Follow
Eric Holm
Title
Cited by
Cited by
Year
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
L Cheng, Y Li, W Li, E Holm, Q Zhai
Computers & Security 39, 447-459, 2013
3802013
Social Networking, the Catalyst for Identity Thefts in the Digital Society
E Holm
International Journal on Advances in Life Sciences 6 (3&4), 157-166, 2014
152014
The Darknet: A New Passageway to Identity Theft
E Holm
International Journal of Information Security and Cybercrime 6 (1), 41-50, 2017
142017
Teaching law to non-law students: The use of problem solving models in legal teaching
K Richardson, J Butler, E Holm
CQUniversity, 2009
142009
The Role of the Refrigerator in Identity Crime?
E Holm
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5 (1 …, 2016
92016
Responding to Identity Crime on the Internet
E Holm
International Journal of Cyber-Security and Digital Forensics 1 (2), 67-74, 2012
62012
The importance of mandatory data breach notification to identity crime
E Holm, G Mackenzie
2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014
52014
Identity crime: The challenges in the regulation of identity crime
E Holm
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
52012
The significance of mandatory data breach warnings to identity crime
E Holm, G Mackenzie
International Journal of Cyber-Security and Digital Forensics 3 (3), 158-169, 2014
32014
Using real-life scenarios in law to prepare graduates for professional work practices
E Holm
Preparing graduates for the professions using scenario-based learning …, 2010
32010
Identity Crime: Deliberating on Remedies for the Victim
E Holm
International Journal of Information Security and Cybercrime 4 (2), 49-60, 2015
2015
A Contract Law Workbook
E Holm
Thomson Reuters, 2009
2009
Information and privacy in the digital age
E Holm
GFC2007 14th Global Finance Conference, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–13