Stephen Cobb

Stephen Cobb
Independent Research

Master of Science

About

29
Publications
49,719
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
83
Citations
Introduction
Over three decades researching, writing, and teaching at the nexus of technology, ethics, crime, and public policy. Now exploring effects of patriarchy on the use and abuse of technology. Also policy issues around cybercrime, pollution, genetics, and congenital conditions such as hemochromatosis and amusia. CISSP since 1996. MSc in Security and Risk Management, Criminology Department, University of Leicester, UK. Dual citizen (UK/US) now living in Coventry, England. Award winning technologist.
Education
September 2016 - December 2016
University of Leicester
Field of study
  • Security and Risk Management

Publications

Publications (29)
Article
Full-text available
The goal of this paper is to advance efforts to improve cybercrime metrics, measures of the scale and impact of cybercrime that are widely considered to be an essential part of any comprehensive enforcement strategy against cybercriminals.
Presentation
Full-text available
Accurate assessment of risk is vital for effective cybersecurity, yet numerous studies show that perceptions of risk vary considerably, between demographic groups and along gender lines. Leveraging established research in areas like cultural theory of risk perception, plus original research by the authors, this session presents evidence of a “white...
Thesis
Full-text available
Pervasive criminal abuse of information and communication technologies has increased the demand for people who can take on the task of securing organizations against the increasing scope and scale of threats. With demand for these cybersecurity professionals growing faster than the supply, a problematic "cybersecurity skills gap" threatens the abil...
Article
Full-text available
This white paper evaluates claims that there are not enough people in the world with the necessary cybersecurity knowledge, skills, and abilities to meet current demand. Frequently quoted estimates of this global “cyber skills gap” range from 1 million today, to 1.5 million by 2020. If accurate, these numbers have serious implications for the work...
Article
Full-text available
Over the last four decades, the privacy of personal data has been the subject of legislation and litigation in both the US and the EU. Protection of personal data privacy under the law has been shaped by the interests of multiple constituencies: individuals, commercial organizations, government agencies, law enforcement, and national security servi...
Conference Paper
Cybercrime certainly feels like a major threat to the security of networked systems upon which so much of daily life depends in the world today. Criminals routinely use digital networks to steal data, defraud companies and consumers, and disrupt normal business operation in both public and private sectors. But just how big a threat is cybercrime? F...
Chapter
This chapter discusses different aspects of penetration of computer systems and networks. Both technical and nontechnical aspects come into play when people attempt to penetrate security systems. Penetration of information systems is possible by means of a wide range of methods, some of which are very hard to defend against. People responsible for...
Chapter
This chapter outlines the threats posed by spam, phishing, and Trojans, and discusses mitigation of those threats. Each of these threats is quite different from the other in some respects, but all three have some important elements in common. They all use deception, prey on the gullibility of computer users and achieve their ends more readily when...
Chapter
This chapter presents an overview of the hardware elements of computer security. Computer hardware has always played a major role in computer security. Over the years, that role has increased dramatically, due to both the increases in processing power, storage capacity, and communications capabilities as well as the decreases in cost and size of co...
Chapter
This chapter explains encryption technology and describes its application in areas such as file encryption, message scrambling, authentication, and secure Internet transactions. The ability to transform data so that they are accessible only to authorized persons is just one of the many valuable services performed by the technology commonly referred...
Conference Paper
Full-text available
The allure of malware, with its tremendous potential to infiltrate and disrupt digital systems, is understandable. Criminally motivated malware is now directed at all levels and corners of the cyber domain, from servers to endpoints, laptops, smartphones, tablets, and industrial control systems. A thriving underground industry today produces ever-i...
Research
Full-text available
A detailed look at the limitations of satellite-based internet connections, currently being sold as a solution to the broadband needs of rural communities. This paper argues that current satellite internet offerings - with their massive latency, tight usage caps, and high costs - are not a viable option for rural broadband.
Working Paper
Full-text available
This paper addresses the problem of unwanted email, known as spam, which may be commercial or malicious in nature. Unwanted email threatens to overwhelm legitimate email traffic—the messages that people want to receive—and is often used by criminals as a means to sell illegal goods or compromise systems and confidential data (phishing). Reforming e...
Book
Full-text available
The goal of this book is to help businesses and their employees learn what they need to know about privacy as it relates to company Web sites and email.
Book
Full-text available
550 page book on all aspects of personal computer and local area network security in 3 parts. Parts 2 and 3 are available at scobbs.blogspot.com
Conference Paper
One in five respondents to an Information Week/Ernst and Young Security Survey admitted that intruders had broken into, or had tried to break into, their corporate networks, via the Internet, during the preceding twelve months. Unfortunately, there is a growing impression that all of the security problems associated with internetworking can be fixe...
Conference Paper
For many companies, Internet commerce means taking credit card orders from customers shopping electronic catalogs on the World Wide Web. For others Internet commerce means dealing electronically with clients and suppliers, as an alternative to private, leased-line electronic document interchange (EDI) over value added networks or VANs). This use of...

Network

Cited By