Victoria Wang
University of Portsmouth
Internet privacyThe InternetEpistemologyWorld Wide WebSociologyBusinessContemporary societyPsychologyAbstract data typeData scienceModernityComputer securityComputer scienceSocial mediaSocial psychology
85Publications
20H-index
2,079Citations
Publications 44
Newest
#1Mark ButtonH-Index: 22
#2Dean BlackbournH-Index: 4
Last. Victoria WangH-Index: 20
view all 6 authors...
Source
Source
#1Mark ButtonH-Index: 22
#2Dean BlackbournH-Index: 4
Last. Victoria WangH-Index: 20
view all 6 authors...
Source
Oct 11, 2020 in SMC (Systems, Man and Cybernetics)
#1Xiyao Liu (CSU: Central South University)H-Index: 8
#2Ziping Ma (CSU: Central South University)
Last. Hui Fang (Lboro: Loughborough University)H-Index: 11
view all 8 authors...
Image hiding, one of the most important data hiding techniques, is widely used to enhance cybersecurity when transmitting multimedia data. In recent years, deep learning-based image hiding algorithms have been designed to improve the embedding capacity whilst maintaining sufficient imperceptibility to malicious eavesdroppers. These methods can hide a full-size secret image into a cover image, thus allowing full-image-to-image hiding. However, these methods suffer from a trade-off challenge to ba...
Source
#1Victoria Wang (University of Portsmouth)H-Index: 20
Last. Jeyong Jung (UOU: University of Ulsan)H-Index: 1
view all 3 authors...
Abstract This paper reports the findings from a research project on cyber security in the Nigerian Internet banking industry, by presenting the main cyber security breaches it has experienced, along with its cyber security capability and practices. An online survey was conducted with 100 experienced professional working in both the Nigerian banking and banking security service sectors. Our findings reveal a transformation of the Nigerian cybercrime industry from low-tech cyber-enabled crimes to ...
2 CitationsSource
#1Tie Hou (Shandong jianzhu university 山東建築大學)H-Index: 1
#2Victoria Wang (University of Portsmouth)H-Index: 20
Abstract Industrial Espionage (IE) is an umbrella term covering a complicated range of activities performed to gain competitive advantages, resulting in a huge amount of financial loss annually. Currently, techniques generated by rapid developments of Internet of Things (IOTs) and Data Science are enabling a massive increase of both frequency and power of IE related activities in our increasingly challenging global commercial environment. Thus, an in-depth understanding of IE is necessary. In th...
4 CitationsSource
#1Weijun Lin (AAEA: Agricultural & Applied Economics Association)H-Index: 1
#2Xinghong Huang (AAEA: Agricultural & Applied Economics Association)H-Index: 1
Last. Laihung YauH-Index: 1
view all 9 authors...
Increasingly, blockchain technology is attracting significant attentions in various agricultural applications. These applications could satisfy the diverse needs in the ecosystem of agricultural products, e.g., increasing transparency of food safety and IoT based food quality control, provenance traceability, improvement of contract exchanges, and transactions efficiency. As multiple untrusted parties, including small-scale farmers, food processors, logistic companies, distributors and retailers...
10 CitationsSource
#1Marianne Junger (UT: University of Twente)H-Index: 26
#2Victoria Wang (University of Portsmouth)H-Index: 20
Last. Marleen SchlomerH-Index: 1
view all 3 authors...
This study analyses 300 cases of fraudulent activities against Dutch businesses, 100 from each of the following three categories: CEO-fraud, fraudulent contract, and ghost invoice. We examine crime scripts, key characteristics of targeted businesses, and the relationship between input criminal effort and output financial benefit. Results indicate that whilst all CEO-frauds are conducted online, most of the fraudulent contracts and ghost invoices are undertaken via offline means. Both Routine Act...
4 CitationsSource
#1Jeyong Jung (UOU: University of Ulsan)H-Index: 1
#2Victoria WangH-Index: 20
Last. Yongho Kim (Dongseo University)
view all 3 authors...
Source
#1Mark ButtonH-Index: 22
#2Lisa SugiuraH-Index: 2
Last. Richard KapendH-Index: 1
view all 6 authors...
1 Citations