I would like to write research in the field of information security, specifically on the possibility of using the FISM law in organizations.

Can I use this law in private organizations, that is, the private sector?

Can we call this law the FISM model?

More Mohammed Mustafa Hussein's questions See All
Similar questions and discussions