2022
DOI: 10.1080/19361610.2022.2031702
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The rise of interconnected systems and the Internet of Things (IoT) introduced new threat vectors, allowing attackers to exploit vulnerabilities in interconnected devices and networks . Social engineering became increasingly prevalent, leveraging psychological manipulation to deceive individuals or gain unauthorized access (Kilavo et al, 2023). Advanced Persistent Threats (APTs) marked another shift, involving prolonged and targeted attacks for data exfiltration or system compromise (Quintero-Bonilla & Martín del Rey, 2020).…”
Section: Evolution Of Cyber Threats and Their Impact On Traditional S...mentioning
confidence: 99%
“…The rise of interconnected systems and the Internet of Things (IoT) introduced new threat vectors, allowing attackers to exploit vulnerabilities in interconnected devices and networks . Social engineering became increasingly prevalent, leveraging psychological manipulation to deceive individuals or gain unauthorized access (Kilavo et al, 2023). Advanced Persistent Threats (APTs) marked another shift, involving prolonged and targeted attacks for data exfiltration or system compromise (Quintero-Bonilla & Martín del Rey, 2020).…”
Section: Evolution Of Cyber Threats and Their Impact On Traditional S...mentioning
confidence: 99%
“…Eliminating attacker profiles and concentrating on human targets are critical beneficiary targets. The victim's capacity to withstand the manipulation of behavior, either by recognizing and/or responding in an attack-coping way, is what determines the success of SE assaults (Kilavo et al, 2023). Investigating Cialdini's concepts of influencing current social engineering research methodologies provided ideas for probable relationships between the Five-Factor Models personality factors (the "Big 5").…”
Section: Personality Traits Frameworkmentioning
confidence: 99%