Problem
1. What is the purpose of defining a framework for IT security policies?
2. What are the differences between flat and hierarchical organizations?
3. How do you overcome employee apathy toward policy compliance?
4. What are the major components of an information systems security policy?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.