Which of the following factors will BEST promote effective information security management?