a zero-trust approach…” (ID19) | Technological Obsolescence | |
| “….it is not something you go there and implement all at once. It is not a turn of the key… you implement and turn the key! It is a gradual process.” (ID17) | Gradual and Iterative Deployment | |
| “…the impact of capacity… background, experience of information security teams as a whole… because the concept for many people is new…” (ID27) | Capacity and Skill Gap in Security Teams | |
| “…today the company already has a policy… in fact, we are currently readjusting the policies for a higher level of zero trust, to make it even more stratified.” (ID9) | Policy Maturity and Stratification | Security Governance and Risk Communication |
| “…from the moment you apply an information security policy, you start working with encrypted data, the employees’ access itself requires authentication, depending on where you are working, you need to have an even higher level of security.” (ID12) | Policy Enforcement via Technical Means | |
| “…the IPO was made, we needed to tighten slightly more controls for compliance issues, and especially a company with public capital outside the country.” (ID19) | Security and Compliance Integration | |
| “…the regulations help as long as there are enforcements on the controls, and this will obviously reflect on the concern about the application of the zero-trust concept itself.” (ID26) | Regulatory Pressure and Enforcement |
| Latent Variable | Interviewees’ Quotations |
|---|---|
| Strategic Commitment to Zero Trust | “You must have a strategy aimed at implementing zero-trust… to have this paradigm working in fact, you necessarily must have a very well-consolidated strategy.” (ID6) |
| “…this is a project that not only involves technology, but I would also involve businesspeople right away…I would not implement something in a top down way…I would implement it within an area in such a way that it could generate a result, and if this result is beneficial, it could necessarily spread to the rest of the company.” (ID22) | |
| “I believe that you need to have an environment with a reasonably high security maturity level before thinking about an implementation of this size.” (ID23) | |
| “…we have a global structure working everywhere in our network, our firewalls, our accesses…” (ID3) | |
| “…the support of the board as a whole, because you can start at the bottom, but if you do not have people at the top setting an example and spreading the word, it does not work…” (ID2) | |
| “If it does not come from the top down, it is no use coming from an analyst of a specialist consultant…” (ID20) | |
| “…you will need to anchor and sell a project of this magnitude very well to the executives, because it takes a long time for you to have a perception of the added value.” (ID19) | |
| Information Security Culture | “…the cultural impact, I think is the main impact you have within any security principle…” (ID1) |
| “The IT culture itself. I talked about the impact on users, budget, investments, and the IT culture itself.” (ID7) | |
| “Cultural aspects are extremely important from the point of view of trust.” (ID22) | |
| “That person who creates an account there… despite being a repetitive job, he is afraid of losing his job… this change, I think it also reflects one of the difficulties of an implementation… my area will end.” (ID17) | |
| “…within any security principle, users need to be educated for this and usually they do not like it…” (ID1) | |
| “And there are several trainings aimed at all levels of employees to work with data security.” (ID12) | |
| “…it should not be linked only to systems, but professional training, understanding and a lot of people at the various manufacturing levels.” (ID16) | |
| “…component of human behavior… not paying attention to what you’re doing, any employee can put the company at risk, that is why I strongly believe that zero-trust truly is the future.” (ID3) | |
| Investment in Zero Trust Security | “I think that any company has a barrier… which is the investment in security. In other words, security is not cheap, it never was and never will be.” (ID1) |
| “…we are having great difficulty fitting this… budget is going to be a problem.” (ID15) | |
| “The financial issue in terms of architecture… I think it is essential to be able to implement zero-trust.” (ID20) | |
| “… good planning, a good budget helps to defend zero-trust… I think that supporting good planning and awareness of companies…” (ID17) | |
| “The training of professionals. Having a trained professional who understands the concept and who can overcome these first two barriers…” (ID5) | |
| “For more mature companies, the zero trust model is already starting to be a reality, but the investment is high, considering people, tools, implementation and integration.” (ID23) | |
| “We are working to understand… As this company is global… a lot of information comes from abroad, information in English, and we know that here in Brazil there is a difficulty with language.” (ID7) | |
| Technical Implementation of ZT Controls | “…it is not something you go there and implement all at once. It is not a turn of the key… you implement and turn the key! It is a gradual process.” (ID17) |
| “I think it is how to do it, organize yourself, make a plan to have this security paradigm, this type of security action. I think that is the first barrier.” (ID13) | |
| “You must have tools, you cannot do zero-trust without tools, unfortunately you cannot do zero-trust with a process.” (ID15) | |
| “…arriving here with a philosophy and a control strategy that is top of line, bring together all the events, the deliverables of all the peripherals and equipment that we have, and the company does not have the basic configuration of network.” (ID21) | |
| “It is truly a complex business… because you have these legacy applications and they were not designed with a zero-trust approach, they were designed with another security strategy.” (ID19) | |
| “…the complexity of the environment increases with zero-trust, because you have to segment the networks more, you have to define a more granular level of permissions…” (ID18) | |
| “… for you to implement it in a company of this size is very impactful, because you are talking about how many thousand users there are accessing systems through the company…” (ID27) | |
| “…we have to separate the conversation from what we have within our infrastructure, and what we have from the partners that we access as third parties through our infrastructure.” (ID3) | |
| “…in the cybersecurity area there is security focused on access, there is security area focused on integration, there is microservices area, there is security area for architecture, and they do not talk…” (ID17) | |
| “…within IT we have divisions, we have people from the security area, we have people from the infrastructure area, we have the development area… In addition, these areas conflict, especially when we talk about security…” (ID18) | |
| Security Governance | “…today the company already has a policy… in fact, we are currently readjusting the policies for a higher level of the zero-trust, to make it even more stratified.” (ID9) |
| “From the moment you apply an information security policy, you start working with encrypted data, the employees’ access itself requires authentication, depending on where you are working, you need to have an even higher level of security.” (ID12) | |
| “…as for the zero-trust, it always advances in paths that are worrying from the point of view of legality… of individual rights. Therefore, the zero-trust has a very broad bias…” (ID22) | |
| “…if you do not have a very clear policy and methodology, you end up impacting productivity.” (ID2) | |
| “If it is not very well configured and there is no proactive monitoring there… it can have an impact.” (ID18) | |
| “If well implemented, built, it does not impact the productivity of employees.” (ID21) | |
| “The image of the brand that remains because you have lost data or have leaked data from a patient.” (ID1) | |
| “Especially, in a bank where an incident can undermine the bank’s credibility.” (ID6) |
References
- Pigola, A.; Meirelles, F.D.S. Zero Trust in Cybersecurity: Managing Critical Challenges for Effective Implementation. J. Syst. Inf. Technol. 2025. Epub ahead of printing. [Google Scholar] [CrossRef]
- Kindervag, J. No More Chewy Centers: The Zero Trust Model of Information Security; Forrester Research: Cambridge, MA, USA, 2016; p. 3. Available online: https://crystaltechnologies.com/wp-content/uploads/2017/12/forrester-zero-trust-model-information-security.pdf (accessed on 25 June 2024).
- Winckless, C.; Proctor, P.; Lintemuth, T. Outcome-Driven Metrics You Can Use to Evaluate Your Zero-Trust Initiative 2023. Available online: https://www.gartner.com/document/4842431?ref=solrAll&refval=400273523& (accessed on 25 June 2024).
- Kindervag, J. Build Security into Your Network’s Dna: The Zero Trust Network Architecture; Forrester Research: Cambridge, MA, USA, 2010; p. 27. Available online: http://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf (accessed on 25 June 2024).
- Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. Zero Trust Architecture; National Institute of Standards and Technology. 2020. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf (accessed on 25 June 2024).
- Pigola, A.; Meirelles, F.S.; Da Costa, P.R.; Porto, G.S. Trust in Information Security Technology: An Intellectual Property Analysis. World Pat. Inf. 2024, 78, 102281. [Google Scholar] [CrossRef]
- Winckless, C.; Olyaei, S. How to Decipher Zero Trust for Your Business 2022. Available online: https://www.gartner.com/document/4014435?ref=solrAll&refval=357881086 (accessed on 25 June 2024).
- Hankins, W.; Smith, Z.; McQuaid, A.; Fazal, N. The CISO’s Conversation Guide to Zero Trust. Available online: https://www.gartner.com/en/doc/799106-cisos-conversation-guide-to-zero-trust (accessed on 25 June 2024).
- Koeppen, D.; Watts, J. Implement Zero-Trust Network Access Through a Life Cycle Approach. Available online: https://www.gartner.com/en/documents/5398563 (accessed on 7 April 2024).
- D’Hoinne, J.; Shoard, P. Use the U.S. DoD Model for Your Zero Trust Approach: Visibility & Analytics Pillar; Gartner: Stamford, CT, USA, 2024; pp. 1–22. Available online: https://www.gartner.com/document/5124931?ref=solrAll&refval=395625636& (accessed on 7 April 2024).
- Bobbert, Y.; Timmermans, T. Zero Trust and Compliance with Industry Frameworks and Regulations: A Structured Zero Trust Approach to Improve Cybersecurity and Reduce the Compliance Burden. In Advances in Information and Communication; Arai, K., Ed.; Lecture Notes in Networks and Systems; Springer Nature: Cham, Switzerland, 2024; Volume 921, pp. 650–667. ISBN 978-3-031-54052-3. [Google Scholar]
- Google A New Approach to Enterprise Security. BeyondCorp 2018. Available online: https://www.beyondcorp.com/ (accessed on 8 April 2024).
- Shenouda, J. Zero Trust Architecture Implementation Across Industries 2024. Available online: https://www.cyber-consult.org/zero-trust-architecture-implementation-across-industries (accessed on 7 April 2024).
- Rahman, A.; Indrajit, E.; Unggul, A.; Dazki, E. Implementation of Zero Trust Security in MSME Enterprise Architecture: Challenges and Solutions. Sink. J. Penelit. Tek. Inform. 2024, 8, 2077–2087. [Google Scholar]
- Huang, W.; Xie, X.; Wang, Z.; Feng, J.; Han, G.; Zhang, W. ZT-Access: A Combining Zero Trust Access Control with Attribute-Based Encryption Scheme against Compromised Devices in Power IoT Environments. Ad Hoc Netw. 2023, 145, 103161. [Google Scholar] [CrossRef]
- Phiayura, P.; Teerakanok, S. A Comprehensive Framework for Migrating to Zero Trust Architecture. IEEE Access 2023, 11, 19487–19511. [Google Scholar] [CrossRef]
- Yeoh, W.; Liu, M.; Shore, M.; Jiang, F. Zero Trust Cybersecurity: Critical Success Factors and A Maturity Assessment Framework. Comput. Secur. 2023, 133, 103412. [Google Scholar] [CrossRef]
- Collier, Z.A.; Sarkis, J. The Zero-Trust Supply Chain: Managing Supply Chain Risk in the Absence of Trust. Int. J. Prod. Res. 2021, 59, 3430–3445. [Google Scholar] [CrossRef]
- Itodo, C.; Ozer, M. Multivocal Literature Review on Zero-Trust Security Implementation. Comput. Secur. 2024, 141, 103827. [Google Scholar] [CrossRef]
- Neale, C.; Kennedy, I.; Price, B.; Yu, Y.; Nuseibeh, B. The Case for Zero Trust Digital Forensics. Forensic Sci. Int. Digit. Investig. 2022, 40, 301352. [Google Scholar] [CrossRef]
- Uttecht, K.D. Zero Trust (ZT) Concepts for Federal Government Architectures; Report No.: FA8702-15-D-0001; Massachusetts Institute of Technologies, Lincoln Laboratory: Lexington, MA, USA, 2020; pp. 1–58. Available online: https://apps.dtic.mil/sti/citations/AD1106904 (accessed on 12 April 2024).
- Tornatzky, L.G.; Fleischer, M. The Processes of Technological Innovation; Issues in Organization and Management Series; Lexington Books: Lexington, MA, USA, 1990; ISBN 978-0-669-20348-6. [Google Scholar]
- Van Klyton, A.; Tavera-Mesias, J.; Duque, K.; Agyapong, A. Trust Dynamics for AI Implementation in High-Barrier Environments: The Moderating Effect of Government Involvement. Inf. Technol. People 2025. Epub ahead of printing. [Google Scholar] [CrossRef]
- Zhong, Y.; Chen, Z.; Ye, J.; Zhang, N. Exploring Critical Success Factors for Digital Transformation in Construction Industry–Based on TOE Framework. Eng. Constr. Arch. Manag. 2024, 32, 4227–4249. [Google Scholar] [CrossRef]
- Joyce, C.; Roman, F.L.; Miller, B.; Jeffries, J.; Miller, R.C. Emerging Cybersecurity Threats in Radiation Oncology. Adv. Radiat. Oncol. 2021, 6, 100796. [Google Scholar] [CrossRef] [PubMed]
- Awa, H.O.; Ukoha, O.; Igwe, S.R. Revisiting Technology-Organization-Environment (T-O-E) Theory for Enriched Applicability. Bottom Line 2017, 30, 2–22. [Google Scholar] [CrossRef]
- Kumar, A.; Shankar, A. Building a Sustainable Future with Enterprise Metaverse in a Data-Driven Era: A Technology-Organization-Environment (TOE) Perspective. J. Retail. Consum. Serv. 2024, 81, 103986. [Google Scholar] [CrossRef]
- Hossain, M.A.; Quaddus, M. The Adoption and Continued Usage Intention of RFID: An Integrated Framework. Inf. Technol. People 2011, 24, 236–256. [Google Scholar] [CrossRef]
- Nguyen, T.H.; Le, X.C.; Vu, T.H.L. An Extended Technology-Organization-Environment (TOE) Framework for Online Retailing Utilization in Digital Transformation: Empirical Evidence from Vietnam. J. Open Innov. Technol. Mark. Complex. 2022, 8, 200. [Google Scholar] [CrossRef]
- Prakasa, Y.; Fauzan, N. Understanding the Technological-Organizational-Environmental Concepts on SMEs’ Performance in Emerging Market. KnE Soc. Sci. 2024, 1, 43–66. [Google Scholar] [CrossRef]
- Stanojevic, M.; Capko, D.; Lendak, I.; Stoja, S.; Jelacic, B. Fighting Insider Threats, with Zero-Trust in Microservice-Based, Smart Grid OT Systems. Acta Polytech. Hung. 2023, 20, 229–248. [Google Scholar] [CrossRef]
- Awa, H.O.; Ojiabo, O.U.; Orokor, L.E. Integrated Technology-Organization-Environment (T-O-E) Taxonomies for Technology Adoption. J. Enterp. Inf. Manag. 2017, 30, 893–921. [Google Scholar] [CrossRef]
- Chwelos, P.; Benbasat, I.; Dexter, A.S. Research Report: Empirical Test of an EDI Adoption Model. Inf. Syst. Res. 2001, 12, 304–321. [Google Scholar] [CrossRef]
- Grover, V. An Empirically Derived Model for the Adoption of Customer-based Interorganizational Systems. Decis. Sci. 1993, 24, 603–640. [Google Scholar] [CrossRef]
- Shiau, W.; Hsu, P.; Wang, J. Development of Measures to Assess the ERP Adoption of Small and Medium Enterprises. J. Enterp. Inf. Manag. 2009, 22, 99–118. [Google Scholar] [CrossRef]
- Zhu, K.; Kraemer, K.; Xu, S. Electronic Business Adoption by European Firms: A Cross-Country Assessment of the Facilitators and Inhibitors. Eur. J. Inf. Syst. 2003, 12, 251–268. [Google Scholar] [CrossRef]
- Hwang, H.-G.; Ku, C.-Y.; Yen, D.C.; Cheng, C.-C. Critical Factors Influencing the Adoption of Data Warehouse Technology: A Study of the Banking Industry in Taiwan. Decis. Support Syst. 2004, 37, 1–21. [Google Scholar] [CrossRef]
- Zhu, K.; Kraemer, K.L. Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry. Inf. Syst. Res. 2005, 16, 61–84. [Google Scholar] [CrossRef]
- Awa, H.O.; Ojiabo, O.U.; Emecheta, B.C. Integrating TAM, TPB and TOE Frameworks and Expanding Their Characteristic Constructs for e-Commerce Adoption by SMEs. J. Sci. Technol. Policy Manag. 2015, 6, 76–94. [Google Scholar] [CrossRef]
- DiMaggio, P.J.; Powell, W.W. The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organizational Fields. Am. Sociol. Rev. 1983, 48, 147. [Google Scholar] [CrossRef]
- Salwani, M.I.; Marthandan, G.; Daud Norzaidi, M.; Choy Chong, S. E-commerce Usage and Business Performance in the Malaysian Tourism Sector: Empirical Analysis. Inf. Manag. Comput. Secur. 2009, 17, 166–185. [Google Scholar] [CrossRef]
- Ali, B.; Hijjawi, S.; Campbell, L.H.; Gregory, M.A.; Li, S. A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing. Secur. Commun. Netw. 2022, 2022, 3178760. [Google Scholar] [CrossRef]
- Smoljić, M. European Union Directives, National Regulations, and Zero Trust Network Architecture. In Proceedings of the 2024 47th MIPRO ICT and Electronics Convention (MIPRO), Opatija, Croatia, 20 May 2024; IEEE: Opatija, Croatia, 2024; pp. 1496–1501. Available online: https://ieeexplore.ieee.org/document/10569809/ (accessed on 12 April 2024).
- Calder, A.; Watkins, S. IT Governance: An International Guide to Data Security and ISO27001/ISO27002, 5th ed.; Kogan Page: London, UK; Philadelphia, PA, USA, 2012; ISBN 978-0-7494-6485-1. [Google Scholar]
- Winckless, C.; MacDonald, N. Explaining Zero Trust Security Approaches to Tech Executives 2023. Available online: https://www.gartner.com/document/4755131?ref=solrAll&refval=405938953& (accessed on 12 April 2024).
- Durbin, S. What’s Zero Trust, and What’s Driving Its Adoption? Available online: https://www.forbes.com/councils/forbesbusinesscouncil/2022/06/01/whats-zero-trust-and-whats-driving-its-adoption/ (accessed on 25 May 2025).
- Lund, B.D.; Lee, T.H.; Wang, Z.; Wang, T.; Mannuru, N.R. Zero-Trust Cybersecurity: Procedures and Considerations in Context 2024. Available online: https://www.preprints.org/manuscript/202408.0628/v1 (accessed on 12 April 2024).
- Bozkus, K. Organizational Culture Change and Technology: Navigating the Digital Transformation. In Business, Management and Economics; Sarfraz, M., Ul Hassan Shah, W., Eds.; IntechOpen: Rijeka, Croatia, 2024; Volume 16, ISBN 978-1-83769-318-4. [Google Scholar]
- Goldberg, S.G.; Johnson, G.A.; Shriver, S.K. Regulating privacy online: An economic evaluation of the GDPR. Am. Econ. J. Econ Polic. 2024, 16, 325–358. [Google Scholar] [CrossRef]
- Lopes, A.P.V.B.V.; De Carvalho, M.M. Evolution of the Open Innovation Paradigm: Towards a Contingent Conceptual Model. Technol. Forecast. Soc. Change 2018, 132, 284–298. [Google Scholar] [CrossRef]
- Meyer, A.D.; Goes, J.B. Organizational Assimilation of Innovations: A Multilevel Contextual Analysis. Acad. Manag. J. 1988, 31, 897–923. [Google Scholar] [CrossRef]
- Greenwood, D. Applying the Principles of Zero-Trust Architecture to Protect Sensitive and Critical Data. Netw. Secur. 2021, 2021, 7–9. [Google Scholar] [CrossRef]
- Badi, S.; Nasaj, M. Cybersecurity Effectiveness in UK Construction Firms: An Extended McKinsey 7S Model Approach. Eng. Constr. Arch. Manag. 2023, 31, 4482–4515. [Google Scholar] [CrossRef]
- Krishna, B.; Krishnan, S.; Sebastian, M.P. Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective. Inf. Syst. Front. 2023, 25, 1713–1741. [Google Scholar] [CrossRef]
- Zyoud, B.; Lebai Lutfi, S. The Role of Information Security Culture in Zero Trust Adoption: Insights From UAE Organizations. IEEE Access 2024, 12, 72420–72444. [Google Scholar] [CrossRef]
- Haddon, D.A.E. Zero Trust Networks, the Concepts, the Strategies, and the Reality. In Strategy, Leadership, and AI in the Cyber Ecosystem; Elsevier: Amsterdam, The Netherlands, 2021; pp. 195–216. Available online: https://linkinghub.elsevier.com/retrieve/pii/B978012821442800001X (accessed on 25 May 2025)ISBN 978-0-12-821442-8.
- Cummings, T.G.; Worley, C.G. Organization Development and Change, 8th ed.; Thomson/South-Western: Mason, OH, USA, 2005; ISBN 978-0-324-26060-1. [Google Scholar]
- Syed, N.F.; Shah, S.W.; Shaghaghi, A.; Anwar, A.; Baig, Z.; Doss, R. Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access 2022, 10, 57143–57179. [Google Scholar] [CrossRef]
- Benaroch, M. Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making. Inf. Syst. Res. 2018, 29, 315–340. [Google Scholar] [CrossRef]
- García-Sánchez, E.; García-Morales, V.; Martín-Rojas, R. Influence of Technological Assets on Organizational Performance through Absorptive Capacity, Organizational Innovation and Internal Labour Flexibility. Sustainability 2018, 10, 770. [Google Scholar] [CrossRef]
- Dhaigude, A.S.; Gupta, N.; Sardana, D.; Kumar, V.; Terziovski, M. The Catalytic Role of “Responsible Investments” in Innovation and Firm Performance Link: In the Context of Manufacturing in Asia-Pacific. Asia Pac. J. Manag. 2024, 41, 1315–1343. [Google Scholar] [CrossRef]
- Kosutic, D.; Pigni, F. Cybersecurity: Investing for Competitive Outcomes. J. Bus. Strat. 2022, 43, 28–36. [Google Scholar] [CrossRef]
- Tang, C.; Kumar, V.; Chaisiri, S. Understanding Software-Defined Perimeter. In Data Security in Cloud Computing; Kumar, V., Chaisiri, S., Ko, R., Eds.; Institution of Engineering and Technology: Stevenage, UK, 2017; pp. 151–169. Available online: https://digital-library.theiet.org/content/books/10.1049/pbse007e_ch7 (accessed on 28 May 2025)ISBN 978-1-78561-220-6.
- Premkumar, G. A Meta-Analysis of Research on Information Technology Implementation in Small Business. J. Organ. Comput. Electron. Commer. 2003, 13, 91–121. [Google Scholar] [CrossRef]
- Dwivedi, Y.K.; Papazafeiropoulou, A. Knowledge Management and Enterprise Systems Adoption by SMEs. J. Enterp. Inf. Manag. 2009, 22, 1–25. [Google Scholar] [CrossRef]
- Eze, S.C.; Awa, H.O.; Okoye, J.C.; Emecheta, B.C.; Anazodo, R.O. Determinant Factors of Information Communication Technology (ICT) Adoption by Government-owned Universities in Nigeria: A Qualitative Approach. J. Enterp. Inf. Manag. 2013, 26, 427–443. [Google Scholar] [CrossRef]
- Cao, L.; Mohan, K.; Ramesh, B.; Sarkar, S. Evolution of Governance: Achieving Ambidexterity in IT Outsourcing. J. Manag. Inf. Syst. 2013, 30, 115–140. [Google Scholar] [CrossRef]
- Albuali, A.; Mengistu, T.; Che, D. ZTIMM: A Zero-Trust-Based Identity Management Model for Volunteer Cloud Computing. In Cloud Computing—CLOUD 2020; Zhang, Q., Wang, Y., Zhang, L.-J., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2020; Volume 12403, pp. 287–294. Available online: https://link.springer.com/10.1007/978-3-030-59635-4_22 (accessed on 28 May 2025)ISBN 978-3-030-59634-7.
- Oliveira, T.; Martins, M.F. Literature Review of Information Technology Adoption Models at Firm Level. Electron. J. Inf. Syst. Eval. 2011, 14, 110–121. Available online: https://academic-publishing.org/index.php/ejise/article/view/389/352 (accessed on 25 May 2025).
- Buck, C.; Olenberger, C.; Schweizer, A.; Völter, F.; Eymann, T. Never Trust, Always Verify: A Multivocal Literature Review on Current Knowledge and Research Gaps of Zero-Trust. Comput. Secur. 2021, 110, 102436. [Google Scholar] [CrossRef]
- Madsen, T. Zero-Trust—An Introduction; CRC Press: New York, NY, USA, 2024; ISBN 1-040-00707-4. [Google Scholar]
- Tsai, M.; Lee, S.; Shieh, S.W. Strategy for Implementing of Zero Trust Architecture. IEEE Trans. Reliab. 2024, 73, 93–100. [Google Scholar] [CrossRef]
- Chuang, S.-W.; Luor, T.; Lu, H.-P. Assessment of Institutions, Scholars, and Contributions on Agile Software Development (2001–2012). J. Syst. Softw. 2014, 93, 84–101. [Google Scholar] [CrossRef]
- Hambrick, D.C.; Mason, P.A. Upper Echelons: The Organization as a Reflection of Its Top Managers. Acad. Manag. Rev. 1984, 9, 193. [Google Scholar] [CrossRef]
- Chen, H.; Yao, Y.; Zhou, H. How Does Knowledge Coupling Affect Exploratory and Exploitative Innovation? The Chained Mediation Role of Organisational Memory and Knowledge Creation. Technol. Anal. Strateg. Manag. 2021, 33, 713–727. [Google Scholar] [CrossRef]
- Novak, L.L.; Anders, S.; Gadd, C.S.; Lorenzi, N.M. Mediation of Adoption and Use: A Key Strategy for Mitigating Unintended Consequences of Health IT Implementation: Table 1. J. Am. Med. Inf. Assoc. 2012, 19, 1043–1049. [Google Scholar] [CrossRef] [PubMed]
- Adade, D.; De Vries, W.T. An Extended TOE Framework for Local Government Technology Adoption for Citizen Participation: Insights for City Digital Twins for Collaborative Planning. Transform. Gov. 2025, 19, 53–73. [Google Scholar] [CrossRef]
- Corradini, I. Building a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology; Studies in Systems, Decision and Control; Springer International Publishing: Cham, Switzerland, 2020; Volume 284, Available online: http://link.springer.com/10.1007/978-3-030-43999-6 (accessed on 28 May 2025)ISBN 978-3-030-43998-9.
- Bulgurcu, B.; Cavusoglu, H.; Benbasat, I. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Q. 2010, 34, 523. [Google Scholar] [CrossRef]
- Ifinedo, P. Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition. Inf. Manag. 2014, 51, 69–79. [Google Scholar] [CrossRef]
- Nassani, A.A.; Yousaf, Z.; Grigorescu, A.; Oprisan, O.; Haffar, M. Accounting Information Systems as Mediator for Digital Technology and Strategic Performance Interplay. Electronics 2023, 12, 1866. [Google Scholar] [CrossRef]
- Smits, M.; Van Goor, H.; Kallewaard, J.-W.; Verbeek, P.-P.; Ludden, G.D.S. Evaluating Value Mediation in Patients with Chronic Low-Back Pain Using Virtual Reality: Contributions for Empirical Research in Value Sensitive Design. Health Technol. 2022, 12, 765–778. [Google Scholar] [CrossRef]
- Ilmudeen, A.; Bao, Y.; Alharbi, I.M. How Does Business-IT Strategic Alignment Dimension Impact on Organizational Performance Measures: Conjecture and Empirical Analysis. J. Enterp. Inf. Manag. 2019, 32, 457–476. [Google Scholar] [CrossRef]
- Karp, R. Gaining Organizational Adoption: Strategically Pacing the Position of Digital Innovations. Acad. Manag. J. 2023, 66, 773–796. [Google Scholar] [CrossRef]
- Larasati, N. Technology Readiness and Technology Acceptance Model in New Technology Implementation Process in Low Technology SMEs. Int. J. Innov. Manag. Technol. 2017, 8, 113–117. [Google Scholar] [CrossRef]
- Ilmudeen, A.; Attar, R.W.; Alhazmi, A.H. Managing It Investment and Strategic Alignment for Firm Performance: A Comparative Study in Emerging Economies. Inf. Dev. 2025, in press. [Google Scholar] [CrossRef]
- Ågerfalk, P.J. Embracing Diversity through Mixed Methods Research. Eur. J. Inf. Syst. 2013, 22, 251–256. [Google Scholar] [CrossRef]
- Creswell, J.W. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 4th ed.; SAGE Publications: Thousand Oaks, CA, USA, 2014; ISBN 978-1-4522-2609-5. [Google Scholar]
- Stol, K.-J.; Schaarschmidt, M.; Morgan, L. Does Adopting Inner Source Increase Job Satisfaction? A Social Capital Perspective Using a Mixed-Methods Approach. J. Strateg. Inf. Syst. 2024, 33, 101819. [Google Scholar] [CrossRef]
- Venkatesh, V.; Brown, S.A.; Bala, H. Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems. MIS Q. 2013, 37, 21–54. Available online: http://www.jstor.org/stable/43825936 (accessed on 28 May 2025). [CrossRef]
- Bertino, E. Zero Trust Architecture: Does It Help? IEEE Secur. Priv. 2021, 19, 95–96. [Google Scholar] [CrossRef]
- Bush, M.; Mashatan, A. From Zero to One Hundred: Demystifying Zero Trust and Its Implications on Enterprise People, Process, and Technology. Queue 2022, 20, 80–106. [Google Scholar] [CrossRef]
- Hair, J.F., Jr.; Howard, M.C.; Nitzl, C. Assessing Measurement Model Quality in PLS-SEM Using Confirmatory Composite Analysis. J. Bus. Res. 2020, 109, 101–110. [Google Scholar] [CrossRef]
- Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.Y.; Podsakoff, N.P. Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies. J. Appl. Psychol. 2003, 88, 879–903. [Google Scholar] [CrossRef]
- Park, S.; Gupta, S. Handling Endogenous Regressors by Joint Estimation Using Copulas. Mark. Sci. 2012, 31, 567–586. [Google Scholar] [CrossRef]
- Dijkstra, T.K.; Henseler, J. Consistent partial least squares path modeling. MIS Q. 2015, 39, 297–316. [Google Scholar] [CrossRef]
- Sarstedt, M.; Ringle, C.M.; Henseler, J.; Hair, J.F. On the Emancipation of PLS-SEM: A Commentary on Rigdon (2012). Long Range Plan. 2014, 47, 154–160. [Google Scholar] [CrossRef]
- Fornell, C.; Larcker, D.F. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics. J. Mark. Res. 1981, 18, 382–388. [Google Scholar] [CrossRef]
- Hair, J.F.; Hult, G.T.M.; Ringle, C.M.; Sarstedt, M.; Danks, N.P. Partial Least Squares Structural Equation Modeling (PLS-SEM): An Updated and Extended Guide for Researchers and Practitioners; SAGE Publications: Thousand Oaks, CA, USA, 2022. [Google Scholar] [CrossRef]
- Hult, G.T.M.; Hair, J.F.; Proksch, D.; Sarstedt, M.; Pinkwart, A.; Ringle, C.M. Addressing endogeneity in international marketing applications of partial least squares structural equation modeling. J. Int. Mark. 2018, 26, 1–21. [Google Scholar] [CrossRef]
- Cohen, J. Statistical Power Analysis for the Behavioral Sciences, 2nd ed.; Lawrence Erlbaum Associates: Hillsdale, NJ, USA, 1988; ISBN 9780203771587. [Google Scholar] [CrossRef]
- Aiken, L.S.; West, S.G. Multiple Regression: Testing and Interpreting Interactions; Sage: Newbury Park, CA, USA, 1991; Available online: https://books.google.com.br/books?hl=en&lr=&id=LcWLUyXcmnkC&oi=fnd&pg=PP11&dq=108.%09Aiken,+L.S.%3B+West,+S.G.+Multiple+Regression:+Testing+and+Interpreting+Interactions%3B+Sage:+Newbury+Park,+CA,+USA,+1991&ots=fqhd_hWS2h&sig=8OvHzIAnE-aWDU2keXEfJiV4xSo#v=onepage&q&f=false (accessed on 27 October 2025).
- Corpuz, J.C. The Paradigm Shift: Healthcare Embraces a Zero Trust Approach to Cybersecurity. Health Serv. Insights 2023, 16, 11786329231213706. [Google Scholar] [CrossRef]
- Biesta, G. Pragmatism and the Philosophical Foundations of Mixed Methods Research. In Sage Handbook of Mixed Methods in Social and Behavioral Research; Sage: Thousand Oaks, CA, USA, 2010; Volume 2, pp. 95–118. [Google Scholar]
- Edmondson, A.C.; Mcmanus, S.E. Methodological Fit in Management Field Research. Acad. Manag. Rev. 2007, 32, 1246–1264. [Google Scholar] [CrossRef]
- Monteiro, E.; Constantinides, P.; Scott, S.; Shaikh, M.; Burton-Jones, A. Qualitative Research Methods in Information Systems: A Call for Phenomenon-Focused Problematization. MIS Q. Manag. Inf. Syst. 2022, 46, 1–17. [Google Scholar]
- Yin, R.K. Case Study Research and Applications: Design and Methods, 6th ed.; Sage: Los Angeles, CA, USA, 2018; ISBN 978-1-5063-3616-9. [Google Scholar]
- Corbin, J.M.; Strauss, A.L. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 4th ed.; SAGE: Los Angeles, CA, USA, 2015; ISBN 978-1-4129-9746-1. [Google Scholar]
- Miles, M.B.; Huberman, A.M. Qualitative Data Analysis: An Expanded Sourcebook, 2nd ed.; Sage Publications: Thousand Oaks, CA, USA, 1994; ISBN 978-0-8039-4653-8. [Google Scholar]

| TOE Context | Zero Trust Factors | Examples/Key References |
|---|---|---|
| Technological | Perceived simplicity/complexity; integration with existing infrastructure; performance expectancy | MFA, microsegmentation, encryption, continuous monitoring [5,15]. |
| Organizational | Security culture, top management support, strategic commitment, resource allocation, firm size/scope | Culture readiness, managerial priorities, slack resources [1,47,48]. |
| Environmental | Regulatory pressures, client demands, industry norms, mimetic and normative pressures | Compliance mandates, GDPR/HIPAA, peer adoption, industry audits [11,43,49]. |
| Outcome | Security governance and compliance performance | Treated as the internal result of ZT adoption, while acknowledging external regulatory origins [11,44]. |
| Company Age | Tt | Percentage | Company Size | Tt | Percentage |
|---|---|---|---|---|---|
| More than 20 years | 151 | 56.6 | Over 1001 | 157 | 58.8 |
| 11 to 15 years | 25 | 9.4 | 201 to 500 | 23 | 8.6 |
| 16 to 20 years | 30 | 11.2 | 501 to 1000 | 27 | 10.1 |
| 6 to 10 years | 38 | 14.2 | 51 to 200 | 33 | 12.4 |
| Less than 5 years | 23 | 8.6 | Less than 50 | 27 | 10.1 |
| Regions | Tt | Percentage | |||
| Central America and Caribbean (e.g., Jamaica, Mexico, Panama) | 8 | 3.0 | |||
| East and Central Asia (e.g., China, Japan, Uzbekistan) | 4 | 1.5 | |||
| Eastern Europe (e.g., Hungary, Poland, Russia) | 10 | 3.7 | |||
| North America (e.g., Canada, United States) | 70 | 26.2 | |||
| Pacific/Oceania (e.g., Australia, Papua New Guinea, Fiji) | 5 | 1.9 | |||
| South America (e.g., Brazil, Chile, Colombia) | 55 | 20.6 | |||
| South and Southeast Asia (e.g., India, Indonesia, Singapore) | 8 | 3.0 | |||
| Sub-Saharan Africa (e.g., Kenya, Nigeria, South Africa) | 18 | 6.7 | |||
| West Asia/Middle East (e.g., Iran, Israel, Saudi Arabia) | 9 | 3.4 | |||
| Western Europe (e.g., Greece, Sweden, United Kingdom) | 62 | 23.2 | |||
| Prefer not to disclose | 18 | 6.7 | |||
| ID | Year in Position | Job Positions | Industry |
|---|---|---|---|
| 1 | 6 | Sales Tech Director | Technology |
| 2 | 12 | IT Manager | Retail |
| 3 | 19 | Head of IT for Brazil | Pharmaceutical |
| 4 | 1 | Cybersecurity Architecture | Finance |
| 5 | 25 | IT Manager | Health |
| 6 | 5 | Chief of Inf. Security and Fraud Prevention | Finance |
| 7 | 1 | Regional CISO for Latin America | Food |
| 8 | 22 | Executive Director | Technology |
| 9 | 2 | Chief Technology Officer | Technology |
| 10 | 19 | IT Project Leader | Technology |
| 11 | 5 | PMO Consultant | Technology |
| 12 | 15 | PMO & Quality Manager | Manufacturing |
| 13 | 9 | Head of Professional Services | Technology |
| 14 | 10 | Senior Project Manager | Manufacturing |
| 15 | 10 | Chief Information Security Officer | Finance |
| 16 | 10 | Project Manager of Software Development | Manufacturing |
| 17 | 20 | Senior PM Manager | Technology |
| 18 | 12 | IT Manager | Health |
| 19 | 1 | Global Head of Information Security & IT Risk | Finance |
| 20 | 27 | Information Security Consultant | Telecommunication |
| 21 | 7 | CEO | Technology |
| 22 | 17 | Executive Director | Technology |
| 23 * | 1 | Information Security Manager | Finance |
| 24 | 2 | Senior Information Security | Technology |
| 25 | 6 | Cloud Security Engineer | Retail |
| 26 | 5 | Cybersecurity Risk Management Lead Partner | Technology |
| 27 | 2 | IT & Cyber Risk Officer for Latin America | Finance |
| Construct | Cronbach’s α | CR | AVE | 1 | 2 | 3 | 4 | 5 |
|---|---|---|---|---|---|---|---|---|
| 1. Information Security Culture | 0.895 | 0.927 | 0.760 | 0.872 | ||||
| 2. Information Security Governance | 0.746 | 0.854 | 0.661 | 0.348 | 0.813 | |||
| 3. Implementation ZT Controls | 0.768 | 0.852 | 0.591 | 0.486 | 0.342 | 0.769 | ||
| 4. Investment ZT Security | 0.879 | 0.925 | 0.805 | 0.407 | 0.337 | 0.339 | 0.897 | |
| 5. Strategic Commitment to Zero Trust | 0.909 | 0.936 | 0.786 | 0.368 | 0.317 | 0.445 | 0.357 | 0.887 |
| Latent Variables | 1 | 2 | 3 | 4 | 5 |
|---|---|---|---|---|---|
| 1. Information Security Culture | - | ||||
| 2. Information Security Governance | 0.807 | ||||
| 3. Implementation ZT Controls | 0.828 | 0.861 | |||
| 4. Investment ZT Security | 0.684 | 0.884 | 0.777 | ||
| 5. Strategic Commitment to Zero Trust | 0.740 | 0.842 | 0.772 | 0.857 | |
| 6. Information Security Culture x Strategic Commitment to Zero Trust | 0.636 | 0.574 | 0.539 | 0.367 | 0.428 |
| Hypo | Path | Coef. | t-Value | p-Value | Interpretation |
|---|---|---|---|---|---|
| H1 | Information Security Culture → Implementation of ZT Controls | 0.385 | 5.736 | 0.000 | Strong direct effect; security culture directly supports implementation. |
| H1a | Information Security Culture → Strategic Commitment to ZT | 0.233 | 5.527 | 0.001 | Strong direct effect; security culture directly supports strategy. |
| H2 | Investment in ZT Security → Strategic Commitment to ZT | 0.715 | 18.953 | 0.000 | Very strong relationship; investment strongly shapes strategic alignment. |
| H2a | Investment in ZT Security → Implementation of ZT Controls | 0.277 | 3.121 | 0.002 | Direct positive effect; investment improves implementation. |
| H3 | Implementation of ZT Controls → Information Security Governance | 0.742 | 21.545 | 0.000 | Very strong effect; implementation is crucial for governance. |
| H4 | Strategic Commitment to Zero Trust → Implementation of ZT Controls | 0.110 | 1.219 | 0.223 | Not significant; strategy alone does not predict implementation. |
| H5 | Information Security Culture → Implementation of ZT Controls → Information Security Governance | 0.286 | 5.411 | 0.000 | Significant mediation path; implementation mediates culture and governance. |
| H6 | Investment in ZT Security → Implementation of ZT Controls → Information Security Governance | 0.206 | 2.990 | 0.003 | Investment has a strong direct impact on governance outcomes. |
| H7 | Information Security Culture x Strategic Commitment to ZT → Implementation of ZT Controls | -0.075 | 1.743 | 0.081 | Marginal effect; interaction may suppress strategy effect under high culture. |
| Hypo | Findings of the Quantitative Study | Findings of the Qualitative Study |
|---|---|---|
| H1 | Strong direct effect (β = 0.385, p < 0.001). Security culture is a key predictor of implementation success. | Interviewees repeatedly emphasized cultural resistance as a barrier and cultural alignment as an enabler. ID1 stated, “the cultural impact… is the main impact you have within any security principle.” ID22 noted, “Cultural aspects are extremely important from the point of view of trust.” These insights confirm that shared values and behaviors significantly influence implementation outcomes. |
| H1a | Strong direct effect (β = 0.233, p < 0.001). A culture of security supports the development of ZT-oriented strategies. | Strategic decisions were reported as heavily influenced by cultural norms. ID24 noted alignment with the company’s business model was essential for decision-making. ID6 stated, “you must have a strategy aimed at implementing Zero Trust…” These views indicate that culture plays a foundational role in shaping security strategy. |
| H2 | Very strong effect (β = 0.715, p < 0.001). Investment is a key driver of strategic commitment to ZT. | Respondents emphasized that meaningful investment, especially in architecture and training, drives strategic thinking. ID20 explained, “investment in architecture is essential,” and ID12 mentioned, “there are several trainings… to work with data security.” This affirms that investments directly inform strategic readiness. |
| H2a | Positive direct effect (β = 0.277, p = 0.002). Financial investment improves ZT implementation. | Multiple interviewees cited high costs and resource constraints as both a barrier and a catalyst for implementation. ID1 stated, “security is not cheap, never was and never will be,” while ID15 said, “we spent six months planning Zero Trust…” These remarks highlight the vital role of budgeting and planning in execution. |
| H3 | Very strong effect (β = 0.742, p < 0.001). ZT implementation is central to improved governance and compliance. | Governance enhancements through ZT were confirmed qualitatively. ID12 noted, “from the moment you apply an information security policy, you start working with encrypted data…” and ID19 added, “we needed to tighten controls for compliance…” These examples underscore ZT’s regulatory and policy impact. |
| H4 | Not significant (β = 0.110, p = 0.223). Strategy alone does not predict implementation. | Interview data supports this result. Participants highlighted gaps between planning and practice. ID17 said, “it is not a turn of the key… it is a gradual process,” and ID19 mentioned delays in seeing the value of ZT, “it takes a long time to perceive added value.” This suggests that strategy needs operational and cultural support to succeed. |
| H5 | Significant mediation effect (β = 0.286, p < 0.001). Implementation mediates the impact of culture on governance. | Interviews support this indirect effect. ID5 emphasized the role of trained professionals in both awareness and governance execution. ID27 explained how “information security teams… need to understand the concept.” Culture sets the stage, but implementation operationalizes governance. |
| H6 | Significant mediation (β = 0.206, p = 0.003). Investment drives governance through implementation. | This relationship is mirrored in quotes emphasizing structured investment and planning. ID15 spoke of a six-month ZT planning phase, and ID17 noted that good planning and budgeting “helps to defend Zero Trust.” Investment supports both strategic commitment and technical outcomes that reinforce governance. |
| H7 | Marginal moderation (β = −0.075, p = 0.081). Culture may suppress the effect of strategy when misaligned. | Interviewees described culture as a double-edged factor. While some noted its enabling effect (ID8, ID22), others warned of resistance, especially in less mature environments (ID1, ID17). These insights align with the moderation result: strong culture may either enhance or obstruct strategy, depending on alignment and context. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pigola, A.; Meirelles, F.d.S. Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework. J. Cybersecur. Priv. 2025, 5, 99. https://doi.org/10.3390/jcp5040099
Pigola A, Meirelles FdS. Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework. Journal of Cybersecurity and Privacy. 2025; 5(4):99. https://doi.org/10.3390/jcp5040099
Chicago/Turabian StylePigola, Angélica, and Fernando de Souza Meirelles. 2025. "Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework" Journal of Cybersecurity and Privacy 5, no. 4: 99. https://doi.org/10.3390/jcp5040099
APA StylePigola, A., & Meirelles, F. d. S. (2025). Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework. Journal of Cybersecurity and Privacy, 5(4), 99. https://doi.org/10.3390/jcp5040099

