Which of the following has the GREATEST influence on an organization’s information security strategy?