According to ISO/IEC 27001, which three elements must an organization consider when determining the boundaries and applicability of its Information Security Management System (ISMS)?