I would like to write research in the field of information security, specifically on the possibility of using the FISM law in organizations.
Can I use this law in private organizations, that is, the private sector?
Can we call this law the FISM model?