The Effects of Phishing Attacks on Mobile Phone Users in Tanzania: A Case of Kariakoo Market, Dar es Salaam

https://doi.org/10.51867/ajernet.5.4.54

Authors

  • Fatuma Mwamba College of Business Education, Dar es Salaam, Tanzania
  • Emmanuel A. Mjema College of Business Education, Dar es Salaam, Tanzania

Keywords:

Cyber Security, Information Technology, Phishing Attack, Social Engineering Attacks

Abstract

This study aimed at understanding phishing attacks targeting mobile phone users in Tanzania, focusing on the investigation of effects of these attacks on the mobile phone users. The study used technology threat avoidance theory as its theoretical framework. Respondents were selected using a purposive stratified sampling method to ensure diverse representation across various demographics and business sectors. A descriptive research design was employed and traders in Kariakoo market, Dar es Salaam were the target population. A sample size of 394 respondents was chosen and data obtained through structured questionnaires and in-depth interviews. Quantitative data were analyzed using SPSS, while qualitative data were examined with Deedose. The study revealed social, economic, and psychological effects of phishing attacks to mobile phone users in Tanzania. Socially, there was a noticeable decline in trust toward digital communications, leading to altered online behaviors and interactions. Economically, the effects included substantial financial losses and disruptions to business operations, impacting both individuals and organizations. Psychologically, the study found that victims experienced emotional distress, anxiety, and a heightened sense of vulnerability, prompting an increased awareness and caution regarding cyber security practices. The study concluded that phishing attacks posed significant social, economic, and psychological challenges for mobile phone users in Tanzania, with effects varying across different demographic groups. It also revealed that users' age, gender, education, and business sector influenced their susceptibility to phishing attacks, leading to diverse experiences and vulnerabilities within the population. The study recommends implementation of targeted awareness campaigns through popular communication channels, such as social media ads and television, to maximize reach and engagement, especially among younger users who are frequently online.

Dimensions

Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future Internet, 12(10), 168. https://doi.org/10.3390/fi12100168 DOI: https://doi.org/10.3390/fi12100168

Ali, R., & Zaharon, L. (2021). Impact of phishing attacks on mobile users: A case study in Tanzania. Journal of Cybersecurity and Privacy, 5(2), 45-60.

Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060. https://doi.org/10.3389/fcomp.2021.563060 DOI: https://doi.org/10.3389/fcomp.2021.563060

Bhavsar, V., Kadlak, A., & Sharma, S. (2018). Study on phishing attacks. International Journal of Computer Applications, 182(33), 27-29. DOI: https://doi.org/10.5120/ijca2018918286

https://doi.org/10.5120/ijca2018918286

Burita, L., Petr, M., Kamil, H., & Pavel, K. (2021). Analysis of phishing emails. AIMS Electronics and Electrical Engineering, 5, 93-116. https://doi.org/10.3934/electreng.2021006 DOI: https://doi.org/10.3934/electreng.2021006

Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44. https://doi.org/10.17705/1CAIS.04422 DOI: https://doi.org/10.17705/1CAIS.04422

Carroll, A. (2022). Psychological impacts of cyber threats: A review of recent findings. Journal of Information Security, 11(1), 89-104.

Dawadi, S., Shrestha, S., & Giri, R. A. (2021). Mixed-methods research: A discussion on its types, challenges, and criticisms. Journal of Practical Studies in Education, 2(2), 25-36. https://doi.org/10.46809/jpse.v2i2.20 DOI: https://doi.org/10.46809/jpse.v2i2.20

FBI. (2021). Internet Crime Complaint Center (IC3) 2020 annual report. Federal Bureau of Investigation Retrieved from https://www.ic3.gov

Frauenstein, C. (2020). Economic impacts of phishing in the United States: A comprehensive analysis. Financial Cybersecurity Review, 12(4), 65-78.

Kayumbe, E., & Gilliard, E. (2024). Cybersecurity in Tanzania: Opportunities and challenges. International Journal for Multidisciplinary Research, 6(1), 23-29. https://doi.org/10.36948/ijfmr.2024.v06i01.14058 DOI: https://doi.org/10.36948/ijfmr.2024.v06i01.14058

Kitime, E. (2018). A framework of cyber security risks on mobile money users in Tanzania: A case study of Dodoma City (Master's Dissertation, The University of Dodoma, Dodoma).

Liang, H., & Xue, Y. (2010). Avoiding technology threats: Insights from technology threat avoidance theory. Journal of Information Technology Management, 21(3), 23-40.

Lyimo, B., & Kamugisha, A. (2022). The analysis of internet security awareness of employees in Tanzania. Olva Academy - School of Researchers, 4, 96-102.

Mahamood, A., Abduljalil, R., Yaakob, T., Ali, M., Erpi, M., & Habeebullah, A. (2023). Analysis of the types and impacts of phishing attacks on internet users. International Journal of Cybersecurity, 9, 17-40.

Mishra, S., & Soni, S. (2021). Mobile phone security and phishing threats: A comprehensive review. Computers & Security, 102, 102118.

Mtakati, B., & Sengati, F. (2021). Cyber security posture of higher learning institutions in Tanzania. The Journal of Informatics, 1(1), 45-49. DOI: https://doi.org/10.59645/tji.v1i1.1

https://doi.org/10.59645/tji.v1i1.1

NCSC. (2021). Annual Cybersecurity Report. National Cyber Security Centre.

Nyasvisvo, M. (2023). Global trends in phishing attacks: An overview. International Journal of Cybersecurity Trends, 7(1), 10-20.

Pallangyo, H. (2020). Cybersecurity challenges and emerging trends in mobile money transaction services. Tanzania Journal of Engineering and Technology, 41(4), 10-14. https://doi.org/10.52339/tjet.v41i2.792

Tejada, J. J., & Punzalan, J. R. B. (2012). On the misuse of Slovin's formula. The Philippine Statistician, 61(1), 129-136.

Weijer, F. (2024). The Wonga attack: Analyzing the 2019 phishing breach. UK Cybersecurity Journal, 14(1), 30-40.

Published

2024-11-01

How to Cite

Mwamba, F., & Mjema, E. A. (2024). The Effects of Phishing Attacks on Mobile Phone Users in Tanzania: A Case of Kariakoo Market, Dar es Salaam. African Journal of Empirical Research, 5(4), 665–674. https://doi.org/10.51867/ajernet.5.4.54