Particularly enjoy applying scientific rigour and academic analysis to real-world situations to obtain evidence-based solutions.
Victoria Wang is the Principal Investigator (PI) of a £360k (FEC funding) competitively-reviewed EPSRC project (EP/N027825/1) on Data Release: Trust, Identity, Privacy and Security, which is a collaboration with Swansea University (EP/N028139/1; FEC funding: £1.24M) (2016-2020). She leads one of the four work packages - information security - and is an active contributor to another work package - formal methods.
She is a Program Committee Member and the keynote speaker of the First Workshop on Attackers and Cyber-Crime Operations; IEEE European Symposium on Security and Privacy 2019.
2018/19 Externally funded projects:
- Victims of Computer Misuse Crime. Funder: Home Office. £60,950 (CoI)
- ASC Task 0175 IMMT: Identification of Innovation Models, Methods and Tools. Funder: Defence Science and Technology Laboratory [dstl]. Portsmouth received: £23,957 (Academic PI)
- An IPSOS/Mori-led project – Understanding the UK Cyber Skills Labour Market. Funder: DCMS, UK Government. Portsmouth received: £8,250 (CoI)
- Brands on the Darknet (PI) & The Real Cost of Application Fraud (CoI). Funder: Crowe Clark Whitehill LLP. £10,000
- One of the four members of the panel of academic experts of an IPSOS/Mori-led project – Understanding the UK Cyber Skills Labour Market 2.0. Funder: DCMS, UK Government. The other three members are David Crozier, Head of Strategic Partnerships & Engagement at CSIT, Queen’s University Belfast; Professor Andrew Martin, Professor of Systems Security, University of Oxford; and Professor Mark Button, ICJS, University of Portsmouth.
Victoria's future research interests include: developing her Phatic Technology Theory for applications in marginalised urban societies, and developing cybersecurity solutions for critical infrastructure.
Her current research ranges over cyber/information security, surveillance studies, social theory, technological developments and online research methods. In collaboration with Crowe Clark Whitehill LLP and Professor Mark Button, she developed the Cyber Vulnerability Scorecard to facilitate organisations’ assessment of their cyber vulnerabilities and identification of the steps necessary to strengthen their cybersecurity.
Her latest research projects involve:
- data release and its related issues of trust, privacy and security;
- security threats and management measures in organisations;
- formal methods for monitoring, data collection and interventions;
- a general formal theory of digital identity and surveillance;
- developing new techno-social theories such as ‘Phatic Technologies’ as conceptual tools to understand cyberspace and its security issues;
- cybercrime and threats in various countries, e.g., Nigeria, and various networks, e.g., the Darknet; and
Victoria has published many peer-reviewed journal papers with plentiful in progress, and currently manages a research team and 4 doctoral supervisions as the 1st supervisor. In 2018, 2 of her previous PhD students successfully defended their theses with minor corrections (both submitted their corrections and completed). Previous and current doctoral supervision areas:
- A criminological study of the Darknet
- UK police operational decision-making model
- Cybercrime in Nigeria - Perception and reality
- Cybercrime in Nigeria - Techno-social governance
- The retaining of human verification in online moderation by Artificial Intelligence (AI)
- Cybercrime and its governance in Vietnam (sponsored by the Vietnamese Ministry of Public Security)
- Cybersecurity management within South Korean business - risks and cybercrime involving industrial security (partially sponsored by the Korean National Police)
Her latest publications include:
Exploring the extent of openness of open government data – A critique of open government datasets in the UK (Government Information Quarterly)
The barriers to the opening of government data in the UK: A view from the bottom (Information Polity)
- Surveillance and Identity: Conceptual Framework and Formal Models (Journal of Cybersecurity)