Return to Article Details New Information Technologies and Data Security Download Download PDF