denial of service attack

IT uses

Web 2.0

Communication and collaboration

Communication and collaboration

External social netweorking sites

Specialized forums

Interoperability

Information sharing

Downloading

P2P

P2P

Mobile Internet

PDAs

3G

apps

apps

GPS

GPS

Identity theft

Internet security

Cybercrime

Phishing

spyware

Information

encrypted

coded

Privacy and confidentiality

Electronic trail

Electronic trail

personal details

law enforcement agencies

surveilliance

snoop into

infiltrating

Hackers

Hackers

Virus

hijack

infected

malicious software/malware

E-commerce

B2B

trading hub

reverse auctions

consortium e-marketplace

B2C

pure-play

bricks-and-mortar outlets

clicks-and-mortar outlets

price comparison sites

E-procurement

E-procurement

Intellectual property

Illigal downloading

Copyright infringement

Encryption

Digital watermarks

DRM