Select Page

Review Questions require only a short answer;Discussion Questions are meant to generate critical thinking, and therefore, demand a longer, more thoughtful response.There are no wrong answers to Discussion Questions, but short, simple responses will receive lower marks than longer, well thought out ones.we’re doing 3, a seperate word doc for each one, book attached.- Ch 8 Page 404Review Questions: 3, 4, 8Discussion Questions: 12, 14, 18- Ch 9 Page 446Review Questions: 3, 7, 8Discussion Questions: 9, 11, 12, 13- Ch 10 Page 492Review Questions: 3, 5, 8Discussion Questions:11, 12, 15
ethics_for_the_information_age__7th_edition_by_mic_3675364__z_lib.org___1_.pdf

Unformatted Attachment Preview

Ethics for the information age
7th edition
Ethics for the information age
7th edition
MICHAEL J. QUINN
Seattle University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris
Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul
Singapore Taipei Tokyo
Editorial Director, ECS Marcia Horton
Acquisitions Editor Matt Goldstein
Editorial Assistant Kristy Alaura
Executive Marketing Manager Tim Galligan
Director of Marketing Christy Lesko
Product Marketing Manager Bram van Kempen
Field Marketing Manager Demetrius Hall
Marketing Assistant Jon Bryant
Team Lead Program and Product Management Scott Disanno
Program Manager Carole Snyder
Cover Designer Joyce Consentino Wells
Text Designer Sandra Rigney
Manager, Text Permissions Tim Nicholls
Text Permission Project Manager Maya Gomez
Media Project Manager Renata Butera
Full-Service Project Management Cypress Graphics, Paul C.
Anagnostopoulos
Printer/Binder R. R. Donnelley/Harrisonburg
Text Fonts Minion and Nofret
Credits and acknowledgments borrowed from other sources and
reproduced, with permission, appear on the appropriate page in the text.
Copyright © 2017, 2015, 2013, 2011 Pearson Education, Inc. All rights
reserved. Printed in the United States of America. This publication is
protected by Copyright, and permission should be obtained from the
publisher prior to any prohibited reproduction, storage in a retrieval
system, or transmission in any form or by any means, electronic,
mechanical, photocopying, recording, or likewise. To obtain permission(s)
to use material from this work, please submit a written request to
Pearson Education, Inc., Permissions Department, 221 River Street,
Hoboken, New Jersey 07030, or you may fax your request to 201-2363290.
Many of the designations by manufacturers and sellers to distinguish
their products are claimed as trademarks. Where those designations
appear in this book, and the publisher was aware of a trademark claim,
the designations have been printed in initial caps or all caps.
Library of Congress Cataloging-in-Publication Data on file
ISBN 10: 0-13-429654-0
ISBN 13: 978-0-13-429654-8
Brief Contents
Preface xxi
1 Catalysts for Change 1
An Interview with Dalton Conley 47
2 Introduction to Ethics 49
An Interview with James Moor 105
3 Networked Communications 109
An Interview with Michael Liebhold 159
4 Intellectual Property 161
An Interview with June Besek 223
5 Information Privacy 227
An Interview with Michael Zimmer 267
6 Privacy and the Government 271
An Interview with Jerry Berman 317
7 Computer and Network Security 321
An Interview with Matt Bishop 361
8 Computer Reliability 365
An Interview with Avi Rubin 411
9 Professional Ethics 413
An Interview with Paul Axtell 453
10 Work and Wealth 457
An Interview with Martin Ford 499
Appendix A: Plagiarism 503
Index 507
Contents
Preface xxi
1 Catalysts for Change 1
1.1 Introduction 2
1.2 Milestones in Computing 5
1.2.1 Aids to Manual Calculating 6
1.2.2 Mechanical Calculators 6
1.2.3 Cash Register 8
1.2.4 Punched-Card Tabulation 9
1.2.5 Precursors of Commercial Computers 11
1.2.6 First Commercial Computers 13
1.2.7 Programming Languages and Time-Sharing 14
1.2.8 Transistor and Integrated Circuit 16
1.2.9 IBM System/360 16
1.2.10 Microprocessor 17
1.2.11 Personal Computer 19
1.3 Milestones in Networking 21
1.3.1 Electricity and Electromagnetism 22
1.3.2 Telegraph 23
1.3.3 Telephone 23
1.3.4 Typewriter and Teletype 25
1.3.5 Radio 26
1.3.6 Television 26
1.3.7 Remote Computing 27
1.3.8 ARPANET 28
1.3.9 Email 28
1.3.10 Internet 30
1.3.11 NSFNET 30
1.3.12 Broadband 30
1.3.13 Wireless Networks 31
1.4 Milestones in Information Storage and Retrieval 31
1.4.1 Greek Alphabet 31
1.4.2 Codex and Paper 32
1.4.3 Gutenberg’s Printing Press 32
1.4.4 Newspapers 33
1.4.5 Hypertext 33
1.4.6 Graphical User Interface 34
1.4.7 Single-Computer Hypertext Systems 35
1.4.8 Networked Hypertext: World Wide Web 36
1.4.9 Search Engines 36
1.5 Information Technology Issues 37
Summary 39
Further Reading and Viewing 40
Review Questions 41
Discussion Questions 41
In-Class Exercises 42
References 43
An Interview with Dalton Conley 47
2 Introduction to Ethics 49
2.1 Introduction 49
2.1.1 Defining Terms 50
2.1.2 Four Scenarios 52
2.1.3 Overview of Ethical Theories 55
2.2 Subjective Relativism 56
2.2.1 The Case for Subjective Relativism 56
2.2.2 The Case against Subjective Relativism 57
2.3 Cultural Relativism 58
2.3.1 The Case for Cultural Relativism 58
2.3.2 The Case against Cultural Relativism 59
2.4 Divine Command Theory 61
2.4.1 The Case for the Divine Command Theory 62
2.4.2 The Case against the Divine Command Theory 63
2.5 Ethical Egoism 64
2.5.1 The Case for Ethical Egoism 65
2.5.2 The Case against Ethical Egoism 65
2.6 Kantianism 67
2.6.1 Good Will and the Categorical Imperative 67
2.6.2 Evaluating a Scenario Using Kantianism 70
2.6.3 The Case for Kantianism 70
2.6.4 The Case against Kantianism 71
2.7 Act Utilitarianism 72
2.7.1 Principle of Utility 72
2.7.2 Evaluating a Scenario Using Act Utilitarianism 74
2.7.3 The Case for Act Utilitarianism 75
2.7.4 The Case against Act Utilitarianism 76
2.8 Rule Utilitarianism 77
2.8.1 Basis of Rule Utilitarianism 78
2.8.2 Evaluating a Scenario Using Rule Utilitarianism 78
2.8.3 The Case for Rule Utilitarianism 79
2.8.4 The Case against Utilitarianism in General 80
2.9 Social Contract Theory 81
2.9.1 The Social Contract 81
2.9.2 Rawls’s Theory of Justice 83
2.9.3 Evaluating a Scenario Using Social Contract Theory
85
2.9.4 The Case for Social Contract Theory 86
2.9.5 The Case against Social Contract Theory 87
2.10 Virtue Ethics 88
2.10.1 Virtues and Vices 88
2.10.2 Making a Decision Using Virtue Ethics 91
2.10.3 The Case for Virtue Ethics 92
2.10.4 The Case against Virtue Ethics 93
2.11 Comparing Workable Ethical Theories 94
2.12 Morality of Breaking the Law 94
2.12.1 Social Contract Theory Perspective 96
2.12.2 Kantian Perspective 96
2.12.3 Rule Utilitarian Perspective 97
2.12.4 Act Utilitarian Perspective 97
2.12.5 Conclusion 98
Summary 98
Further Reading and Viewing 99
Review Questions 99
Discussion Questions 101
In-Class Exercises 102
References 103
An Interview with James Moor 105
3 Networked Communications 109
3.1 Introduction 109
3.2 Spam 111
3.2.1 The Spam Epidemic 111
3.2.2 Need for Social-Technical Solutions 113
3.2.3 Case Study: Ann the Acme Accountant 113
3.3 Internet Interactions 116
3.3.1 The World Wide Web 116
3.3.2 Mobile Apps 116
3.3.3 How We Use the Internet 117
3.4 Text Messaging 119
3.4.1 Transforming Lives in Developing Countries 119
3.4.2 Twitter 120
3.4.3 Business Promotion 120
3.4.4 Political Activism 120
3.5 Censorship 121
3.5.1 Direct Censorship 121
3.5.2 Self-Censorship 122
3.5.3 Challenges Posed by the Internet 122
3.5.4 Government Filtering and Surveillance of Internet
Content 123
3.5.5 Ethical Perspectives on Censorship 124
3.6 Freedom of Expression 126
3.6.1 History 126
3.6.2 Freedom of Expression Not an Absolute Right 127
3.6.3 FCC v. Pacifica Foundation 128
3.6.4 Case Study: Kate’s Blog 129
3.7 Children and Inappropriate Content 131
3.7.1 Web Filters 131
3.7.2 Child Internet Protection Act 132
3.7.3 Ethical Evaluations of CIPA 132
3.7.4 Sexting 134
3.8 Breaking Trust 135
3.8.1 Identity Theft 135
3.8.2 Fake Reviews 137
3.8.3 Online Predators 137
3.8.4 Ethical Evaluations of Police Sting Operations 138
3.8.5 False Information 140
3.8.6 Cyberbullying 141
3.8.7 Revenge Porn 142
3.9 Internet Addiction 143
3.9.1 Is Internet Addiction Real? 143
3.9.2 Contributing Factors to Addiction 145
3.9.3 Ethical Evaluation of Internet Addiction 145
Summary 146
Further Reading and Viewing 147
Review Questions 148
Discussion Questions 148
In-Class Exercises 151
References 152
An Interview with Michael Liebhold 159
4 Intellectual Property 161
4.1 Introduction 161
4.2 Intellectual Property Rights 162
4.2.1 Property Rights 163
4.2.2 Extending the Argument to Intellectual Property 165
4.2.3 Benefits of Intellectual Property Protection 167
4.2.4 Limits to Intellectual Property Protection 167
4.3 Protecting Intellectual Property 169
4.3.1 Trade Secrets 169
4.3.2 Trademarks and Service Marks 170
4.3.3 Patents 171
4.3.4 Copyrights 172
4.3.5 Case Study: The Database Guru 175
4.4 Fair Use 179
4.4.1 Sony v. Universal City Studios 181
4.4.2 Audio Home Recording Act of 1992 182
4.4.3 RIAA v. Diamond Multimedia 183
4.4.4 Kelly v. Arriba Soft 183
4.4.5 Authors Guild v. Google 184
4.4.6 Mashups 185
4.5 Digital Media 186
4.5.1 Digital Rights Management 186
4.5.2 Digital Millennium Copyright Act 187
4.5.3 Secure Digital Music Initiative 187
4.5.4 Sony BMG Music Entertainment Rootkit 188
4.5.5 Criticisms of Digital Rights Management 188
4.5.6 Online Music Stores Drop Digital Rights Management
189
4.5.7 Microsoft Xbox One 189
4.6 Peer-to-Peer Networks and Cyberlockers 190
4.6.1 RIAA Lawsuits against Napster, Grokster, and Kazaa
190
4.6.2 MGM v. Grokster 192
4.6.3 BitTorrent 193
4.6.4 Legal Action against the Pirate Bay 194
4.6.5 PRO-IP Act 195
4.6.6 Megaupload Shutdown 195
4.6.7 Legal Online Access to Entertainment 196
4.7 Protections for Software 197
4.7.1 Software Copyrights 197
4.7.2 Violations of Software Copyrights 197
4.7.3 Safe Software Development 198
4.7.4 Software Patents 199
4.8 Legitimacy of Intellectual Property Protection for Software
201
4.8.1 Rights-Based Analysis 202
4.8.2 Utilitarian Analysis 203
4.8.3 Conclusion 204
4.9 Open-Source Software 204
4.9.1 Consequences of Proprietary Software 205
4.9.2 “Open Source” Definition 206
4.9.3 Beneficial Consequences of Open-Source Software
206
4.9.4 Examples of Open-Source Software 207
4.9.5 The GNU Project and Linux 207
4.9.6 Impact of Open-Source Software 209
4.10 Creative Commons 209
Summary 212
Further Reading and Viewing 213
Review Questions 214
Discussion Questions 214
In-Class Exercises 215
References 216
An Interview with June Besek 223
5 Information Privacy 227
5.1 Introduction 227
5.2 Perspectives on Privacy 229
5.2.1 Defining Privacy 229
5.2.2 Harms and Benefits of Privacy 230
5.2.3 Is There a Natural Right to Privacy? 232
5.2.4 Privacy and Trust 236
5.2.5 Case Study: The New Parents 237
5.3 Information Disclosures 239
5.3.1 Facebook Tags 240
5.3.2 Enhanced 911 Services 241
5.3.3 Rewards or Loyalty Programs 241
5.3.4 Body Scanners 242
5.3.5 RFID Tags 243
5.3.6 Implanted Chips 244
5.3.7 Mobile Apps 244
5.3.8 OnStar 244
5.3.9 Automobile “Black Boxes” 245
5.3.10 Medical Records 245
5.3.11 Digital Video Recorders 246
5.3.12 Cookies and Flash Cookies 246
5.4 Data Mining 246
5.4.1 Data Mining Defined 246
5.4.2 Opt-In versus Opt-Out Policies 247
5.4.3 Examples of Data Mining 249
5.4.4 Social Network Analysis 252
5.4.5 Release of “Anonymized” Datasets 252
5.5 Examples of Consumer Backlash 254
5.5.1 Marketplace: Households 254
5.5.2 Facebook Beacon 254
5.5.3 Malls Track Shoppers’ Cell Phones 255
5.5.4 iPhone Apps Uploading Address Books 255
5.5.5 Instagram’s Proposed Change to Terms of Service 256
Summary 256
Further Reading and Viewing 257
Review Questions 257
Discussion Questions 258
In-Class Exercises 260
References 261
An Interview with Michael Zimmer 267
6 Privacy and the Government 271
6.1 Introduction 271
6.2 US Legislation Restricting Information Collection 273
6.2.1 Employee Polygraph Protection Act 273
6.2.2 Children’s Online Privacy Protection Act 273
6.2.3 Genetic Information Nondiscrimination Act 273
6.3 Information Collection by the Government 274
6.3.1 Census Records 274
6.3.2 Internal Revenue Service Records 275
6.3.3 FBI National Crime Information Center 2000 275
6.3.4 OneDOJ Database 277
6.3.5 Closed-Circuit Television Cameras 278
6.3.6 License Plate Scanners 279
6.3.7 Police Drones 279
6.4 Covert Government Surveillance 280
6.4.1 Wiretaps and Bugs 281
6.4.2 Operation Shamrock 283
6.4.3 Carnivore Surveillance System 284
6.4.4 Covert Activities after 9/11 284
6.5 US Legislation Authorizing Wiretapping 285
6.5.1 Title III 286
6.5.2 Foreign Intelligence Surveillance Act 286
6.5.3 Electronic Communications Privacy Act 286
6.5.4 Stored Communications Act 287
6.5.5 Communications Assistance for Law Enforcement Act
287
6.6 USA PATRIOT Act 288
6.6.1 Provisions of the Patriot Act 288
6.6.2 National Security Letters 289
6.6.3 Responses to the Patriot Act 290
6.6.4 Successes and Failures 291
6.6.5 Long-Standing NSA Access to Telephone Records 292
6.7 Regulation of Public and Private Databases 293
6.7.1 Code of Fair Information Practices 293
6.7.2 Privacy Act of 1974 295
6.7.3 Fair Credit Reporting Act 296
6.7.4 Fair and Accurate Credit Transactions Act 296
6.7.5 Financial Services Modernization Act 296
6.8 Data Mining by the Government 297
6.8.1 Internal Revenue Service Audits 297
6.8.2 Syndromic Surveillance Systems 297
6.8.3 Telecommunications Records Database 297
6.8.4 Predictive Policing 298
6.8.5 Potential Harms of Profiling 298
6.9 National Identification Card 299
6.9.1 History and Role of the Social Security Number 299
6.9.2 Debate over a National ID Card 300
6.9.3 The REAL ID Act 302
6.10 Information Dissemination 303
6.10.1 Family Education Rights and Privacy Act 303
6.10.2 Video Privacy Protection Act 303
6.10.3 Health Insurance Portability and Accountability Act
303
6.10.4 Freedom of Information Act 304
6.10.5 Tollbooth Records Used in Court 304
6.11 Invasion 305
6.11.1 Telemarketing 305
6.11.2 Loud Television Commercials 306
6.11.3 Requiring Identification for Pseudoephedrine
Purchases 306
6.11.4 Advanced Imaging Technology Scanners 306
Summary 307
Further Reading and Viewing 308
Review Questions 309
Discussion Questions 310
In-Class Exercises 311
References 312
An Interview with Jerry Berman 317
7 Computer and Network Security 321
7.1 Introduction 321
7.2 Hacking 322
7.2.1 Hackers, Past and Present 322
7.2.2 Penalties for Hacking 324
7.2.3 Selected Hacking Incidents 324
7.2.4 Case Study: Firesheep 325
7.3 Malware 328
7.3.1 Viruses 328
7.3.2 The Internet Worm 330
7.3.3 Sasser 335
7.3.4 Instant Messaging Worms 335
7.3.5 Conficker 335
7.3.6 Cross-Site Scripting 336
7.3.7 Drive-By Downloads 336
7.3.8 Trojan Horses and Backdoor Trojans 336
7.3.9 Rootkits 336
7.3.10 Spyware and Adware 337
7.3.11 Bots and Botnets 337
7.3.12 Defensive Measures 337
7.4 Cyber Crime and Cyber Attacks 338
7.4.1 Phishing and Spear Phishing 338
7.4.2 SQL Injection 339
7.4.3 Denial-of-Service and Distributed Denial-of-Service
Attacks 339
7.4.4 Cyber Crime 339
7.4.5 Politically Motivated Cyber Attacks 341
7.5 Online Voting 346
7.5.1 Motivation for Online Voting 346
7.5.2 Proposals 346
7.5.3 Ethical Evaluation 347
Summary 350
Further Reading and Viewing 351
Review Questions 351
Discussion Questions 352
In-Class Exercises 353
References 354
An Interview with Matt Bishop 361
8 Computer Reliability 365
8.1 Introduction 365
8.2 Data Entry or Data Retrieval Errors 366
8.2.1 Disenfranchised Voters 366
8.2.2 False Arrests 366
8.2.3 Utilitarian Analysis: Accuracy of NCIC Records 367
8.3 Software and Billing Errors 368
8.3.1 Errors Leading to System Malfunctions 368
8.3.2 Errors Leading to System Failures 369
8.3.3 Analysis: E-retailer Posts Wrong Price, Refuses to
Deliver 371
8.4 Notable Software System Failures 372
8.4.1 Patriot Missile 372
8.4.2 Ariane 5 373
8.4.3 AT&T Long-Distance Network 374
8.4.4 Robot Missions to Mars 375
8.4.5 Denver International Airport 376
8.4.6 Tokyo Stock Exchange 377
8.4.7 Direct-Recording Electronic Voting Machines 378
8.5 Therac-25 381
8.5.1 Genesis of the Therac-25 382
8.5.2 Chronology of Accidents and AECL Responses 382
8.5.3 Software Errors 385
8.5.4 Postmortem 387
8.5.5 Moral Responsibility of the Therac-25 Team 388
8.5.6 Postscript 389
8.6 Computer Simulations 389
8.6.1 Uses of Simulation 389
8.6.2 Validating Simulations 390
8.7 Software Engineering 392
8.7.1 Specification 393
8.7.2 Development 393
8.7.3 Validation 394
8.7.4 Evolution 395
8.7.5 Improvement in Software Quality 395
8.7.6 Gender Bias 396
8.8 Software Warranties and Vendor Liability 397
8.8.1 Shrink-Wrap Warranties 397
8.8.2 Are Software Warranties Enforceable? 398
8.8.3 Should Software Be Considered a Product? 400
8.8.4 Case Study: Incredible Bulk 401
Summary 401
Further Reading and Viewing 404
Review Questions 404
Discussion Questions 405
In-Class Exercises 406
References 407
An Interview with Avi Rubin 411
9 Professional Ethics 413
9.1 Introduction 413
9.2 How Well Developed Are the Computing Professions? 415
9.2.1 Characteristics of a Fully Developed Profession 415
9.2.2 Case Study: Certified Public Accountants 416
9.2.3 How Do Computer-Related Careers Stack Up? 417
9.3 Software Engineering Code of Ethics 419
9.4 Analysis of the Code 427
9.4.1 Preamble 427
9.4.2 Alternative List of Fundamental Principles 428
9.5 Case Studies 429
9.5.1 Software Recommendation 430
9.5.2 Child Pornography 431
9.5.3 Antiworm 432
9.5.4 Consulting Opportunity 434
9.6 Whistle-Blowing 436
9.6.1 Morton Thiokol/NASA 437
9.6.2 Hughes Aircraft 438
9.6.3 US Legislation Related to Whistle-Blowing 440
9.6.4 Morality of Whistle-Blowing 441
Summary 444
Further Reading and Viewing 445
Review Questions 446
Discussion Questions 446
In-Class Exercises 448
References 450
An Interview with Paul Axtell 453
10 Work and Wealth 457
10.1 Introduction 457
10.2 Automation and Employment 458
10.2.1 Automation and Job Destruction 458
10.2.2 Automation and Job Creation 461
10.2.3 Effects of Increase in Productivity 462
10.2.4 Case Study: The Canceled Vacation 463
10.2.5 Rise of the Robots? 465
10.3 Workplace Changes 469
10.3.1 Organizational Changes 469
10.3.2 Telework 471
10.3.3 The Gig Economy 473
10.3.4 Monitoring 474
10.3.5 Multinational Teams 475
10.4 Globalization 475
10.4.1 Arguments for Globalization 476
10.4.2 Arguments against Globalization 477
10.4.3 Dot-Com Bust Increases IT Sector Unemployment
478
10.4.4 Foreign Workers in the American IT Industry 478
10.4.5 Foreign Competition 479
10.5 The Digital Divide 479
10.5.1 Global Divide 480
10.5.2 Social Divide 481
10.5.3 Models of Technological Diffusion 482
10.5.4 Critiques of the Digital Divide 483
10.5.5 Massive Open Online Courses 484
10.5.6 Net Neutrality 485
10.6 The “Winner-Take-All” Society 486
10.6.1 Harmful Effects of Winner-Take-All 487
10.6.2 Reducing Winner-Take-All Effects 489
Summary 490
Further Reading and Viewing 491
Review Questions 492
Discussion Questions 492
In-Class Exercises 494
References 495
An Interview with Martin Ford 499
Appendix A: Plagiarism 503
Consequences of Plagiarism 503
Types of Plagiarism 503
Guidelines for Citing Sources 504
How to Avoid Plagiarism 504
Misuse of Sources 504
Additional Information 505
References 505
Index 507
Preface
Computers and high-speed communication networks are transforming
our world. These technologies have brought us many benefits, but they
have also raised many social and ethical concerns. My view is that we
ought to approach every new technology in a thoughtful manner,
considering not just its short-term benefits, but also how its long-term use
will affect our lives. A thoughtful response to information technology
requires a basic understanding of its history, an awareness of current
information-technology-related issues, and a familiarity with ethics. I have
written Ethics for the Information Age with these ends in mind.
Ethics for the Information Age is suitable for college students at all levels.
The only prerequisite is some experience using computers and the
Internet. The book is appropriate for a stand-alone “computers and
society” or “computer ethics” course offered by a computer science,
business, or philosophy department. It can also be used as a
supplemental textbook in a technical course that devotes some time to
social and ethical issues related to computing.
As students discuss controversial issues related to information
technology, they have the opportunity to learn from one other and
improve their critical thinking skills. The provocative questions raised at
the end of every chapte …
Purchase answer to see full
attachment




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.