IT uses
Web 2.0
Communication and collaboration
External social netweorking sites
Specialized forums
Interoperability
Information sharing
Downloading
P2P
Mobile Internet
PDAs
3G
![apps](https://axissoftwaredynamics.com/wp-content/uploads/2016/05/web-application-frisco-tx.jpg)
apps
![GPS](https://www.rutvet.ru/sites/default/files/inline/images/mozhno-li-najti-telefon-po-gps_1.png)
GPS
Identity theft
Internet security
Cybercrime
Phishing
spyware
Information
encrypted
coded
Privacy and confidentiality
![Electronic trail](http://4.bp.blogspot.com/-RYQg6_hCb1w/UlZN7pVKcPI/AAAAAAAAACA/BRmkIHKYsrs/s1600/ELECTRONIC+TRAIL.png)
Electronic trail
personal details
law enforcement agencies
surveilliance
snoop into
infiltrating
Hackers
Virus
hijack
infected
malicious software/malware
E-commerce
B2B
trading hub
reverse auctions
consortium e-marketplace
B2C
pure-play
bricks-and-mortar outlets
clicks-and-mortar outlets
price comparison sites
E-procurement
Intellectual property
Illigal downloading
Copyright infringement
Encryption
Digital watermarks
DRM