You are on page 1of 1

Breaches of copyright by those downloading files stored without the permission of the copyright holders

Employers monitoring their employees' emails and other Internet usage

Unsolicited emails

Hackers accessing online databases

Web sites installing cookies or spyware to monitor a user's online activities, which may be used by data
brokers

See also

Center for Minorities and People with Disabilities in Information Technology

Computing

Computer science

Data processing

Health information technology

Information and communications technology

Information management

Journal of Cases on Information Technology

Knowledge society

List of largest technology companies by revenue

Operational technology

Outline of information technology

World Information Technology and Services Alliance

You might also like