Return to Article Details Use of information and communication techniques and their impact on access control