Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory L Cheng, Y Li, W Li, E Holm, Q Zhai Computers & Security 39, 447-459, 2013 | 382 | 2013 |
Social Networking, the Catalyst for Identity Thefts in the Digital Society E Holm International Journal on Advances in Life Sciences 6 (3&4), 157-166, 2014 | 15 | 2014 |
The Darknet: A New Passageway to Identity Theft E Holm International Journal of Information Security and Cybercrime 6 (1), 41-50, 2017 | 14 | 2017 |
Teaching law to non-law students: The use of problem solving models in legal teaching K Richardson, J Butler, E Holm CQUniversity, 2009 | 14 | 2009 |
The Role of the Refrigerator in Identity Crime? E Holm International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5 (1 …, 2016 | 9 | 2016 |
Responding to Identity Crime on the Internet E Holm International Journal of Cyber-Security and Digital Forensics 1 (2), 67-74, 2012 | 6 | 2012 |
The importance of mandatory data breach notification to identity crime E Holm, G Mackenzie 2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014 | 5 | 2014 |
Identity crime: The challenges in the regulation of identity crime E Holm Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 5 | 2012 |
The significance of mandatory data breach warnings to identity crime E Holm, G Mackenzie International Journal of Cyber-Security and Digital Forensics 3 (3), 158-169, 2014 | 3 | 2014 |
Using real-life scenarios in law to prepare graduates for professional work practices E Holm Preparing graduates for the professions using scenario-based learning …, 2010 | 3 | 2010 |
Identity Crime: Deliberating on Remedies for the Victim E Holm International Journal of Information Security and Cybercrime 4 (2), 49-60, 2015 | | 2015 |
A Contract Law Workbook E Holm Thomson Reuters, 2009 | | 2009 |
Information and privacy in the digital age E Holm GFC2007 14th Global Finance Conference, 2007 | | 2007 |