Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2018, 6(2), 64-68
DOI: 10.12691/jcsa-6-2-2
Open AccessArticle

Mitigating Social Engineering Menace in Nigerian Universities

A.A. Ojugo1, and O. Otakore1,

1Department of Mathematics/Computer Science, Federal University of Petroleum Resources Effurun, Nigeria

Pub. Date: August 03, 2018

Cite this paper:
A.A. Ojugo and O. Otakore. Mitigating Social Engineering Menace in Nigerian Universities. Journal of Computer Sciences and Applications. 2018; 6(2):64-68. doi: 10.12691/jcsa-6-2-2

Abstract

Advances in technology continues to facilitate data processing activities; and plays a critical role to serve users’ social needs. The advent of smartphones has further eased the adoption and caused a spike in the usage of these technologies as well as the deployment of Internet-based applications. Our study examines known social engineering attack techniques on users by focusing on comparison as used by intruders. Data is collected from some selected Nigerian undergraduates. Result of the conducted survey suggests that phishing method hits a higher success rate than other techniques; while other factors such as gender, also had an impact on the success rate of each technique used.

Keywords:
phishing cybersecurity fraud mitigate Nigeria university

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Ojugo, A.A., Oyemade, D.A., Allenotor, D., Longe, O.B and Anujeonye, C.N., “Comparative Stochastic Study for Credit-Card Fraud Detection Models”, African Journal of Computing & ICT, 2015, Vol 8, No. 1, Issue 2. Pp 15-24.
 
[2]  Yeboah-Boateng, E.O and Amanor, P.M., Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices, Journal of Emerging Trends in Computing and Information Sciences, 2014, Vol. 5, No. 4, pp297-307.
 
[3]  Ojugo, A.A and Eboka, A.O., “A Social Engineering Detection Model for Mobile Smartphone Clients”, African Journal of Computing & ICT, 2014, Vol 7, No. 3, Issue 1. Pp 52-64.
 
[4]  Chanvarasuth, P., “Knowledge on Phishing and Vishing: An Empirical Study on Thai Students”, International Journal of Humanities and Applied Sciences, 2013, Vol. 2, No. 3, pp 58-62, ISSN 2277-4386.
 
[5]  Pibulyarojana, K. and Jirawannakool, K., “ThaiCERT Annual Report of 2007,”: http://www.ieee.th.org/IEEEConference2008/Proceedings2008 /papers/IEEE_Full_Paper_Komain.doc_Paper_5.pdf.
 
[6]  Wang, J.R.C., Herath, T., Rao, H. R., “An Empirical Exploration of the Design Pattern of Phishing Attacks”, in: S.J. Upadhyaya, H.R. Rao (Eds.), Annals of Emerging Research in Information Assurance, Security and Privacy Services, Emerald Publishers, 2009.
 
[7]  Stamm, S., Ramzan, Z., and Jakobsson, M., “Drive-by Pharming,” Technical Report TR641, Indiana University, December 2006.
 
[8]  Kay, R., “Quick Study: Phishing, Computerworld,” 2004, http://www.computerworld.com/s/article/89096/Phishing.
 
[9]  Baker, E.M., Baker, W.H., and Tedesco, J.C., “Organizations Respond to Phishing: Exploring the Public Relations Tackle Box”, Communication Research Reports, 2007, vol. 24, no. 4, pp. 327-339. International Journal of Humanities and Applied Sciences (IJHAS) Vol. 2, No. 3, 2013 ISSN 2277- 4386.
 
[10]  Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., and Downs, J., “Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions”, In the Proceedings of CHI '10, SIGCHI Conference on Human Factors in Computing Systems, 2010, pp. 373-382.
 
[11]  Colley, A. and Maltby, J., “Impact of the Internet on our lives: Male and Female Personal Perspectives”, Computers in Human Behavior, 2008, vol. 24, no. 5, pp. 2005-2013.
 
[12]  Jagatic, T., Johnson, N.A., Jakobsson, M., and Menczer, F., “Social Phishing”, Communications of ACM, Vol. 50, No. 10, 2005, pp. 94-100.
 
[13]  Case, C.J. and King, D.L., “Phishing for Undergraduate Students”, Research in Higher Education Journal, 2006, pp. 100-106.