Using real-life scenarios in law to prepare graduates for professional work practices
- Authors: Holm, Eric
- Date: 2010
- Type: Text , Book chapter
- Relation: Preparing graduates for the professions using scenario-based learning p. 169-177
- Full Text:
- Reviewed:
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
- Authors: Cheng, Lijiao , Li, Ying , Li, Wenli , Holm, Eric , Zhai, Qingguo
- Date: 2013
- Type: Text , Journal article
- Relation: Computers and Security Vol. 39, no. Part B (2013), p. 447-459
- Full Text: false
- Reviewed:
- Description: It is widely agreed that a large amount of information systems (IS) security incidents occur in the workplace because employees subvert existing IS Security Policy (ISSP). In order to understand the factors that constrain employees from deviance and violation of the organizational ISSP, past work has traditionally viewed this issue through the lens of formal deterrence mechanisms; we postulated that we could better explain employees' ISSP violation behaviours through considering both formal and informal control factors as well as through considering existing deterrence theory. We therefore developed a theoretical model based on both deterrence and social bond theories rooted in a social control perspective to better understand employee behaviour in this context. The model is validated using survey data of 185 employees. Our empirical results highlight that both formal and informal controls have a significant effect on employees' ISSP violation intentions. To be specific, employees' social bonding is found to have mixed impacts on the employee's intention to violate ISSP. Social pressures exerted by subjective norms and co-worker behaviours also significantly influence employees' ISSP violation intentions. In analyzing the formal sanctions, the perceived severity of sanctions was found to be significant while, perceived certainty of those sanctions was not. We discuss the key implications of our findings for managers and researchers and the implications for professional practice.
The role of the refrigerator in identity crime?
- Authors: Holm, Eric
- Date: 2016
- Type: Text , Journal article
- Relation: International journal of cyber-security and digital forensics Vol. 5, no. 1 (2016), p. 1-9
- Full Text: false
- Reviewed:
- Description: This paper explores how botnets in smart devices are exacerbating identity crime. This paper places the refrigerator at the heart of this discussion of the Internet of things that has become connected through the Internet and thereby susceptible to botnets and the collection of personal identification information as an enabler for identity crime. The paper highlights the fallibility of these devices and provides some mechanism to deal with these new risks and presents discussion on the need to for this relationship to be further explored.
The importance of mandatory data breach notification to identity crime
- Authors: Holm, Eric , Mackenzie, Geraldine
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.
The Darknet: A New Passageway to Identity Theft
- Authors: Holm, Eric
- Date: 2017
- Type: Text , Journal article
- Relation: International Journal of Information Security and Cybercrime (IJISC) Vol. 6, no. 1 (2017), p. 41-50
- Full Text: false
- Reviewed:
- Description: This paper considers how the darknet has emerged as a passageway for identity theft. The paper identifies the darknet as a means of facilitating the distribution of identification particulars and how this contributes toward identity theft. The paper considers the part of the darknet as an enabler in the distribution of information related to offending in identity crime and as a passive contributor toward identity crimes.
Teaching law to non-law students : The use of problem solving models in legal teaching
- Authors: Richardson, Kristy , Butler, Jennifer , Holm, Eric
- Date: 2009
- Type: Text , Journal article
- Relation: Studies in Learning, Evaluation, Innovation and Development Vol. 6, no. 2 (2009), p. 29-41
- Full Text:
- Reviewed:
- Description: The use of problem solving models has been successfully applied and subject to evaluation in law school courses. However, the models have not been evaluated in terms of their application to law courses in which non-law (i.e., business) students are involved. This paper discusses the usefulness of such legal problem solving methods for non-law students from a technology use and acceptance framework, presenting data obtained from a pilot study which was the subject of a teaching and learning grant from CQUniversity Australia.
- Description: 2003007346
Social networking, the catalyst for identity thefts in the digital society
- Authors: Holm, Eric
- Date: 2014
- Type: Text , Journal article
- Relation: International Journal on Advances in Life Sciences Vol. 6, no. 3-4 (2014), p. 157-166
- Full Text:
- Reviewed:
- Description: This paper explores the vulnerability of social network users to identity theft when they share personal identification information online. The sharing of details like age, sex, address and other personal information like photographs can assist in establishing an identity. Identity criminals exploit social network users and the weaknesses of social networking sites to gather the information needed to commit identity theft and identity fraud using this identification information. While there are mechanisms that can reduce the incidence of this crime, information sharing on social networks is voluntary, which, makes its control difficult. This paper presents an exploration of existing literature from Australia, the United States and United Kingdom and highlights the importance of the relationship between social networking and identity crime. The drivers to sharing information on these platforms are considered. The paper provides opportunities to improve the understanding of the relationship between personal information and the crime. A difficulty in having preventative mechanisms in place is that social networking sites have a vested interest in promoting rather than preventing the sharing of information. Further, identity crime is pervasive which, makes the amelioration of risks difficult. In conclusion, efforts have been made in this paper to outline arguments that will assist in resolving the crime given vulnerability of social network users to identity theft. © by authors.
Social networking and identity theft in the digital society
- Authors: Holm, Eric
- Date: 2014
- Type: Text , Conference paper
- Relation: ICDS 2014 : The Eighth International Conference on Digital Society p. 169-175
- Full Text: false
- Reviewed:
Responding to identity crime on the internet
- Authors: Holm, Eric
- Date: 2012
- Type: Text , Journal article
- Relation: International Journal of Cyber-Security and Digital Forensics Vol. 1, no. 2 (2012), p. 67-74
- Full Text: false
- Reviewed:
- Description: This paper discusses the unique challenges of responding to identity crime. Identity crime involves the use of personal identification information to perpetrate crimes. As such, identity crime involves using personal and private information to for illegal purposes. In this article, the two significant issues that obstruct responses to this crime are considered. These are first, the reporting of crime, and second the issue of jurisdiction. The paper also presents an exploration of some responses to identity crime.
- Description: C1
Information and privacy in the digital age
- Authors: Holm, Eric
- Date: 2007
- Type: Text , Conference paper
- Relation: Paper presented at 14th Annual Global Finance Conference
- Full Text:
- Reviewed:
- Description: Technological evolution is changing the way in which financial services are produced and delivered. The delivery of financial services has changed as the world has become a smaller place thanks to the worldwide networked infrastructure of the Internet. Indeed, the delivery of financial services is moving toward an increasing multitude of alternative channels of delivery and away from the traditional bricks-and-mortar delivery channels (Claessens, Glaessner & Klingebiel 2004). As the methods of delivery have changed, so to, have the risks involved with doing business. Internet users sending personal and proprietary data over the internet are increasingly at risk with respect to the information they send across the interconnected network, that is the Internet (Cranor, 2002). In the context of finance, these concerns hinge squarely upon the privacy of information. This paper will take a critical view of privacy and information security in finance. In doing this, the threats that arise because of the technologies of digital information and the kinds of countermeasures that can be effective will be discussed.
Identity crime : The challenges in the regulation of identity crime
- Authors: Holm, Eric
- Date: 2012
- Type: Text , Conference proceedings
- Full Text:
- Description: This paper discusses the unique challenges of regulating identity crime. Identity crime involves the use of personal identification information to perpetrate crimes of fraud. As such, the identity crime involves using personal and private information to perpetrate crime. This article considers the two significant issues that obstruct responses to this crime; firstly, the reporting of crime. Secondly the paper considers the issue of jurisdiction. Finally, the paper explores some responses to this crime. The paper then explores some of the current responses to identity crime. © 2012 IEEE.