Victoria Wang
Victoria Wang is a Senior Lecturer on Security and Cybercrime in the Institute of Criminal Justice Studies, University of Portsmouth. She particularly enjoys applying scientific rigour and academic analysis to real-world situations to obtain evidence-based solutions. Victoria is the Principal Investigator (PI) of a £360k (FEC funding) competitively-reviewed EPSRC project (EP/N027825/1) on Data Release: Trust, Identity, Privacy and Security, which is a collaboration with Swansea University (EP/N028139/1; FEC funding: £1.24M) (2016-2020). She leads one of the four work packages - information security - and is an active contributor to another work package - formal methods. She is a Co-Investigator (CoI) of the UK government's annual Cyber Security Breaches Survey (HM Government; £12,749) (2016; 2017; 2018; 2019). She is also a Program Committee Member of the First Workshop on Attackers and Cyber-Crime Operations; IEEE European Symposium on Security and Privacy 2019.
Phone: 023 9284 3900
Address: Room 5.30
St. George's Building, University of Portsmouth
Phone: 023 9284 3900
Address: Room 5.30
St. George's Building, University of Portsmouth
less
InterestsView All (12)
Uploads
Papers
A national wide survey was conducted in the United Kingdom (N = 519). The data were ana-lysed to present both descriptive and inferential statistical findings. The level of online self-censorship increases as the level of privacy concern increases. The level of privacy concern increases as the levels of privacy awareness and perceived vulnerability increase, and the level of effective information management decreases. This study extends the literature on online self-censorship, showing that privacy concerns increase the level of self-censorship in SNSs. It provides support for three antecedent factors to privacy concerns which impact upon levels of self-censorship when communicating in SNSs.
https://www.emeraldinsight.com/doi/pdfplus/10.1108/JICES-07-2018-0060
In book: Cyber Security: Law and Guidance
Publisher: Bloomsbury
highlight how the anonymous nature of the Darknet is used to facilitate criminal
activities. This paper reports on a recent research project in four Darknet forums that reveals a different aspect of the Darknet. Drawing on our qualitative fndings, we suggest
that many users of the Darknet might not perceive it as intrinsically criminogenic,
despite their acknowledgement of various kinds of criminal activity in this network.
Further, our research participants emphasised on the achievement of constructive
socio-political values through the use of the Darknet. This achievement is enabled
by various characteristics that are rooted in the Darknet’s technological structure,
such as anonymity, privacy, and the use of cryptocurrencies. These characteristics
provide a wide range of opportunities for good as well as for evil.
A national wide survey was conducted in the United Kingdom (N = 519). The data were ana-lysed to present both descriptive and inferential statistical findings. The level of online self-censorship increases as the level of privacy concern increases. The level of privacy concern increases as the levels of privacy awareness and perceived vulnerability increase, and the level of effective information management decreases. This study extends the literature on online self-censorship, showing that privacy concerns increase the level of self-censorship in SNSs. It provides support for three antecedent factors to privacy concerns which impact upon levels of self-censorship when communicating in SNSs.
https://www.emeraldinsight.com/doi/pdfplus/10.1108/JICES-07-2018-0060
In book: Cyber Security: Law and Guidance
Publisher: Bloomsbury
highlight how the anonymous nature of the Darknet is used to facilitate criminal
activities. This paper reports on a recent research project in four Darknet forums that reveals a different aspect of the Darknet. Drawing on our qualitative fndings, we suggest
that many users of the Darknet might not perceive it as intrinsically criminogenic,
despite their acknowledgement of various kinds of criminal activity in this network.
Further, our research participants emphasised on the achievement of constructive
socio-political values through the use of the Darknet. This achievement is enabled
by various characteristics that are rooted in the Darknet’s technological structure,
such as anonymity, privacy, and the use of cryptocurrencies. These characteristics
provide a wide range of opportunities for good as well as for evil.
problem which:
• denies genuine candidates the employment that they deserve
• denies employers the staff they need to do a good job
• allows fraudsters into organisations where they can then undertake wider fraud and theft
• damages the reputation of those organisations which do not undertake effective pre-employment checks
• represents a significant cost, thereby undermining the financial health of those organisations which are affected.
This report, for the first time, establishes a baseline figure for the cost of recruitment fraud. It also shows that, where it is
allowed to occur as a result of no or inadequate pre-employment checks, it often leads to further fraud and theft.
Fraudsters, encouraged by successfully gaining employment through dishonesty are often motivated to attempt wider
fraud within their host organisations. However, the deterrent to individuals from carrying out recruitment fraud is not complex or difficult for businesses to adopt. Effective pre-employment checks are relatively low cost and easy to commission. Specialists can check in-country, in the relevant local language, and look at local documentation. With fraud growing by almost 50% in the last 10 years1, the real question is not why would we do this, but why wouldn’t we?
qualitative survey of UK businesses and charities.
For this latest release, the quantitative survey was
carried out in winter 2018 and the qualitative element in early 2019. It helps these organisations to understand the nature and significance of the cyber security threats
they face, and what others are doing to stay
secure. It also supports the Government to shape future policy in this area.
The research was carried out during September 2014 using online questionnaires in two secondary schools and a youth organisation in Sussex. 686 questionnaires were retrieved. Within these retrieved questionnaires, 543 were completed. A significant proportion of the remaining questionnaires were half completed with identical series of questions unanswered towards the second half of the questionnaire. Perhaps, large cohorts of young people completing questionnaires in lessons ran out of time.
The behaviour categories used in this research emerged from Edwards’ (2013) – a research project exploring the behavioural and linguistic dimensions of 300 young people’s relationship building strategies in physical sites over 18 months (See appendix 1). The findings are summarised first and then data is presented in tables. These findings will be used to guide further focus group research in January and February, which will gather further data in order to help develop a safer communicative environment on digital media.
Commissioned by Eelectric Storm Youth Ltd
Commissioned by Electric Storm Youth Ltd.
https://www.parliament.uk/documents/lords-committees/digital-skills/Digital-Skills-Committee-Evidence.pdf
• a random probability telephone survey of 1,519 UK businesses and 569 UK registered charities from 9 October 2017 to 14 December 20171
• 50 in-depth interviews undertaken in January and February 2018 to follow up with organisations that participated in the survey, as well as higher education institutions.
For business results, comparisons are made where feasible to the 2017 and 2016 surveys (for which quantitative survey fieldwork was undertaken in late 2016 and late 2015 respectively). Charities were surveyed for the first time in the 2018 survey.
Commissioned by HR Government: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/702074/Cyber_Security_Breaches_Survey_2018_-_Main_Report.pdf
1. It was carried out by Ipsos MORI, in partnership with the Institute for Criminal Justice Studies at the University of Portsmouth, and comprised:
▪ a telephone survey of 1,523 UK businesses from 24 October 2016 to 11 January 20172
▪ 30 in-depth interviews undertaken in January and February 2017 to follow up businesses that participated in the survey.
Commissioned by HR Government:
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/609186/Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf
Commissioned by HR Government:
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/521465/Cyber_Security_Breaches_Survey_2016_main_report_FINAL.pdf
Commissioned by the Department for Digital, Culture, Media & Sport (HR Government)
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/767422/Understanding_the_UK_cyber_security_skills_labour_market.pdf