artificial intelligence |
threaten (synonyms and examples of how privacy is compromised) |
privacy (related terms and types of privacy) |
amazon echo | surveillance | medical records |
siri | data mining | security |
technology | GPS | marketing |
This interactive tool guides students through the process of creating an effective keyword search for their research topic and then allows students to email the results to themselves and their instructor. Students can also launch the search in the Library Catalog, Academic Search Complete, or JSTOR.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 Generic License.