Dr Victoria Wang
Particularly enjoy applying scientific rigour and academic analysis to real-world situations to obtain evidence-based solutions.
Victoria Wang is the Principal Investigator (PI) of a £360k (FEC funding) competitively-reviewed EPSRC project (EP/N027825/1) on Data Release: Trust, Identity, Privacy and Security, which is a collaboration with Swansea University (EP/N028139/1; FEC funding: £1.24M) (2016-2020). She leads one of the four work packages - information security - and is an active contributor to another work package - formal methods.
She is a Program Committee Member and the keynote speaker of the First Workshop on Attackers and Cyber-Crime Operations; IEEE European Symposium on Security and Privacy 2019.
2018/19 Externally funded projects:
- Victims of Computer Misuse Crime. Funder: Home Office. £60,950 (CoI)
- ASC Task 0175 IMMT: Identification of Innovation Models, Methods and Tools. Funder: Defence Science and Technology Laboratory [dstl]. Portsmouth received: £23,957 (Academic PI)
- An IPSOS/Mori-led project – Understanding the UK Cyber Skills Labour Market. Funder: DCMS, UK Government. Portsmouth received: £8,250 (CoI)
- Brands on the Darknet (PI) & The Real Cost of Application Fraud (CoI). Funder: Crowe Clark Whitehill LLP. £10,000
- An IPSOS/Mori-led project – Understanding the UK Cyber Skills Labour Market 2.0. Funder: DCMS, UK Government. A member of the panel of academic experts. This panel includes David Crozier, Head of Strategic Partnerships & Engagement at CSIT, Queen’s University Belfast, Professor Andrew Martin, Professor of Systems Security at the University of Oxford, and Professor Mark Button and Dr Victoria Wang from the ICJS at the University of Portsmouth.
Victoria's future research interests include: developing her Phatic Technology Theory for applications in marginalised urban societies, and developing cybersecurity solutions for critical infrastructure.
Her current research ranges over cyber/information security, surveillance studies, social theory, technological developments and online research methods. In collaboration with Crowe Clark Whitehill LLP and Professor Mark Button, she developed the Cyber Vulnerability Scorecard to facilitate organisations’ assessment of their cyber vulnerabilities and identification of the steps necessary to strengthen their cybersecurity.
Her latest research projects involve:
- data release and its related issues of trust, privacy and security;
- security threats and management measures in organisations;
- formal methods for monitoring, data collection and interventions;
- a general formal theory of digital identity and surveillance;
- developing new techno-social theories such as ‘Phatic Technologies’ as conceptual tools to understand cyberspace and its security issues;
- cybercrime and threats in various countries, e.g., Nigeria, and various networks, e.g., the Darknet; and
Victoria has published many peer-reviewed journal papers with plentiful in progress, and currently manages a research team and 4 doctoral supervisions as the 1st supervisor. In 2018, 2 of her previous PhD students successfully defended their theses with minor corrections (both submitted their corrections and completed). Previous and current doctoral supervision areas:
- A criminological study of the Darknet
- UK police operational decision-making model
- Cybercrime in Nigeria - Perception and reality
- Cybercrime in Nigeria - Techno-social governance
- The retaining of human verification in online moderation by Artificial Intelligence (AI)
- Cybercrime and its governance in Vietnam (sponsored by the Vietnamese Ministry of Public Security)
- Cybersecurity management within South Korean business - risks and cybercrime involving industrial security (partially sponsored by the Korean National Police)
Her latest publications include:
- The barriers to the opening of government data in the UK: A view from the bottom (Information Polity)
- Dissecting deep learning networks - visualizing mutual information(Entropy)
- The not so Dark Side of the Darknet - A qualitative study (Security Journal)
- Surveillance and Identity: Conceptual Framework and Formal Models (Journal of Cybersecurity)