Skip to main content

Mr. Eric Holm

Lecturer in Commercial Law

Business Group B



Mt Helen Campus, Online


Eric Holm’s research expertise includes understanding the legal relationships between technology and the law. This research has involved topics such as identity theft, cybercrime and, more recently, new applications for blockchain technology in property law. Eric’s research interests also include teaching of students in law and business law.

Prior to his appointment at the University of Ballarat (now Federation University Australia) in 2009, Eric had been appointed at the James Cook University Law School and at Central Queensland University (Rockhampton) as a lecturer in law. Outside of the academy, he also engages in volunteer work for the Department of Justice and Community Safety.

Eric holds an MBA specialising in human resource management from Southern Cross University and Master of Laws from the University of New England. He is currently completing doctoral studies in law with a focus on blockchain implementation to land administration.

Field of Research

  • Other law and legal studies not elsewhere classifi
  • Cybersecurity and privacy not elsewhere classified
  • Information systems not elsewhere classified

The Darknet: A new Passageway to Identity Theft

The Role of the Refrigerator in Identity Crime?

This paper explores how botnets in smart devices are exacerbating identity crime. This paper...

Identity Crime: Deliberating on Remedies for the Victim

This paper explores the challenges faced by victims of identity crime following their...

Social Networking and Identity Theft in the Digital Society

  • Conference Proceedings

Social Networking, the Catalyst for Identity Thefts in the Digital Society

  • Journals

The importance of mandatory data breach notification to identity crime

The Significance of Mandatory Data Breach Warnings to Identity Crime

  • Journals

Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

It is widely agreed that a large amount of information systems (IS) security incidents occur in...

Identity crime: The challenges in the regulation of identity crime

Responding to Identity Crime on the Internet

  • Journals

Using real-life scenarios in law to prepare graduates for professional work practices

  • Book Chapters

Teaching law to non-law students: The use of problem solving models in legal teaching

  • Journals

Information and privacy in the digital age

  • Conference Proceedings