StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Essential Criteria Involved when Considering the Introduction of Electronic Access Control Systems - Coursework Example

Cite this document
Summary
The paper “Essential Criteria Involved when Considering the Introduction of Electronic Access Control Systems” is an earnest example of a finance & accounting coursework. This essay examines the vital processes involved when considering the introduction of electronic access control systems. The paper will also compare and contrast a variety of types of devices that are available at the moment…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful

Extract of sample "Essential Criteria Involved when Considering the Introduction of Electronic Access Control Systems"

Running Head: essential criteria involved when considering the introduction of electronic access control systems and compare and contrast Essential criteria involved when considering the introduction of electronic access control systems and compare and contrast Name Institution Date Introduction This essay examines the vital processes involved when considering the introduction of electronic access control systems. The paper will also compare and contrast a variety of types of devices that are available at the moment. When examining the criteria involved, various theories of risk management will be taken into consideration, so as to come up with effective as well as up-to-date criteria that can help meet the demanding modern-day security needs. The definition of electronic access systems constitutes security components particularly based on issuing cards. Philip Purpura in the book: Security and Loss Prevention: An Introduction (2007) writes that controlling access to your premises is an important factor in physical protection, hence is the function of electronic access systems- to help manage the access of the premise anytime they feel like. Access control systems are basically used to monitor and control access to areas such as offices, hotels, computers rooms, car parks, elevators, just to mention but a few (Purpura, 2007). Access control is an everyday phenomenon. A lock on all cars is a form of access control. A PIN on every person’s ATM at the bank is a means of access control. Its possession is very important when a person seeks to control important, sensitive / confidential information as well as equipment (AOTEA electronic 2010). The main purpose of an electronic access control system is to allow or deny access to some area based on one or a combination of the following factors: What you have, what you know and who you are. The level of security desired determines what combinations of these factors are necessary and therefore what devices are chosen (Vellani, 2007). According to a recent article published in the Yale Law Review, there are essential criteria fundamental when considering to introduce electronic access systems; worth noting is that these criteria that are based on theories of defensible space, as established by Oscar Newman. According to principles of defensible space, there are a number of design features that are fundamental when introducing particularly passive countermeasures such as electronic access systems as well as when introducing perimeter protection, functional planning, physical planning and hardening. (Hopper, 2007) Technological advancements have made organizations to rapidly revolutionalise their security needs, in their quest for security solutions that can provide the control and information to run efficiently thus providing a conducive environment for employees working within the organization (Hearnden & Moore, 1999). So as to successfully implement their processes, the management is recommended to work hand in hand with the system integrator so as to develop different strategies that will reduce resistance (Norman, 2009). Natural Surveillance This is one of the most important principles of defensible space that one needs to mull over when considering to introduce electronic access systems. This principle is a design theory that is focused on making intruders easily detectable. This concept is endorsed by various features that seek to capitalize on the visibility of people, building entrances as well as parking areas. For example, entrances and windows that have frontage on streets and parking areas, sufficient night-time lighting, sidewalks and streets that is pedestrian friendly and front porches. (Randall, 2008) Promoting natural surveillance is a key objective of defensible space architecture and enhanced street lighting. According to recent research studies carried out in the U.K., it was established that improved illumination in public housing significantly reduces crime with modest proof of displacement. One element of an early intervention carried out by Crime Prevention Through Environment Through Environmental Design CPTED with the objective to manage break-in and crime in a business-related strip in Portland, Oregon, was enhanced illumination of the outside of stores. According to Oscar Newman, significant success has been reported in managing crime in public housing through applying natural surveillance principles. He recommends that one should always remember to be flexible when implementing natural surveillance so as to choose the most efficient system according to the location of the space. Ultimately, crime-stopper programs and informant hotlines are attempts to get the most out of the natural observation provided by the public. (Center for Problem Oriented Policing, 2010) Territorial Behavior This theory is essential in considering introducing electronic access systems. The theory is based upon recovering areas that have been invaded by unlawful users. The International Foundation for Protection Officers provide that this theory is essential because if design features have sheltered illegitimate or unlawful users and have scared off legitimate users, then one of the most significant things that should be done is to reclaim this space. One can achieve this by having enhanced security patrols to keep away illegitimate users until the space becomes desirable for the use of legitimate users. A key example of this was an area grabbed by illegitimate users of ‘skate boarders’ which made it dangerous for use. A variety of CPTED strategies were made, such as implementing security officer presence and making design changes. In the long run, more and more legitimate users came to the area, hence decreasing the number of skateboarders. (Crowe, 2000) Classifying Security Strategies The CPTED recommends that before introducing electronic access systems, one should classify security strategies into three essential categories. The first category in by using organized strategies. This includes the use of human resources such as police officers or other types of official guardians to develop security. The other strategy based in this theory is incorporating mechanical methods to develop security, an essential principle that can be achieved through processes such as effectively using hardware for example access control systems together with CCTV, locking mechanisms, or fences and related barriers. The other strategy in this theory is considering the use of a natural enhancement in addition to the access control systems to improve security systems. This can be in the form of making good use of windows to improve surveillance, increasing the usage of legitimate space users, improving ways to make users responsible for security, and such related strategies. It is worth to note that when implementing this theory, one should start with the natural methods of improving security, which can be augmented using organized and reflex methods. (International Foundation for Protection Officers, 2003) Choosing State-of-the-art- access control systems Modern time electronic access control systems have significantly developed to be in step with advanced technology. This is fundamental to businesses because of the significance of electronic Access Control systems to the business bottom line of business performance, making it very important for an organization to be extremely careful before installing an electronic device into the promise (ATSS access control 2003). Before choosing a proper electronic access control system, the management should start by considering other applications that the system will have to connect with. The most common applications are: monitored alarms, time and attendance. It is important to decide if the organization or company requires free or a controlled exist system (Vellani, 2007). The electronic access control system detects someone’s approaching exit and unlocks the door in order to allow people to leave the premise. Controlled exits system is where employees or staffs are allowed into the office by entering a code or swapping their card in order to have entry and exit of the secured area. In smaller system, it is recommended to connect a PC to the reader in order to configure the system. On the other hand, larger electronic access control system needs a dedicated PC to manage and control multiple doors (Sharma, 2005). It is important to consider using ASP (application service provider) to run the company’s electronic access control system. Instead of controlling the system on the PC, the ASP runs it in their data/information centre, such that it allows an individual to access data through the web browser (Umar, 2005). There are vital trade-offs involved: the system will always have a backup power, which means that an organization computer will always be functioning with or without the power outlets, such that, no employees will be required to maintain the servers running in order to access any control application. Some of the major essential criteria involved when considering the introduction of electronic access control systems are; choosing the vendors careful train the employees and communicate with them and determine the electronic devices that suit the organization requirement such that it can accommodate future expansion. Other factors include: timing, tracking, battery backup, size of the organization etcetera (CPP, 2008). Making an access Vendor Choice Choosing an access vendor requires essential principles that one should take into consideration. Vendors should be stable and provide timely support when it is needed. Flexibility is also an important factor to consider, the vendor should be in a position to adjust comfortably with specific requirements within the organization. In addition a good vendor should be in a position to ask relevant questions to the person in charge. They are expected to walk the manager through different specification process and allow the manager to find solutions to a specific issue. They do not necessarily need to see your tools, but they may carry out a site visit. It is important to try as much as possible to avoid vendors who claim to have "a perfect system for you" after 4 minutes of the talk- and by the way, this device is on sale this week only! (Hearnden & Moore, 1999) Worth noting is that the most reliable vendor is that who has worked with a wide range of different customers, however the person in charge should look for that vendor who has full qualifications and experience in your field of work. In particularly, do not work with a firm or a company that deals mostly with residential systems: for your business, it is important to get hold of commercial grade electronic access control system (Craighead, 2009). Correct software package The software requirements when considering introducing an access control system include: checking if the computer vendor has all the packages running on other systems. Workloads associated with system administration are also very important software requirements. These include: user access and security control, file system back-up, system maintenance, software installation, user notification on system changes and maintenance. It is also very important to ensure that the following instructions are followed: Backup media, user capacity, security and growth potential (infor., 1984). Communication with employees Increasing employee’s acceptance helps in boosting the success of electronic access control system. No matter how secured an access control system might be, if it is not accepted by the employees within the company, its implementation may be useless. Dissatisfaction within he employees may lead to abandonment of a good access system. Problem arises when the management has an idea of what to expect, many employees perceive restriction of their freedom as a sense of distrust when the expected manager integrates an electronic access control system. A major strategy used in boosting employee acceptance is through the following: Informing the employees of the possible benefits of the system to them and the company at large, Incorporate a technology that will be accepted by a lot of employees, Be open minded about the mechanic of the system, Train the employees and the immediate security staffs, Prevent undesirable elements from accessing the building, Prevent any suspended employee from entering the building, Create a lot of security at every point, for instance, allow every individual into one place, some into the other, and specifically one into the office, Limit the likelihood of robbery/theft of a personal property, and last but not least, Protect cars from being vandalized and stolen. Customized employee information may help the company to communicate better with its immediate employees, thus enhancing a pro-employee reflection. For instance, through configuring a specific system in order to accommodate employee information, a company may set up programs just to acknowledge anniversaries, arrange car collection and inform employees if an amazing thing has happened to their car in the parking lot. Recognize the facts that nothing you do will get rid of the "Big Brother is watching", a perception which users will have when implementing an electronic access control system. Spot and address possible employee resistance. Be open to distress and ideas that employees may have. If an employee realizes you are being sincere and closely related with them, there is a tendency of them being open to the benefits of a system (Hearnden & Moore, 1999). Negotiations about your access control system must be followed with explanations about critical operation. For instance, approximately all system produced today identifies cardholders independently. They are also able to produce a "log message" in actual time when the card is used. The access control system technologies used have a major impact of whether employees will accept the system or not. Choosing the right Card There are several options readily available in today’s incorporated access control systems, these are, magnetic stripe as well as proximity. For instance, a magnetic stripe system is more desirable because of its low cost. While technological progresses are built-up in order to enhance the safety through the use a magnetic stripe cards, it is still possible to erase them, thus the magnetic media has the ability to peel from the card. Magnetic stripe cards require high user participation (grab card, swipe, wait, put card away). The sanctuary of magnetic stripe can be improved through using an integrated tag or keypad with a magnetic stripe reader; however that alternative may forgo the cost benefit that makes magnetic stripe to be more attractive (Konicek & Little, 1997). Multiple skill qualifications offers even better elasticity and security by allowing different facilities to integrate multiple expertise’s at each door thus execute different technologies to tackle certain applications, at the same time as entailing users to carry only one credential for all applications. For instance, using a multiple technology card, a college campus might use magnetic stripe for low-security access control, a combination of proximity and keypad for high-security access control, magnetic stripe for point-of-sale transactions in the cafeteria and book store, photo ID for areas controlled by security guards, and smart cards for storing medical and insurance data for the health centre (Shanks & Bradley, 2004). In addition, choosing the expertise that will obtain the highest employee approval while retaining the highest level of sanctuary, give solemn consideration to employ quality mechanism all the way through the system. No element is more significant than the locking device you desire. The locking mechanism is where the rubber meets the road. Inexpensive electric hit can lead to the death of an electrical access control system (Konicek & Little, 1997). Suitable training may contribute to the efficiency of your electric system thus improve user acceptance. Inductions may start even before an electric system is put into practice. Teach appropriate technique of card use. For an electric magnetic stripe system, it is important to ensure that the card holders are familiar with the required course and optimal swipe speed for their cards. For immediacy, it is important to make sure that the card holders is acquainted with how to present the immediacy cards to the reader; they have to know the most advantageous read variety for all types of reader that has been incorporated. Engage the employees in the training, particularly to the training system operators. In addition, do not dither to take advantage of training course accessible by the system producer. When employees are acquainted with reasons as to why the electronic access control system should exists, how it will benefits them, how they should be involved with the implementation, and recognize how to use it, they may feel a part and parcel of the entire process and will put up little struggle to the incorporation of the electronic access control system (Officers, 2003). Timing It is important to comprehend specific times when secured doors would be locked and unlocked. Particularly, useful doors that accessible by the public and at a time by the employees of the organization. This will help to identify intruders during odd times (this is the time where no person whatsoever, is allowed in and out of the premise, unless authorized by the right officer in charge). Any person who shall be found in or leaving the premise during this time, shall be liable for any inconveniences witnesses inside the premise, this includes: brokerages, damages, theft and so on. Therefore timing is an essential factor that should be put in mind by some managers if not all (Craighead, 2009). Tracking It is also very essential to consider tracking capabilities of the computer. Any computerized access will carry out some tracking usages. It is always advised to check out all the available reports made and see whether they provide sufficient, relevant and reliable details that you need. This report should include: the name of the person who might have opened the door and when. This information will help keep tracks of all functions that are carried out within the premise, thus limit any unauthorized entry and exist into the premise. The person who opened the door shall be held responsible for any damages caused when a person had access to the premise when no one was allowed into the premise. This will enhance and facilitates accuracy and accountability for actions taken by the employees within the premise (Vellani, 2007). Size of the organization It is essential to consider the size of the organization, so as to fully understand the functions of an electronic access control system. It is also very important to consider the number of doors that needs to be secured. For example, smaller organizations may require one sever with an electronic keypad lock. Therefore, not all doors need an access control system. (Broder, 2006). The case of a larger building, however, requires more attention as the larger the size of a building, the more complex is the systems required. Worth noting is that building size has been identified as a significant criminogenic factor in the original conceptualization of the defensible space theory, but was later on established to be correlated to the crime rate. According to a study carried out by Newman to determine the role of organizational size so as to test the notion of defensible space, it was established that the larger the building or development, the more crime-related problems there are, suggesting that the larger the size of a building, the more factors required to ensure that efficient systems are put in place. Different types of device currently available. I will make a comparison and contrast between traditional and biometric system. Biometric system refers to as automated methods used in identifying living person based on behavioural or rather psychological characteristics. The system uses three technologies, these are: mimic, face and voice. Biometric ergonomic design and traditional system are types of an electronic access control system. The purpose of biometric is to improve system design and the overall performance in a system. On the other hand, traditional security evaluates performances in a biometric system. Biometric system uses physiological traits as compared to the traditional systems which are based on tokens, for instance key or password. A traditional system cannot distinguish between an imposter who gets the access privilege of an authentic user and the authentic user herself. In addition, biometric is more convenient since there is no use of password instead it uses biometric trait such as fingerprint. Despite their numerous advantages, a biometric system is more vulnerable to attacks, which has the ability to decrease their level of security as compared to a traditional security (Jain, 2001). Biometric system lack secrecy and non-replace ability (once a biometric system is compromised, there is no other way to return back or to a secure situation unlike the traditional system which allows replacement of a key or password. In a traditional system, utilizing passwords is usually compromised, paving way for intruders to gain access to both old and new password. On the other hand, in Biometric systems are not easily compromised as a result of cancellable biometric (Jain, 2001). In both, traditional and biometric system, there is a possibility of an intruder accessing the account, although it is difficult in a traditional system. Conclusion Electronic access control systems have made life so easy, as it is now very easy to monitor activities that are taking place within the office, through the use of electric locks, TVs and so on. This has protected most of the employee’s sensitive information from being accessed by an intruder. While comparing different types of access control solutions, this essay has explored the essential criteria which are necessary to consider when a company decide to install these security solution. When choosing a proper electronic access control system, the management should start by considering other applications that the system will have to connect with. Natural surveillance principles are essential concepts that have been proven by recent research in defensible space architecture. The most important factor to remember when considering introducing access control systems, as aforementioned, is to ensure the systems are flexible. This is also critical when considering territorial behaviour, Classifying Security Strategies as well as when choosing the vendor. The most reliable vendor is that who has worked with a wide range of different customers, however the person in charge should look for that vendor who has full qualifications and experience in your field of work. Another essential principle that has been established is that one should consider the correct software package, as this is bound to ensure that time losses and additional costs that come up from having to change software are avoided. This is also essential when choosing the right Card as well as when analysing the tracking capabilities of a computer system. Importantly, the tracking abilities of the system enable one to determine the efficiency of the control system before implementing it, which calls for checking and ensuring that all the accessible reports are made as required and seeing to it that they provide adequate, relevant and dependable details that you need. On the same vein,one should cmprehend specific times when secured doors would be locked and unlocked. There is a possibility when the access control system is introduced in the office as employees are likely to reject it. It is therefore very essential to educate them on the importance of the system and the entire company at large. A good rapport between the manager and employees will also boost employee’s acceptability of the electronic access control system. Customized employee information may help the company to communicate better with its immediate employees, thus enhancing a pro-employee reflection. Word count: 3782 References Anil K. Jain. (2001). Attacks on Biometric Systems: A Case Study in Fingerprints. Michigan State University. New York. AOTEA electronic. (2010). Access Control Systems, how can we help you? [internet]. Available at: http://www.aoteaelectric.co.nz [accessed 8 October 2010] ATSS access control. (2003). Why Should We Use Access Control System. [internet]. Available at: http://www.atss.in/Access/Access-Control.html [accessed 8 October 2010] AWG Agentur (2002). CD Sicherheitsmanagement Nr.3/2002: Bedrohungsanalysen. Österreich: SecureLINE Broder, J. F. (2006). Risk analysis and the security survey. London: Butterworth-Heinemann. Center for Problem Oriented Policing. (2010). p. 5-8. Crowe, T. (2000). Crime Prevention Through Environmental Design. Boston: Butterworth - Heinman. Cpp, B. W. (2008). Competitive Advantage-Fixing Small Business Security and Safety Problems. New York: Bill Wise CPP. Craighead, G. (2009). High-Rise Security and Fire Life Safety. London: Butterworth- Heinemann. Fospat Access Solutions How It Works. [internet]. Available at: http://www.fospataccess.com/howitworks.php [accessed 8 October 2010] Hearnden, K., & Moore, A. (1999). The handbook of business security: a practical guide to managing the security risk. New York: Kogan Page Publishers. Honey, G. (2000). Electronic access control. London: Newnes. Honey, G. (1999). Electronic Security Systems Pocket Book. London: Newnes. Hopper, L. J. (2007). Landscape architectural graphic standards. New York: John Wiley and Sons. infor., W. (1984). choosing the vendor of an electronic access control systems. London: Published by InfoWorld Media Group. Konicek, J., & Little, K. (1997). Security, ID systems, and locks: the book on electronic access control. Australia: Butterworth-Heinemann. Kovacich G.L. & Halibozek E.P. (2006). Security Metrics Management: How to manage the costs of an assets protection program. London: Butterworth-Heinemann. Norman, T. (2009). Integrated security systems design: concepts, specifications, and implementation. Australia: Butterworth-Heinemann. Officers, I. F. (2003). Protection officer training manual. Australia: Butterworth-Heinemann. Pearson, R. L. (2007). Electronic security systems: a manager's guide to evaluating and selecting system solutions. Australia: Butterworth-Heinemann. Purpura, P. (2007). Security and Loss Prevention: An Introduction. New York: Butterworth- Heinemann. Randall, A. (2008). 21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention. London: Taylor & Francis Ltd. Shanks, N. E., & Bradley, A. L. (2004). Handbook of checked baggage screening: advanced airport security operation. Ho: New Jersey: John Wiley and Sons. Sharma, R. (2005). Industrial Security Management. Delhi: New Age International. The International Foundation for Protection Officers (2003). Protection officer training manual. Hoboken: Elsevier . Umar, A. (2005). Information Security and Auditing in the Digital Age: A Practical and Managerial Perspecive. Chicago: nge solutions, inc,. Vellani, K. H. (2007). Strategic security management: a risk assessment guide for decision makers. London: Butterworth-Heinemann. Whitney, Sharon. (2010). what is Access Control, ILUS Electronics. New York. Wilkinson, P. (2007). Homeland security in the UK: future preparedness for terrorist attack since 9/11. London: Taylor & Francis,. The World Market for Nanoclays. (2010). Electronic Access Control Systems - A Global Strategic Business Report. Electronics. publication. Canada, USA. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Essential Criteria Involved when Considering the Introduction of Electronic Access Control Systems Coursework Example | Topics and Well Written Essays - 3750 words, n.d.)
Essential Criteria Involved when Considering the Introduction of Electronic Access Control Systems Coursework Example | Topics and Well Written Essays - 3750 words. https://studentshare.org/finance-accounting/2037961-discuss-the-essential-criteria-involved-when-considering-the-introduction-of-electronic-access
(Essential Criteria Involved When Considering the Introduction of Electronic Access Control Systems Coursework Example | Topics and Well Written Essays - 3750 Words)
Essential Criteria Involved When Considering the Introduction of Electronic Access Control Systems Coursework Example | Topics and Well Written Essays - 3750 Words. https://studentshare.org/finance-accounting/2037961-discuss-the-essential-criteria-involved-when-considering-the-introduction-of-electronic-access.
“Essential Criteria Involved When Considering the Introduction of Electronic Access Control Systems Coursework Example | Topics and Well Written Essays - 3750 Words”. https://studentshare.org/finance-accounting/2037961-discuss-the-essential-criteria-involved-when-considering-the-introduction-of-electronic-access.
  • Cited: 0 times

CHECK THESE SAMPLES OF Essential Criteria Involved when Considering the Introduction of Electronic Access Control Systems

Vantage from Epicore, NAV from Microsoft

In order to overcome the difficulties BITA is facing in managing its operations, the XMP systems the firm is using at the moment must be replaced with an ERP system which is anticipated to be more effective than XMP.... In order to overcome the difficulties BITA is facing in managing its operations, the XMP systems the firm is using at the moment must be replaced with an ERP system which is anticipated to be more effective than XMP.... It has a distributed common database that offers the ability to access the appropriate information, from the right source and therefore empowers the users throughout the entire supply chain to make reasonable decisions....
12 Pages (3000 words) Case Study

Information Technology Security

The ICT environment is a changing rapidly after the introduction of the new products especially the mobile accessories like cellular phones, laptops and personal Digital Assistants for example that result to various challenges to either the infrastructures or the security of the data.... Realization of these risks may also cause the small organizations which are still growing from securing their systems.... he excess dependant on the digital and computer information systems is very common in the daily activities hence resulting to heavy losses and cessation of economic activities....
16 Pages (4000 words) Essay

Information Systems Control and Security

This report has different sections which are the introduction, the literature review and the conclusion.... This report has different sections which are the introduction, the literature review and the conclusion.... In the introduction section, the topic of information system is defined and the problem background of the topic is explained.... … The paper "Information systems Control and Security " is a perfect example of a management report....
8 Pages (2000 words)

Essential Aspects in Project Management

The effective management of the teams depends on good leadership skills to control the project as such would ensure inspiration, proper leadership, and motivation of the team members to greater heights.... Moreover, the project managers need to have adequate knowledge of managing the teams considering that they have complex mix human resources, skills, technical understanding, and the process of facilitation.... Besides, successful project managers need to recognize the significance of people considering that without such members of the team, the project would cease to exist....
12 Pages (3000 words) Coursework

Risks Involved in Caf Business

Theft prevention and access control are some essential areas where risk analysis is important in ensuring safety and security in hotels.... It deals with the analysis of the situation that can develop and the problems that may be caused and then deduces methodologies to prevent these situations or development of ways to deal with such problems as and when they may arise (Alexander, Carol, and Sheedy, Elizabeth 2005).... … The paper "Risks involved in Café Business" is a perfect example of a report on management....
9 Pages (2250 words)

The Complexity and Interrelationships within Organizations

n modern educational curriculum systems, students are, offered organizational placements.... In addition, the report will seek to relate theory and practice when addressing the various learning dimensions.... … The paper "The Complexity and Interrelationships within Organizations" is a delightful example of coursework on business....
18 Pages (4500 words) Coursework

Delivering Services through Intermediaries and Electronic Channels

… The paper "Delivering Services through Intermediaries and electronic Channels" is a good example of marketing coursework.... The paper "Delivering Services through Intermediaries and electronic Channels" is a good example of marketing coursework.... This mainly in reference to the market prices and distribution services through physical and electronic channels.... The study below is a report of an article on delivery services through intermediaries and electronic services found in a street journal....
6 Pages (1500 words) Coursework

What Should Be the Criteria for Evaluating Project Success

… The paper "What Should Be the criteria for Evaluating Project Success" is a great example of management coursework.... The paper "What Should Be the criteria for Evaluating Project Success" is a great example of management coursework.... “Project success criteria are a set of values or principles by which project success can be evaluated” (Lim & Mohamed, 1999).... For the last fifty years, the achievement of a project has been evaluated by meeting the time, cost as well as quality criteria, referred to as “the iron triangle”....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us