[go: up one dir, main page]

Zimba et al., 2022 - Google Patents

Emerging Mobile Phone-based Social Engineering Cyberattacks in the Zambian ICT Sector

Zimba et al., 2022

View PDF
Document ID
5439094828696287885
Author
Zimba A
Mukupa G
Chama V
Publication year
Publication venue
arXiv preprint arXiv:2212.13721

External Links

Snippet

The number of registered SIM cards and active mobile phone subscribers in Zambia in 2020 surpassed the population of the country. This clearly shows that mobile phones in Zambia have become part of everyday life easing not only the way people communicate but also the …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking

Similar Documents

Publication Publication Date Title
Mishra et al. Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis
Weichbroth et al. Mobile security: Threats and best practices
US11757914B1 (en) Automated responsive message to determine a security risk of a message sender
Yeboah-Boateng et al. Phishing, SMiShing & Vishing: an assessment of threats against mobile devices
Simoiu et al. " I was told to buy a software or lose my computer. I ignored it": A study of ransomware
US8666841B1 (en) Fraud detection engine and method of using the same
Bang et al. Improving information security management: An analysis of ID–password usage and a new login vulnerability measure
Jansen et al. How people help fraudsters steal their money: An analysis of 600 online banking fraud cases
Razaq et al. " We Even Borrowed Money From Our Neighbor" Understanding Mobile-based Frauds Through Victims' Experiences
Guerra et al. Assessing the relationship between lifestyle routine activities theory and online victimization using panel data
Normalini et al. Trust in internet banking in Malaysia and the moderating influence of perceived effectiveness of biometrics technology on perceived privacy and security
Pfeffer et al. Replication: Stories as informal lessons about security
US20220164477A1 (en) Detecting leakage of personal information in computing code configurations
Bellini et al. The {Digital-Safety} risks of financial technologies for survivors of intimate partner violence
Kim et al. HearMeOut: detecting voice phishing activities in Android
Alwanain How do children interact with phishing attacks?
Di Gangi et al. Risk perceptions about personal Internet-of-Things: Research directions from a multi-panel Delphi study
Coleman et al. E-banking fraud in Jamaica: A cross-sectional quantitative study
Chetalam Enhancing Security of MPesa Transactions by Use of Voice Biometrics
CN118656230A (en) Event processing method, device and electronic equipment
Zimba et al. Emerging Mobile Phone-based Social Engineering Cyberattacks in the Zambian ICT Sector
AlSalamah Security risk management in online system
Hoseini Ransomware and phishing cyberattacks: analyzing the public’s perception of these attacks in Sweden
Zimba et al. On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector
Cornelius Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge