country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ICT710 ICT Professional Practice And Ethics System

tag 0 Download12 Pages / 2,754 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Edward Snowden an employee of defence contractor Booz Allen Hamilton, working at the National Security Agency (NSA) is responsible for what may turn out to be the most significant leak of classified information in U.S. history. In June 2013, Snowden admitted to passing classified documents to reporters at The Guardian and The Washington Post—revealing details of NSA surveillance programs that collect and perform data mining on hundreds of millions of U.S. phone and Internet traffic records to identify possible links to known terrorists. Shortly after leaking the documents, Snowden fled the country to avoid federal charges. Some people call Snowden a whistle-blower for drawing attention to NSA programs they feel violate civil rights and the Constitution. Others consider him a traitor and feel he should be heavily prosecuted. Please research this incident and write the report as indicated in this task.
The 'Doing Ethics' technique is a process for analysing ethical issues in any scenario. It doesn't guarantee that what you come up with will be the best solution, but it does help you to think ethically. The technique may seem a little vague and perhaps lacking guidance, however the following might help you to understand how to apply the technique in order to better understand ethical analysis.

Q1. What's going on?
This is a synopsis of what the case is all about. It can be taken from a variety of perspectives, for example, from the perspective of a person raising a complaint, in which case, it is a synopsis of the complaint. It can be taken from the perspective of an involved observer, in which case, it is an outline of what was observed, without going into too much detail. Where you see multiple perspectives, you should describe them here.

Q2. What are the facts?
This is a descriptive list of the facts of the case. This doesn't just describe the case; it lists the facts as they are known (from all sources and perspectives), and also what one might reasonably consider to be possibilities. For example, if a person was raising a complaint, Question 1 would outline their complaint, and Question 2 would provide the evidence to both support and refute that argument. All such facts must be demonstrable or supportable. It would be worthwhile to assign a credibility weighting to each fact, to help with later analysis.

Q3. What are the issues?
This is a list of ALL the issues that are involved in the case. In Question 5 we can extract only the ethical issues for further analysis, but for now, simply extract and describe every relevant issue you can think of.

Q4. Who is affected?
This is a list of all the stakeholders involved in the case. This need not be restricted to the ones specifically mentioned in the case; you should consider who/what else might be affected by the issues listed at Question 3, regardless of the degree to which they are affected. In this question, you should describe how each stakeholder is affected, both positively and negatively, and perhaps comment on the degree of effect.

Q5. What are the ethical issues and implications?
For this question, you need to extract only the ethical issues identified at Question 3. List the ethical issues, discuss them in terms of classical ethical theory (as best you can), and discuss their implications - on the stakeholders and on the community in general.

Q6. What can be done about it?
This question elicits a general idea of what can be done to resolve the case, whether those ideas are practical, possible, or not. Generally what kind of resolutions might there be? You need not go into great detail to answer this question, as its purpose is to provide a basis for answering Question 7, but you do need to think broadly and laterally to come up with several alternatives.


Q7. What are the options?
This question requires that you list and describe (in detail) all the possible options that might be available to resolve the case. Be creative here; the most obvious options are not always the best. It's possible that not all options will result in a positive outcome for all stakeholders. List and describe at least three different options, and discuss the benefits and detriments of each.

Q8. Which option is best - and why?
In answering this question, you need to assess which of the options described in Question 7 is the best. You are recommending one of several options here, so you need to argue for your recommendation, providing a solid basis in fact and reasonable (and supportable) conjecture. You should add some of your own intellectual property, as an ICT professional, into answering this question. Supporting your argument based on classical ethical theory is not a requirement at this point, but it is what would be expected if you were a professional Ethicist.
 
 

Answer:

Introduction

Disciplinary ethical codes allow an ICT professional to define standard of conduct and ensure the individual practitioners to meet those standards (Fleischmann, Hui and Wallace 2017). This study will discuss the case ethical issue caused by Edward Snowden in NSA. Moreover, the study will analyze this situation using Doing Ethics Technique. Apart from that, the study will also analyze the situation based on the ACS code of ethics. Both the technique will evaluate the ethical issues of the situation from the perspective of ICT professional. Moreover, the study will also provide a suitable recommendation for resolving the case.

In June 2013, the computer expert and former CIA system administrator Edward Snowden leaked the confidential information about the surveillance program of National Security Agency (NSA) (Philosophytalk.org 2015). The U.S Government used to gather and perform data mining on hundreds of internet traffic and U.S phone through this surveillance program. Moreover, the intension of this surveillance program was to identify the possible link to the known terrorists. However, Edward Snowden has violated the Espionage Act through leaking out the state secret. The computer expert has violated the secrecy agreement of the U.S Government by breaching the ethical codes (Allen 2018). Such unethical behavior of Snowden has just wasted the vision of U.S government towards tracking the activities of the terrorists, which can be dangerous for the country.

  • Edward Snowden has breached the ethical norms by leaking the confidential surveillance information of U.S government
  • Snowden has caused harm to the national security of U.S through interrupting the data mining surveillance program
  • The intension of the Snowden was unethical in the sense that he broke the national law of protecting the national assets from the enemies (BBC News 2014)
  • Violation of National Security: EdwardSnowden, the computer expert has violated the national security of U.S through revealing the confidential data mining surveillance programs of NSA.
  • Caused Harm to the National Security: EdwardSnowden has interrupted the surveillance program for data mining towards tracking the contacts with known terrorists. In this way, he has caused harm to the national security of U.S and U.S public (Irvine 2018).
  • Breach of ICT Professional Code of Ethics:  The computer expert has violated the code of ethics of ICT professionals through leaking out the confidential information of U.S government. Moreover, he has exploited his position of trust for scoring political points.
  • Breaking Espionage Act of Data Protection: EdwardSnowden has violated the laws of national security act named Espionage Act of data protection (Dodds 2013). He has breached the law of data protection by revealing the confidential information to the enemies.

Who is affected?

  • S Government: U.S Government is the prime stakeholder, who is directly affected by this case.  Moreover, Edward Snowden has actually interrupted the big motto of U.S Government towards tracking the terrorism activities. Such interruption can also cause harm to the national security of the country and the citizen (Lyon 2014). Furthermore, the case also has another negative effect on U.S Government, where the Government has been alleged with violating the privacy of citizen through data mining process.
  • S Citizen: U.S citizens are also directly involved in this case, where the data mining process has tracked their telephonic information. The case has negative impact on the U.S citizens, where the surveillance program has hampered the security of their personal information and activities. On the other hand, the leaking out of surveillance information has interrupted the program of tracking terrorism activities. Moreover, now, the terrorists can easily fulfil their terrorism activates, which can hamper the quality of life of the U.S citizens.
  • Telecommunication and Social Networking Service Company: The case also has negative impact on the Telecommunication and Social Networking Service Company. The reputation of the companies can be destroyed on the ground that those companies have permitted U.S Government to track the Telephonic and internet traffic data of the normal publics (Walsh and Miller 2016).
  • Terrorists group and their Associated People: The case has positive impact on the terrorists group and their associated People, which actually have negative consequence on the U.S government and U.S citizens. The terrorists group and their associated People will be alert after revealing information of the surveillance program. Hence, they can easily protect themselves from the Government treats and fulfil their illegal activities.
  • ICT Professional: EdwardSnowden has set a negative example for the ICT professional, which can influence the associated colleagues. Such unethical conducts of Edward Snowden can also encourage other ICT professional to do the same (Murata, Adams and Lara Palma 2017).
 

What are the ethical issues and implications?

  • Ethical Issue Violation of National Security: EdwardSnowden has violated the ethical norms through breaching the national security of U.S. As per, duty ethics theory, the ethicality of an action is judged on the basis of its adherence with the duty of the actor. Moreover, Edward Snowden has not adhered with his duty of maintaining national security, which can actually hamper the national security of U.S (Near and Miceli 2016).
  • Ethical Issue in Causing Harm to the National Security: As per Utilitarianism theory of ethic, ethical action always enhances the wellbeing of people. However, the information leak of EdwardSnowden can cause security harm for the citizen by interrupting the terrorism tracking program (Bannister and Connolly 2014). Hence, it is an unethical action, which will actually enhance the sufferings of U.S citizen.
  • Ethical Issue Breach of ICT Professional Code of Ethics: As per duty of ethics, ethical action is always based on certain rules and norms. However, in this case, EdwardSnowden has breached the ethical codes ICT profession through revealing the confidential information of U.S Government. Hence, it is actually an unethical initiative for ICT professional.
  • Ethical Issue of Breaking Espionage Act of Data Protection: As per duty ethics, the action of EdwardSnowden is unethical, as he have not adhered with the rules of Espionage Act for protecting national security. However, as per his own justification, he revealed the secure information for the privacy of the public, where his intension was good for protecting public privacy (Murata et al. 2017). Hence, as per virtue theory, this action may not be completely unethical.

NSA should renew the surveillance program for tracking the activities of the terrorists. Moreover, the Federal Bureau of Investigation (FBI) should have to satisfy more legal requirements prior to access the Americans’ communication from the NSA database for the investigation of the agency (Raab and Szekely 2017).  In such legal requirement, the FBI would get a warrant before searching the information from the NSA database. Hence, it would be very difficult for someone to pass on any information to unauthentic person. Apart from that, NSA can also use Homomorphic encryption, which can be use towards aggregating the encrypted data (Kalogridis et al. 2014). It would help in both privacy of secure information in the NSA database and useful aggregate information.  

What are the options?

  • More Legal Requirement for Data Access: NSA should set more legal requirements for accessing the confidential information in the renewed surveillance program. Moreover, in this security measure, the FBI would get an alert, when a person would try to access the secure and confidential information from the NSA database. In this way, no person even within the NSA members would be able to access the confidential information without the permission of FBI. Hence, the chance of violation of security measures would be reduced.
  • Proper Encryption: NSA can also use proper encryption for protecting the confidential information. In this way, it would be extremely difficult for any unauthentic person for understand the meaning of encrypted confidential information (Gotterbarn and Miller 2017). Hence, it would be extremely difficult for the enemies like the terrorists in this case to understand the encrypted form of confidential information.
  • Access Control for Handling Confidential Data: NSA can also use access control system for handing the confidential data in the Database. Moreover, in such system, a NSA member requires permission from the Data Steward towards handling confidential information. Data Steward would give permission to access confidential information only in case of critical business requirement (Raab and Szekely 2017). Hence, it would be extremely difficult to for any NSA member to get access to the confidential database information without critical requirement for the investigation.
 

Which option is best - and why?

Among the above mentioned 3 options, access control for handling confidential data would be best for resolving such case. As per Kalogridis et al. (2014), in case of more legal requirement for accessing data, it might be possible for someone within the FBI members to avoid the alert on request of getting access to confidential data. Furthermore, Raab and Szekely (2017) stated that in encryption process, it might be possible for someone within the NSA to help the unauthentic person in understanding the encrypted form of confidential information. Such person may easily unethically violate his/her duty to pass on the confidential information to the enemies. However, Raab and Szekely (2017) opined that in case of access control for handling confidential information, the permission for accessing confidential information would be system generated through Data Steward. Moreover, the request for accessing data would fit the critical business requirement in the Data Steward. Hence, no person, even within the NSA members can unethically violate their duties by unnecessary accessing database information and pass on them to unauthentic persons.

Analysis of the situation from the point of view of an ICT Professional using the ACS Code of Ethics

In this code of ethics, an ICT professional is supposed to place the interest of public above those of his/her personal interests or sectional interests. In this case, the NSA surveillance program was initiated for tracking the contacts of the persons with the known terrorists. Moreover, the interest of this program was to protect the U.S public from the threats of terrorists. However, Edward Snowden gave priority of his personal interest to be hero to the public by revealing the data mining process of NSA (Whitehouse et al. 2016). In this way, Edward Snowden has underestimated the public interest of being protected from the terrorists.

In this code of ethics, an ICT professional is supposed to enhance the quality of life of the people, who are affected by his/her work. However, in this case, Edward Snowden interrupted the surveillance program of NSA, which used to track the contacts of the terrorists. In this way, this person has caused harm to the national security, which can directly harm the quality of life of the U.S citizen (Díaz-Campo and Segado-Boj 2015). Hence, Edward Snowden has actually violated the ACS Code of Ethics.

Honesty

In this code of Ethics, an ICT professional is supposed to be honest his/her representing the skills, knowledge and service. However, in this case, Edward Snowden has demonstrated dishonesty in representing his service by leaking out the confidential information of NSA to the public. Moreover, this computer expert was not actually loyal to his profession.  

Competence

In this code of Ethics, an ICT professional is supposed to work competently and diligently for his/her stakeholders. Being an ICT professional, Edward Snowden should be his prime duty to protect the confidential information of NSA competently and diligently. However, Edward Snowden failed to maintain his competence and diligence of this duty by revealing the confidential information of U.S government to the public.

 

Professional Development

In this code of ethics, an ICT professional is supposed to enhance his/her own professional development as well as his/her colleagues’ professional development. However, in this case, being an ICT professional, Edward Snowden has violated the national security and set a negative example for his other colleagues (Valentine, Fleischman and Bateman 2015). In this way, he actually hindered his own as well as his colleagues’ professional development.

Professionalism

In this code of ethics, an ICT professional is supposed to enhance the integrity of the society and respect the members for each other. However, in this case, Edward Snowden has not demonstrated his professionalism by leaking out the confidential information of NSA to the public. Moreover, he has just exploited his position for disintegrating the society by causing harm to the national security.

 

Conclusion

While concluding the situation using Doing Ethics Technique, it can be said that Edward Snowden has just violated the ethical norms by leaking out the information of NSA surveillance program. Moreover, he has caused harm to the national security of U.S.  Such situation can be handled through access control on handling the confidential information of NSA database. On the other hand, as per ACS code of ethics, being an ICT professional, Edward Snowden was not at all professional to his profession. He was incapable of protecting the confidential information of NSA.

NSA should provide proper training to its ICT professionals for enhancing their professional development. In this way, such ICT professionals would be loyal to their duties and roles and protect the confidential information of the NSA database. On the other, NSA should strongly initiate the access control for handling the confidential information of database. Moreover, in such privacy system, any ICT professional would require permission from the Data Steward for getting access to confidential information. Hence, it would not be possible for any NSA members to access the confidential information unnecessary and reveal them to unauthentic persons.

 

References

Allen, N. 2018. Edward Snowden: the quiet Hawaii life of the NSA whistleblower. [online] Telegraph.co.uk. Available at: https://www.telegraph.co.uk/news/worldnews/northamerica/usa/10110342/Edward-Snowden-the-quiet-Hawaii-life-of-the-NSA-whistleblower.html

Bannister, F. and Connolly, R., 2014. ICT, public values and transformative government: A framework and programme for research. Government Information Quarterly, 31(1), pp.119-128.

BBC News. 2014. How the US spy scandal unravelled. [online] Available at: https://www.bbc.com/news/world-us-canada-23123964

Díaz-Campo, J. and Segado-Boj, F., 2015. Journalism ethics in a digital environment: How journalistic codes of ethics have been adapted to the Internet and ICTs in countries around the world. Telematics and Informatics, 32(4), pp.735-744.

Dodds, N. 2013. Five Eyes spying alliance will survive Edward Snowden: experts. [online] The Sydney Morning Herald. Available at: https://www.smh.com.au/it-pro/security-it/five-eyes-spying-alliance-will-survive-edward-snowden-experts-20130717-hv0xw.html

Fleischmann, K.R., Hui, C. and Wallace, W.A., 2017. The societal responsibilities of computational modelers: Human values and professional codes of ethics. Journal of the Association for Information Science and Technology, 68(3), pp.543-552.

Gotterbarn, D. and Miller, K.W., 2017. Yes, but… our response to:“professional ethics in the information age”. Journal of Information, Communication and Ethics in Society, 15(4), pp.357-361.

Kalogridis, G., Sooriyabandara, M., Fan, Z. and Mustafa, M.A., 2014. Toward unified security and privacy protection for smart meter networks. IEEE Systems Journal, 8(2), pp.641-654.

Lyon, D., 2014. Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), p.2053951714541861.

Murata, K., Adams, A.A. and Lara Palma, A.M., 2017. Following Snowden: a cross-cultural study on the social impact of Snowden’s revelations. Journal of Information, Communication and Ethics in Society, 15(3), pp.183-196.

Murata, K., Fukuta, Y., Adams, A.A. and Ronghua, D., 2017. How Snowden’s revelations have influenced youngsters’ attitude and behaviour in the PRC and Taiwan. Journal of Information, Communication and Ethics in Society, 15(3), pp.213-231.

Near, J.P. and Miceli, M.P., 2016. After the wrongdoing: What managers should know about whistleblowing. Business Horizons, 59(1), pp.105-114.

Philosophytalk.org. 2015. Edward Snowden and the Ethics of Whistleblowing | Philosophy Talk. [online] Available at: https://www.philosophytalk.org/snowden

Raab, C. and Szekely, I., 2017. Data protection authorities and information technology. Computer Law & Security Review, 33(4), pp.421-433.

Raab, C. and Szekely, I., 2017. Data protection authorities and information technology. Computer Law & Security Review, 33(4), pp.421-433.

Valentine, S., Fleischman, G. and Bateman, C.R., 2015. An Exploratory Study Of Professional Ethical Standards, Positive Budgeting Orientation, And The Mediating Role Of Corporate Ethical Values. Accounting & Taxation, 7(1), p.1.

Walsh, P.F. and Miller, S., 2016. Rethinking ‘Five Eyes’ security intelligence collection policies and practice post Snowden. Intelligence and National Security, 31(3), pp.345-368.

Whitehouse, D., Duquenoy, P., Kimppa, K.K., Burmeister, O.K., Gotterbarn, D., Kreps, D. and Patrignani, N., 2016. Twenty-five years of ICT and society: codes of ethics and cloud computing. ACM SIGCAS Computers and Society, 45(3), pp.18-24.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). ICT Professional Practice And Ethics System. Retrieved from https://myassignmenthelp.com/free-samples/ict710-ict-professional-practice-and-ethics-system.

"ICT Professional Practice And Ethics System." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/ict710-ict-professional-practice-and-ethics-system.

My Assignment Help (2020) ICT Professional Practice And Ethics System [Online]. Available from: https://myassignmenthelp.com/free-samples/ict710-ict-professional-practice-and-ethics-system
[Accessed 09 July 2020].

My Assignment Help. 'ICT Professional Practice And Ethics System' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/ict710-ict-professional-practice-and-ethics-system> accessed 09 July 2020.

My Assignment Help. ICT Professional Practice And Ethics System [Internet]. My Assignment Help. 2020 [cited 09 July 2020]. Available from: https://myassignmenthelp.com/free-samples/ict710-ict-professional-practice-and-ethics-system.


MyAssignmenthelp.com has appointed best assignment experts who are wizards of words. Our writers know every trick of crafting high quality write-ups within a short period. With years of experiences, we have become one of the most prolific assignment help services in the USA. We deliver custom-made help to students with writing different types of assignments. We guarantee total need-based and timely service, and this is why increasing numbers of students prefer to buy assignment online.

Latest Management Samples

ISYS1055 Database Concepts For Decomposition And Functional Dependency

Download : 0 | Pages : 3
  • Course Code: ISYS1055
  • University: RMIT University
  • Country: Australia

Answer: Answer to Question 1: The candidate key for the doctor table is Rego. The candidate key for Patient Table is ID. The appointment table has candidate key, ID. The tables are already in third normal form. All the attributes in the database are atomic. Each of the tables has primary key. There is no non-functional dependency or transitive dependency. Answer to Question 2: Functional Dependency: The given custID has been presented as ...

Read More arrow Tags: Australia Melbourne Accounting Accounting theory and accountability University of Melbourne 

ACC203 Management Accounting Method

Download : 0 | Pages : 10
  • Course Code: ACC203
  • University: Elite Educational Institute
  • Country: Australia

Answer: 1. Explaining how the management accountant can help contribute design and operations of the new management accounting system for the new hospital: Being the management accountant relevant skill is needed by the individuals for adequately conducting operations. The same skills of a management accountant can help in designing and operating the new management accounting system for the new hospital. In addition, the management accounting...

Read More arrow

HI6026 Audit, Assurance And Compliance For Australian Security Exchange

Download : 0 | Pages : 9

Answer: Introduction Auditing is the process to examine the financial statements of the business entities in order to find out any material missstements in them. While auditing the statements, the responsibility of the auditors is to take into consideration the major risks of material misstatements and to take necessary steps to reduce them. On the other hand, Australian Security Exchange (ASX) has provided the companies with eight principles i...

Read More arrow Tags: Australia Campsie Management University of New South Wales 

NUR4232 Protecting Your Clients In The Conduct Of Research

Download : 0 | Pages : 21
  • Course Code: NUR4232
  • University: National Center For Biotechnology Information
  • Country: United States

Answer: Introduction Evidence-based models use a process for framing a question, locating, assessing, evaluating, and repeating as needed. PICO (T) elements include: Problem/Patient/Population, Intervention/Indicator, Comparison, Outcome, and (optional) Time element or Type of Study. The question for this study is as follows: In patients aged 60 years and above (P), what is the effect of being administered the influenza vaccine (I) on contra...

Read More arrow

CP5639 Conceptual Modelling For Attributes And Different Relationships

Download : 0 | Pages : 5
  • Course Code: CP5639
  • University: James Cook University
  • Country: Australia

Answer: Discussion This report discusses the solution for the conceptual modelling of the Joanne Myers Apartments. Conceptual modelling involves following a few steps in order to achieve the final conceptual model for the database. The first step is thoroughly studying the case study to get information on all the entities and their attributes and different relationships that exist between the entities. After identifying the entities, the next...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,358,337

Orders

4.9/5

Overall Rating

5,081

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2830 Order Completed

97% Response Time

Leroy Bicknell

MBA in Marketing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

perfect work from consultants and they have better knowledge to make assignments.

flag

User Id: 458046 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating

This is a well constructed essay, shows the expert actually did watch my video attachment and did a great job!!!

flag

User Id: 417511 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating

Thank you for being helpful. i appreciate your commitment. my professor is yet to grade the assignment

flag

User Id: 450271 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating

DID AWESOME WORK. NEVER BEEN MORE IMPRESSED WITH ALL THE HELP THE EXPERT GAVE ME AND MY ASSIGNMENT HELP. I WILL DEFINITELY BE COMING BACK FOR MORE IF NEEDED.

flag

User Id: 292731 - 09 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?