- Alima Nzeket Njoya ORCID:orcid.org/0000-0002-7818-439418,19,
- Franklin Tchakounté ORCID:orcid.org/0000-0003-0723-264018,19,20,
- Marcellin Atemkeng ORCID:orcid.org/0000-0002-9020-388520,
- Kalum Priyanath Udagepola ORCID:orcid.org/0000-0001-5168-711121 &
- …
- Didier Bassolé ORCID:orcid.org/0000-0002-0629-588822
Part of the book series:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ((LNICST,volume 499))
Included in the following conference series:
386Accesses
Abstract
Mobile Money (MM) technologies are popular in developing countries where people are unbanked, and they are exploited as means of financial transactions in the economy. Sophisticated cyber-phishing techniques successfully target MM accounts. Related countermeasures are rare and the existing ones are so technical that people without minimal knowledge cannot be helped. Making the knowledge around cybercrime facts is therefore relevant since it provides a good basis for further technical research. In this vein, this paper dissects phishing cybercrime strategies observed within the Cameroonian cyberspace. We provide identified vulnerabilities, process design of generic MM attack, taxonomies of attacks, and classification of the latter based on criteria. Findings about commonalities and dissimilarities reveal two aspects to really consider when designing solutions: emotion and interactions.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 11439
- Price includes VAT (Japan)
- Softcover Book
- JPY 14299
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aker, J.: Using mobile money to help the poor in developing countries. The Fletcher School, Tufts University.https://econofact.org/using-mobile-money-to-help-the-poor-in-developing-countries. Accessed 01 Aug 2022
Banque mondiale, Rapport de la Banque mondiale : les transactions électroniques sont d’une importance vitale pour la croissance économique.https://www.banquemond-iale.org/fr/news/press-release/2014/08/28/world-bank-report-digital-payments-economic-growth. Accessed 01 Aug 2022
Agenceecofin, l’Afrique Subsaharienne et le mobile money.https://www.agenceeco-fin.com/monetique/0804-75539-l-afrique-subsaharienne-a-genere-64-15-des-transactions-mondiales-par-mobile-money-en-2019. Accessed 01 Aug 2022
Finmark. FinScope Consumer Survey Highlights Cameroon 2017. Finmark Trust: Johannesburg, South Africa (2017).https://finmark.org.za/system/docu-ments/files/000/000/220/original/Cameroon-pocket-guide_English.pdf?1601984244. Accessed 01 Aug 2022
Andzongo, S.: Cameroon: MobileMoney Transactions Surged to FCFA3500bn in 2017. Investiraucameroun.com.https://www.businessincameroon.com/finance/3108-8300-came-roon-mobile-money-transactions-surged-to-cfa3-500bn-in-2017. Accessed 01 Aug 2022
Tengeh, R.K., Gahapa Talom, F.S.: Mobile money as a sustainable alternative for SMEs in less developed financial markets. J. Open Innov. Technol. Mark. Complex6, 163 (2020).https://doi.org/10.3390/joitmc6040163
Amponsah, E.O.: The advantages and disadvantages of mobile money on the profitability of the ghanaian banking industry. Texila Int. J. Manag.4, 1–8 (2018)
Must, B., Ludewig, K.: Mobile money: cell phone banking in developing countries. Policy Matters J.7, 27–33 (2010)
Jai, A.K., Gupta, B.B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterp. Inf. Syst.16(4), 527–565 (2022)
Wang, Z., Zhu, H., Sun, L.: Social engineering in cybersecurity: effect mechanisms, Human vulnerabilities and attack methods. IEEE Access9, 11895–11910 (2021)
Bangda, B.: La cybercriminalité fait perdre 12,2 milliards au Cameroun en 2021. EcoMatin.https://ecomatin.net/la-cybercriminalite-fait-perdre-122-milliards-s-au-cameroun-en-2021/. Accessed 01 Aug 2022
Gandotra, E., Gupta, D.: An efficient approach for phishing detection using machine learning. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore.https://doi.org/10.1007/978-981-15-8711-5_12
Do, N.Q., Selamat, A., Krejcar, O., Herrera-Viedma, E. and Fujita, H.: Deep learning for phishing detection: taxonomy, current challenges and future directions. IEEE Access 36429–36463 (2022)
Catal, C., Giray, G., Tekinerdogan, B., Kumar, S., Shukla, S.: Applications of deep learning for phishing detection: a systematic literature review. Knowl. Inf. Syst.64, 1457–1500 (2022)
Quang, D.N., Selamat, A., Krejcar, O.: Recent research on phishing detection through machine learning algorithm. In: Fujita, H., Selamat, A., Lin, J.-W., Ali, M. (eds.) IEA/AIE 2021. LNCS (LNAI), vol. 12798, pp. 495–508. Springer, Cham (2021).https://doi.org/10.1007/978-3-030-79457-6_42
Yu, T., Chen, X., Xu, Z., Xu, J.: MP-GCN: a phishing nodes detection approach via graph convolution network for ethereum. Appl. Sci.12, 7294 (2022)
Chen, W., Guo, X., Chen, Z., Zheng, Z., Lu, Y.: Phishing scam detection on ethereum: towards financial security for blockchain ecosystem. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence Special Track on AI in FinTech, pp. 4506–4512 (2020)
Panga, R.C.T., Marwa, J., Ndibwile, J.D.: A game or notes? The use of a customized mobile game to improve teenagers’ phishing knowledge. Case Tanzania. J. Cybersecur. Priv.2, 466–489 (2022)
Kävrestad, J., Hagberg, A., Nohlberg, M., Rambusch, J., Roos, R., Furnell, S.: Evaluation of contextual and game-based training for phishing detection. Future Internet14, 104 (2022)
Ondrus, J., Pigneur Y.: An Assessment of NFC for future mobile payment systems. In: Proceeding of the International Conference on the Management of Mobile Business (2007)
Mbiti, I.M., Weil, D.N.: Mobile banking: the impact of M-Pesa in Kenya. NBER Working Paper No. w17129 (2011)
Téllez, J., Zeadally, S.: Mobile payment systems secure network architectures and protocols. Computer Communications and Networks, Springer (2017)
Bahri-Domon, Y.: Mobile money ready for take-off in cameroon, Mediamania.https://www.businessincameroon.com/pdf/BC28.pdf. Accessed 01 Aug 2022.
Mbodiam, B.R.: In Cameroon, MTN and orange wage a fierce commercial war on the mobile money market.https://www.businessincameroon.com/telecom/0202-6860-in-came-roon-mtn-and-orange-wage-a-fierce-commercial-war-on-the-mobile-money-market. Accessed 01 Aug 2022
BRM: Cameroon: a decree to limit numbers of SIM per subscriber and prohibit sale of SIM cards on streets.https://www.businessincameroon.com/telecom/0110-5670-cameroon-a-de-cree-to-limit-numbers-of-sim-per-subscriber-and-prohibit-sale-of-sim-cards-on-streets. Accessed 01 Aug 2022
Orange, Transfert d'argent.https://www.orange.cm/fr/om-gestion-de-compte/transfert-d-argent.html. Accessed 01 Aug 2022
BRM: Mobile telephone subscribers’ identification: telecom regulator ART admonishes cameroonian operators.https://www.businessincameroon.com/public-management/1204-11454-mobile-telephone-subscribers-identification-telecom-regulator-art-admonishes-cameroonian-operators. Accessed 01 Aug 2022
Atabong, A.B., Cameroon: SIM card shutdown piles on pressure for telcos.https://itweb.africa/content/lLn14Mmj9RKqJ6Aa. Accessed 01 Aug 2022
Johnson-laird, P.N., Oatley, K.: Basic emotions, rationality, and folk theory. Cogn. Emot.6(3–4), 201–223 (1992)
Bosamia, M.P.: MobileWallet payments recent potential threats and vulnerabilities with its possible security measures. In: Proceedings of the 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), Changa, India, 1–2 pp. 1–7 (2017)
Mtaho, A.B: Improving mobile money security with two-factor authentication. Int. J. Comput. Appl.109, 9–15 (2015)
Bosamia, M.P.: MobileWallet payments recent potential threats and vulnerabilities with its possible security measures. In Proceedings of the 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), Changa, India, vol. 1–2; pp. 1–7 (2017)
Saxena, S., Vyas, S., Kumar, B.S., Gupta, S.: Survey on online electronic payments security. In: Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, pp. 746–751 (2019)
Maseno, E.M., Ogao, P., Matende, S.: Vishing attacks on mobile platform in Nairobi county kEnya. Int. J. Adv. Res. Comput. Sci. Technol.5, 73–77 (2017)
Akomea-Frimpong, I., Andoh, C., Akomea-Frimpong, A., Dwomoh-Okudzeto, Y. Control of fraud on mobile money services in Ghana: an exploratory study. J. Money Laund. Control22, 300–317 (2018)
Gilman, L., Joyce, M.: Managing the risk of fraud in mobile money (2012).http://www.gsma.com/mmu. Accessed 01 Aug 2022
Lonie, S., Fraud risk management for mobile money: an overview (2017).https://www.chyp.com/wp-content/uploads/2018/06/Fraud-Risk-Management-for-MM-31.07.2017.pdf. Accessed 01 Aug 2022
Buku, M., Mazer, R.: Fraud in mobile financial services: protecting consumers, providers, and the system.https://www.cgap.org/publications/fraud-mobile-%EF%AC%81nancial-services. Accessed 01 Aug 2022
ITU, Security testing for USSD and STK based digital financial services applications.https://figi.itu.int/wp-content/uploads/2021/04/Security-testing-for-USSD-and-STK-based-Digital-Financial-Services-applications-1.pdf. Accessed 01 Aug 2022
Author information
Authors and Affiliations
Department of Mathematics and Computer Science, Faculty of Science, University of Ngaoundere, Ngaoundere, Cameroon
Alima Nzeket Njoya & Franklin Tchakounté
Cybersecurity With Computational and Artificial Intelligence Group (CyComAI), Ngaoundere, Cameroon
Alima Nzeket Njoya & Franklin Tchakounté
Department of Mathematics, Rhodes University, Grahamstown, 6140, South Africa
Franklin Tchakounté & Marcellin Atemkeng
Department of Information and Computing Sciences, Scientific Research Development Institute of Technology, Loganlea, Australia
Kalum Priyanath Udagepola
Laboratory of Mathematics and Computer Science, University of Joseph Ki-Zerbo, Ouagadougou, Burkina Faso
Didier Bassolé
- Alima Nzeket Njoya
You can also search for this author inPubMed Google Scholar
- Franklin Tchakounté
You can also search for this author inPubMed Google Scholar
- Marcellin Atemkeng
You can also search for this author inPubMed Google Scholar
- Kalum Priyanath Udagepola
You can also search for this author inPubMed Google Scholar
- Didier Bassolé
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toFranklin Tchakounté.
Editor information
Editors and Affiliations
Taif University, Ta'if, Saudi Arabia
Rashid A. Saeed
State University of Zanzibar, Zanzibar, Tanzania
Abubakar D. Bakari
State University of Zanzibar, Zanzibar, Tanzania
Yahya Hamad Sheikh
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Nzeket Njoya, A., Tchakounté, F., Atemkeng, M., Udagepola, K.P., Bassolé, D. (2023). Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon. In: Saeed, R.A., Bakari, A.D., Sheikh, Y.H. (eds) Towards new e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 499. Springer, Cham. https://doi.org/10.1007/978-3-031-34896-9_26
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-031-34895-2
Online ISBN:978-3-031-34896-9
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative