This study aimed to evaluate the measures taken by telecommunication companies in preventing social engineering attacks in Tanzania. The study was guided by the deception theory, the researcher employed a descriptive research design and quantitative approach to conduct this study. Data was collected by using a questionnaire administered to the selected telecommunication companies in Tanzania. Furthermore, the obtained findings were as follows; most of the respondents who participated in this study are aware of social engineering and that they experienced social engineering. The study also revealed that there are common social engineering attacks experienced by the respondents such as business collaboration benefits, alleged wrong remittance...
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information ...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
Abstract: Social engineering is one of the most common attacking threats to the Mobile Money users d...
The information becomes a very precious thing which is owned by every person, organization or ...
Advances in Internet-based mobile smartphones is a panacea in deployment of mobile applications acro...
The advancements in digital communication technology have made communication between humans more acc...
The number of registered SIM cards and active mobile phone subscribers in Zambia in 2020 surpassed t...
Social engineering is a method of attack aimed at the state, organization, or individual. It focuses...
Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Social engineering is a very old method to influence people in their daily actions. The same methods...
Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonat...
In this day and age, social engineering attacks are among the most dangerous dangers. It is now prev...
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information ...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
Abstract: Social engineering is one of the most common attacking threats to the Mobile Money users d...
The information becomes a very precious thing which is owned by every person, organization or ...
Advances in Internet-based mobile smartphones is a panacea in deployment of mobile applications acro...
The advancements in digital communication technology have made communication between humans more acc...
The number of registered SIM cards and active mobile phone subscribers in Zambia in 2020 surpassed t...
Social engineering is a method of attack aimed at the state, organization, or individual. It focuses...
Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Social engineering is a very old method to influence people in their daily actions. The same methods...
Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonat...
In this day and age, social engineering attacks are among the most dangerous dangers. It is now prev...
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information ...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...