Zimba et al., 2022 - Google Patents
Emerging Mobile Phone-based Social Engineering Cyberattacks in the Zambian ICT SectorZimba et al., 2022
View PDF- Document ID
- 5439094828696287885
- Author
- Zimba A
- Mukupa G
- Chama V
- Publication year
- Publication venue
- arXiv preprint arXiv:2212.13721
External Links
Snippet
The number of registered SIM cards and active mobile phone subscribers in Zambia in 2020 surpassed the population of the country. This clearly shows that mobile phones in Zambia have become part of everyday life easing not only the way people communicate but also the …
- 238000000034 method 0 abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mishra et al. | Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis | |
Weichbroth et al. | Mobile security: Threats and best practices | |
US11757914B1 (en) | Automated responsive message to determine a security risk of a message sender | |
Yeboah-Boateng et al. | Phishing, SMiShing & Vishing: an assessment of threats against mobile devices | |
Simoiu et al. | " I was told to buy a software or lose my computer. I ignored it": A study of ransomware | |
US8666841B1 (en) | Fraud detection engine and method of using the same | |
Bang et al. | Improving information security management: An analysis of ID–password usage and a new login vulnerability measure | |
Jansen et al. | How people help fraudsters steal their money: An analysis of 600 online banking fraud cases | |
Razaq et al. | " We Even Borrowed Money From Our Neighbor" Understanding Mobile-based Frauds Through Victims' Experiences | |
Guerra et al. | Assessing the relationship between lifestyle routine activities theory and online victimization using panel data | |
Normalini et al. | Trust in internet banking in Malaysia and the moderating influence of perceived effectiveness of biometrics technology on perceived privacy and security | |
Pfeffer et al. | Replication: Stories as informal lessons about security | |
US20220164477A1 (en) | Detecting leakage of personal information in computing code configurations | |
Bellini et al. | The {Digital-Safety} risks of financial technologies for survivors of intimate partner violence | |
Kim et al. | HearMeOut: detecting voice phishing activities in Android | |
Alwanain | How do children interact with phishing attacks? | |
Di Gangi et al. | Risk perceptions about personal Internet-of-Things: Research directions from a multi-panel Delphi study | |
Coleman et al. | E-banking fraud in Jamaica: A cross-sectional quantitative study | |
Chetalam | Enhancing Security of MPesa Transactions by Use of Voice Biometrics | |
CN118656230A (en) | Event processing method, device and electronic equipment | |
Zimba et al. | Emerging Mobile Phone-based Social Engineering Cyberattacks in the Zambian ICT Sector | |
AlSalamah | Security risk management in online system | |
Hoseini | Ransomware and phishing cyberattacks: analyzing the public’s perception of these attacks in Sweden | |
Zimba et al. | On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector | |
Cornelius | Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge |