About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Towards new e-Infrastructure and e-Services for Developing Countries. 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings

Research Article

Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-34896-9_26,
        author={Alima Nzeket Njoya and Franklin Tchakount\^{e} and Marcellin Atemkeng and Kalum Priyanath Udagepola and Didier Bassol\^{e}},
        title={Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon},
        proceedings={Towards new e-Infrastructure and e-Services for Developing Countries. 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings},
        proceedings_a={AFRICOMM},
        year={2023},
        month={6},
        keywords={Mobile money phishing vulnerabilities taxonomies emotions interactions cybercrimes cameroon},
        doi={10.1007/978-3-031-34896-9_26}
    }
    
  • Alima Nzeket Njoya
    Franklin Tchakounté
    Marcellin Atemkeng
    Kalum Priyanath Udagepola
    Didier Bassolé
    Year: 2023
    Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon
    AFRICOMM
    Springer
    DOI: 10.1007/978-3-031-34896-9_26
Alima Nzeket Njoya1, Franklin Tchakounté1,*, Marcellin Atemkeng2, Kalum Priyanath Udagepola3, Didier Bassolé4
  • 1: Department of Mathematics and Computer Science, Faculty of Science
  • 2: Department of Mathematics, Rhodes University
  • 3: Department of Information and Computing Sciences
  • 4: Laboratory of Mathematics and Computer Science
*Contact email: f.tchakounte@cycomai.com

Abstract

Mobile Money (MM) technologies are popular in developing countries where people are unbanked, and they are exploited as means of financial transactions in the economy. Sophisticated cyber-phishing techniques successfully target MM accounts. Related countermeasures are rare and the existing ones are so technical that people without minimal knowledge cannot be helped. Making the knowledge around cybercrime facts is therefore relevant since it provides a good basis for further technical research. In this vein, this paper dissects phishing cybercrime strategies observed within the Cameroonian cyberspace. We provide identified vulnerabilities, process design of generic MM attack, taxonomies of attacks, and classification of the latter based on criteria. Findings about commonalities and dissimilarities reveal two aspects to really consider when designing solutions: emotion and interactions.

Keywords
Mobile money phishing vulnerabilities taxonomies emotions interactions cybercrimes cameroon
Published
2023-06-30
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-34896-9_26
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL