(synonyms and examples of how privacy is compromised)
(related terms and types of privacy)
|amazon echo||surveillance||medical records|
This interactive tool guides students through the process of creating an effective keyword search for their research topic and then allows students to email the results to themselves and their instructor. Students can also launch the search in the Library Catalog, Academic Search Complete, or JSTOR.
This work is licensed under a Creative Commons Attribution-NonCommercial 2.0 Generic License.