IT uses
E-commerce
Intellectual property
DRM
Copyright infringement
Digital watermarks
Encryption
Illigal downloading
E-procurement
B2C
price comparison sites
pure-play
bricks-and-mortar outlets
clicks-and-mortar outlets
B2B
consortium e-marketplace
reverse auctions
trading hub
Internet security
infiltrating
Hackers
Virus
malicious software/malware
infected
hijack
Privacy and confidentiality
law enforcement agencies
snoop into
surveilliance
Electronic trail
personal details
Cybercrime
Information
coded
encrypted
spyware
Phishing
Identity theft
Mobile Internet
GPS
apps
3G
PDAs
Web 2.0
Information sharing
Downloading
P2P
Interoperability
Communication and collaboration
Specialized forums
External social netweorking sites