Teaching law to non-law students : The use of problem solving models in legal teaching
- Authors: Richardson, Kristy , Butler, Jennifer , Holm, Eric
- Date: 2009
- Type: Text , Journal article
- Relation: Studies in Learning, Evaluation, Innovation and Development Vol. 6, no. 2 (2009), p. 29-41
- Full Text:
- Reviewed:
- Description: The use of problem solving models has been successfully applied and subject to evaluation in law school courses. However, the models have not been evaluated in terms of their application to law courses in which non-law (i.e., business) students are involved. This paper discusses the usefulness of such legal problem solving methods for non-law students from a technology use and acceptance framework, presenting data obtained from a pilot study which was the subject of a teaching and learning grant from CQUniversity Australia.
- Description: 2003007346
Information and privacy in the digital age
- Authors: Holm, Eric
- Date: 2007
- Type: Text , Conference paper
- Relation: Paper presented at 14th Annual Global Finance Conference
- Full Text:
- Reviewed:
- Description: Technological evolution is changing the way in which financial services are produced and delivered. The delivery of financial services has changed as the world has become a smaller place thanks to the worldwide networked infrastructure of the Internet. Indeed, the delivery of financial services is moving toward an increasing multitude of alternative channels of delivery and away from the traditional bricks-and-mortar delivery channels (Claessens, Glaessner & Klingebiel 2004). As the methods of delivery have changed, so to, have the risks involved with doing business. Internet users sending personal and proprietary data over the internet are increasingly at risk with respect to the information they send across the interconnected network, that is the Internet (Cranor, 2002). In the context of finance, these concerns hinge squarely upon the privacy of information. This paper will take a critical view of privacy and information security in finance. In doing this, the threats that arise because of the technologies of digital information and the kinds of countermeasures that can be effective will be discussed.
Identity crime : The challenges in the regulation of identity crime
- Authors: Holm, Eric
- Date: 2012
- Type: Text , Conference proceedings
- Full Text:
- Description: This paper discusses the unique challenges of regulating identity crime. Identity crime involves the use of personal identification information to perpetrate crimes of fraud. As such, the identity crime involves using personal and private information to perpetrate crime. This article considers the two significant issues that obstruct responses to this crime; firstly, the reporting of crime. Secondly the paper considers the issue of jurisdiction. Finally, the paper explores some responses to this crime. The paper then explores some of the current responses to identity crime. © 2012 IEEE.
The importance of mandatory data breach notification to identity crime
- Authors: Holm, Eric , Mackenzie, Geraldine
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.
Using real-life scenarios in law to prepare graduates for professional work practices
- Authors: Holm, Eric
- Date: 2010
- Type: Text , Book chapter
- Relation: Preparing graduates for the professions using scenario-based learning p. 169-177
- Full Text:
- Reviewed:
Social networking, the catalyst for identity thefts in the digital society
- Authors: Holm, Eric
- Date: 2014
- Type: Text , Journal article
- Relation: International Journal on Advances in Life Sciences Vol. 6, no. 3-4 (2014), p. 157-166
- Full Text:
- Reviewed:
- Description: This paper explores the vulnerability of social network users to identity theft when they share personal identification information online. The sharing of details like age, sex, address and other personal information like photographs can assist in establishing an identity. Identity criminals exploit social network users and the weaknesses of social networking sites to gather the information needed to commit identity theft and identity fraud using this identification information. While there are mechanisms that can reduce the incidence of this crime, information sharing on social networks is voluntary, which, makes its control difficult. This paper presents an exploration of existing literature from Australia, the United States and United Kingdom and highlights the importance of the relationship between social networking and identity crime. The drivers to sharing information on these platforms are considered. The paper provides opportunities to improve the understanding of the relationship between personal information and the crime. A difficulty in having preventative mechanisms in place is that social networking sites have a vested interest in promoting rather than preventing the sharing of information. Further, identity crime is pervasive which, makes the amelioration of risks difficult. In conclusion, efforts have been made in this paper to outline arguments that will assist in resolving the crime given vulnerability of social network users to identity theft. © by authors.