<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>“Were We Ready in the First Place?”: An Analysis of Cashless Policy Implementation in Nigeria</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oluwafemi Osho</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Temidayo H.Ajisola</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>CCS Concepts</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>7</fpage>
      <lpage>9</lpage>
      <abstract>
        <p>On 1st January, 2012, Nigeria commenced the implementation of cashless policy, with the kick-off in Lagos State. By the end of that year it was evident the implementation could not be extended to other states of the federation, as earlier scheduled. This raised a crucial question: was Nigeria prepared in the first place, in terms of availability of needed infrastructures, to commence implementation of the cashless economy? This study seeks to answer this question. In addition, it identifies potential consequences of implementation on the security of the nation's cyberspace. Both primary and secondary data were collected. Our findings reveal that when the implementation of the cashless policy kicked-off, awareness, required infrastructures, and the security of the country's cyberspace were inadequate. We suggest that the consequences of implementing cashless policy in Nigeria will have various security effects on the Nigerian cyberspace if the level of awareness and existing infrastructures are not improved. • Information systems ➝Information systems application ➝Web applications ➝Electronic commerce ➝Secured online transactions</p>
      </abstract>
      <kwd-group>
        <kwd>Cashless society</kwd>
        <kwd>cashless implementation</kwd>
        <kwd>subscribe</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>+2347063194947
Agada D. Onoja</p>
    </sec>
    <sec id="sec-2">
      <title>1. INTRODUCTION</title>
      <p>
        A cashless economy is one in which a given society is regulated to
have the least needed amount of cash in circulation, the rest of
which is transacted electronically through the use of direct debit,
mobile payments, electronic fund transfer, internet banking,
multifunctional Automated Teller Machines (ATMs), point of sale
terminals (POSs), amongst others [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Simply put, a cashless
economy entails a pervasive application of various computer
technologies in the financial system [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The system gives way for
goods and services to be purchased by individuals without
anything tangible being exchanged, using what is known as
electronic cash. The term money still exists, but it is more in an
electronic processes form than previously.
      </p>
      <p>
        An effective and modernized payment system has been found to
be positively correlated with the development of the economy [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], being a tool for more effective, convenient and faster methods
of buying goods and rendering of services. This explains why
several governments and their financial institutions have been
taking steady steps towards achieving a cashless society.
The benefits of adoption of cashless economy include reduction in
corruption and the cost of services by banks (such as cost of
credit), increased operational efficiency, improved financial
inclusion, via providing alternatives that aid easy transactions and
greater reach, and improved efficiency of the monetary policy in
managing the rate of inflation and driving the growth of the
economy [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref16 ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Other benefits include increased
convenience in transaction; promotion of e-commerce; reduction
in circulation of fake currency, theft of cash from individuals,
money laundering, and stockpiling of cash in houses by corrupt
government officials [
        <xref ref-type="bibr" rid="ref16 ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        However, implementing cashless policy poses some risks. Since
personal information and data will now reside online, it becomes
increasingly difficult to curb internet hackers and thieves. Other
demerits are potential increase in cyber crimes, increased
sophistication in operation of hackers and scammers, increase in
theft of ATM, credit and debit cards, to mention but few [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ],
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This underscores why a secure national cyberspace is
fundamental to the success of cashless policy implementation.
Activities of hackers and other cyber criminals have always posed
different threats to the cyberspace. Activities such as phishing
attack, website spoofing by masquerading, creating different
entity similar to the operated entity, identity theft, virus attacks,
key loggers and cracking encryption channels that are guarding a
system are capable of stifling the capacity of the cyberspace to
support effective implementation of the cashless policy. As a
result of these, the need for necessary facilities to ensure
effectiveness, efficiency, security, privacy, integrity,
confidentiality, convenience, acceptability, mobility, for
successful actualization of cashless economy cannot be
overemphasized.
      </p>
      <p>
        In line with the nation’s vision 20:20, which is being among the
first 20 economies by year 2020 [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], to enable the development
and modernization of the payment system, to attain reduction in
cost of banking services, improve financial inclusion and
effectiveness of monetary policy, the cashless policy was
introduced in Nigeria, with a test run in Lagos in 1st January, 2012
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. On 6th January 2013, the Central bank of Nigeria (CBN)
suspended the spread of the cashless policy from Lagos state to
other states. Some of the contributing factors included insufficient
POS, ATM, and low level of awareness, connectivity, and
bandwidth penetration. Other challenges included low ICT
penetration and other logistics issues [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The suspension raised
some pertinent issues: was Nigeria prepared in the first place to
commence implementation of the cashless economy? And having
commenced, what are the potential consequences on the security
of the nation’s cyberspace.
      </p>
      <p>This study seeks to assess the level of readiness of Nigeria, in
respect of provisioning of required infrastructures, when the
implementation of the policy commenced in 2012, and identify
possible implications of implementation considering the current
state of her cyberspace. This study is significant in many ways.
First, it would expose the state of Nigeria’s cyberspace at the
commencement of implementing cashless policy. It also assesses
the current capacity of the cyberspace to effectively support the
policy. These would provide decision makers, including the
government, relevant agencies, IT managers, policy makers, and
other stakeholders, responsible for the Nigerian cashless policy
implementation, better insight into the security implications,
which would enable them to implement necessary strategies
towards more effective implementation.</p>
    </sec>
    <sec id="sec-3">
      <title>2. LITERATURE REVIEW</title>
    </sec>
    <sec id="sec-4">
      <title>2.1 Requirements for Effective</title>
    </sec>
    <sec id="sec-5">
      <title>Implementation of Cashless Policy</title>
      <p>Effective implementation of cashes policy is predicated on the
availability of some requirements. These are divided into
hardware, software, legal, personnel, and logistic requirements.</p>
      <sec id="sec-5-1">
        <title>2.1.1 Hardware Requirement</title>
        <p>
          Some of the hardware requirements include computer systems;
smart (debit and credit) cards, used as alternative to cash for
making purchases, for making withdrawals or deposits at ATMs,
updating account information and for other transactions made in
the banks. Others are smart phones, which provide services such
as multimedia message service (MMS), email, short-range
wireless communications (infrared and bluetooth), text messaging,
internet access, business applications, supporting online
transactions [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]; and Point-of-Sale (POS) terminals [
          <xref ref-type="bibr" rid="ref16 ref6">6</xref>
          ],
an equivalent of an electronic cash register, which aids
transactions through the use of smart chip cards, credit cards,
debit cards, and other electronically-dependent transactions in a
traditional retail environment.
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>2.1.2 Software Requirement</title>
        <p>
          These are the software components used to drive and secure the
different hardware. They include phishing detection tools, to
detect and block suspicious sites. For example, when a customer
transacts on a fake website, these tools can be used to detect the
Domain Name System (DNS) roots of the sites. Anti-phishing
software can be installed on the customer’s computer, so as to
detect addresses that are not on the database during a transaction.
Another requirement is antivirus software. They are used in
detecting, preventing and removing malware such as virus,
worms, hijacker, key loggers, root kits, Trojan horses, spyware,
and backdoors. Antivirus software enhances computer security,
protecting it from social engineering attacks. Real time protection
and access scanning are provided by most antivirus, anti-spyware
and anti-malware software. It prevents attackers from having
access to banking information [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. A third requirement in this
category is firewall. This filters information coming into a
computer system or private network through the internet,
preventing flagged packet of information from going through.
Firewalls are used in controlling traffic flowing in and out of the
network. They can be used to prevent direct connection between
bank-end systems and to address security concerns of external
deceives such as ATMs and PCs that are in connection to the
bank’s network. They protect computers from remote login,
application backdoors, Simple Mail Transfer Protocol (SMTP)
session hijacking and macros. One other important software
requirement is intrusion detection system (IDS). This is a software
application or hardware device that monitors network systems for
policy violations and malicious activities. Identifying possible
incidents, logging information and reporting attempts are
primarily the functions of IDS. The IDS can be either host-based
or network-based [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
      </sec>
      <sec id="sec-5-3">
        <title>2.1.3 Legal Requirement</title>
        <p>
          The legal requirement consists of relevant laws, standards,
policies, and regulations to clearly define the roles and regulate
the activities of the different stakeholders in the system. An
important component is the development of relevant policies on
cyber security. These based on national leadership, sharing of
responsibilities, partnership with all concerned agencies, active
international engagement, risk management control. They enhance
both collective and individual security. According to [
          <xref ref-type="bibr" rid="ref17">16</xref>
          ], the
objectives of these policies are to the effect that all citizens should
be adequately aware of cyber risks and how their computers can
be secure, thereby protecting their finances, online privacy and
identities; to ensure smooth operations and privacy of customers;
and for the government to ensure security of the country’s
information and communications technologies and make them
resistant to attack from malicious hackers.
        </p>
        <p>
          Also pertinent for effective implementation of cashless policy are
cyber laws. The availability, confidentiality, and integrity of
information being stored, processed, and communicated
electronically is ultimate. Therefore, relative measures have to be
taken to this regard. As there might be an ill effect from an
increase in cybercrime on the economy, country and society at
large, there is need for activities of law enforcement, regulatory
detection, and strong legal frameworks to enhance the operations
of a cashless economy. Strong legislative Acts are required for
comprehensive, effective and unified legal framework catering for
the prevention, detection, banning, prosecution, and punishment
for cyber crimes in the nation [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>
          A third component is the monetary policy. Cashless policy
enhances the payment system of a country. It regulates the cash
collection and lodgment in the country and stipulates that there
exists a monitor and feedback mechanism that allows the full
adoption and smooth implementation of cashless economy in a
country. A monetary policy ensures that there is a limit to cash
withdrawal and lodgment fees for corporate and individual
customers [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], [
          <xref ref-type="bibr" rid="ref18">17</xref>
          ].
        </p>
      </sec>
      <sec id="sec-5-4">
        <title>2.1.4 Personnel Requirement</title>
        <p>
          These comprise Payment Terminal Services Provider (PSTP),
Computer Emergency Response Team (CERT), Communications
and Media Authority (CMA), and the Attorney-General’s
Department (AGD). PTSPs, amongst other things, are engaged in
proper maintenance/support of infrastructure to ensure
effectiveness of POS operations. Their services include all aspects
relating to both terminal management and support, and not limited
to purchase and replacement of spare parts, provision of training,
repairs, connectivity, and development of value-added services
[
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. The CERT facilitates information sharing and improves
response co-ordination to cyber threats between citizens and the
Government. They help in identifying and analyzing high level
cyber-attacks as well as other cyber events, aiding response across
the private sector systems and government infrastructure. They
ensure that access to information on cyber security threats are
available to the community, including vulnerabilities in their
systems, how information can be better protected and the potential
consequences of an incidence in the information technology
environment [
          <xref ref-type="bibr" rid="ref17">16</xref>
          ].
        </p>
        <p>
          The Communications and Media Authority (CMA) is responsible
for broadcasting regulations on the internet, radio and
telecommunications. It contributes to the objectives of cyber
security by gathering evidence, assisting in preventing identity
theft, computer fraud and regulatory obligations in regard to
criminal misuse and illegal act, and makes sure standards are met
by the telecommunications providers and Internet Service
Providers (ISPs). The last component of this requirement, the
Attorney-General’s Department (AGD), consists of security
policy protection departments, criminal law and the law
enforcement that collectively provide harmonization of cyber
security policies, which includes international collaboration and
crisis management as well as protection of security policies for
government agencies. They oversee such government business
partnerships as CERT, and provide guidance on cyber security to
owners and critical infrastructure operators [
          <xref ref-type="bibr" rid="ref17">16</xref>
          ].
        </p>
      </sec>
      <sec id="sec-5-5">
        <title>2.1.5 Logistics Requirement</title>
        <p>
          The logistic requirement includes standards on application and
system software; standards for computer network and internet;
and high speed/broadband internet technologies, which describes
a broad range of technologies that provides higher rate of data
access to the internet, supporting faster World Wide Web
(WWW) browsing, file download, virtual private networks and
remote system administration [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Also, there is absolute need
for international engagement. The global challenges of cyber
security require multilateral or bilateral efforts with key ally
nations to strengthen cyberspace. Increase in multilateral forums
with relevant international bodies is necessary to enhance
international efforts in development of global standards, legal
system capacity to combat cybercrime, promotion of situational
awareness, strategic warning and even response [
          <xref ref-type="bibr" rid="ref17">16</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>2.2 Implementing Cashless Policy in Nigeria</title>
      <p>
        Prior to the commencement of the implementation of the cashless
policy in Nigeria, the banking sector was rife with investment
environments characterized by high risk, corruption, payment
fraud, poor credit administration, lack of credit facility, and
system unreliability [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Having identified the need to reduce
significantly the industry’s cost to serve, the CBN, in alliance with
the Banker’s committee, initiated a shared service program with
five key areas in focus: cash management, payment systems
transformation, IT infrastructure and services, IT standards, and
back office operations. Transformation of the payments system
became the key driver. Out of the payments transformation
initiative was borne the cashless policy [
        <xref ref-type="bibr" rid="ref19">18</xref>
        ]. The policy was
aimed, amongst many, to reduce cost of maintenance of
cashbased economy by 90% [
        <xref ref-type="bibr" rid="ref20">19</xref>
        ].
      </p>
      <p>
        Part of the efforts by the CBN towards modernizing the payments
system was initiating the National Payments System (NPS) in
2005 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], automating the cheque clearing system through the
introduction of an MICR-based technology and the first
automated clearing process in Lagos [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Other efforts include
establishment of frameworks and guidelines on payments system
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], licensing of Payments Terminal Service Providers (PTSPs)
and 14 mobile payment schemes, campaigns and public awareness
[
        <xref ref-type="bibr" rid="ref19">18</xref>
        ]. Banks and non-bank stakeholders also embarked on
measures to promote the cashless initiative. Within the space of
seven months, the number of PoS terminals increased from 6,019
to 89,700 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]; number of registered merchants reached 151,717 by
July 2012 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Major initiatives in the implementation of the
cashless policy are presented in Figure 1 [
        <xref ref-type="bibr" rid="ref21">20</xref>
        ].
      </p>
      <p>
        After wide consultations with relevant stakeholders, the
implementation of the policy, termed ‘Cashless Lagos,’ kicked off
in Lagos on 1st January, 2012 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref19">18</xref>
        ] and was expected to
commence officially in the rest of the country by January, 2013
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Seven months into the implementation of the policy in
Lagos, many challenges had surfaced: insufficient and unevenly
spread PoS terminals, many instances of deployed but
yet-to-beconfigured PoS terminals, frequent network downtime which were
affecting completion of transactions, Short Cash conversion cycle,
lack of clarity on allocation of handling charges, transparency in
the manner settlements were to be carried out for PoS
transactions, clearly-defined data and network security standards
across electronic payment channels, and availability and stability
of mobile money platforms [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Nweke [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] recommended some
pre-conditions that should be met before the proposed nationwide
take-off in 2013. These, amongst others, included provision of
necessary payment infrastructure: power supply, mobile telecoms
infrastructure, electronic clearing technology; relevant legal and
regulatory framework, and a law enforcement agency equipped to
adequately tackle cyber-crime and internet fraud. However,
overwhelmed by the challenges during the ‘Cashless Lagos’
exercise, the earlier plan to extend the cashless policy to the rest
of the country was readjusted to commence in the Federal Capital
Territory (Abuja), Abia, Anambra, Kano, Ogun, and River States
effective July 1, 2013.
      </p>
      <p>
        A critical appraisal reveals that the introduction of the cashless
policy has recorded little success [
        <xref ref-type="bibr" rid="ref22">21</xref>
        ]. In spite of measures so far
deployed, e-payment fraud has continued to pervade the country’s
banking-sphere. In six months, up to N20 billion was lost to
fraudsters. This was despite report by CBN on reduction in ATM
card fraud upon the introduction of chip-and-PIN cards [
        <xref ref-type="bibr" rid="ref22">21</xref>
        ], and
institution of ATM Anti-Fraud Committee, which was upscaled to
E-Payment Fraud Forum [
        <xref ref-type="bibr" rid="ref19">18</xref>
        ]. There were instances where
hackers were found to fix tools on ATMs that harvest passwords
of customers who come to transact using the machines. In 2013
alone, according to CBN, N40 billion was lost to electronic frauds
[
        <xref ref-type="bibr" rid="ref23">22</xref>
        ].
      </p>
    </sec>
    <sec id="sec-7">
      <title>3. MATERIALS AND METHODS</title>
      <p>To achieve our objectives of assessing the level of readiness of
Nigeria, in respect of provisioning of required infrastructures,
when the implementation of the policy was commenced in 2012,
and identifying possible implications of implementation
considering the current state of her cyberspace, the study used
both primary and secondary data. We believe effective
implementation is anchored on adequate awareness and
availability of necessary infrastructures. Consequently, we
collected self-report data to collate views on the state of these
factors. Also, relevant documents are investigated to ascertain the
available quantity and/or quality, as the case may be, of selected
basic requirements, during the period when the implementation of
the cashless policy was commenced in Nigeria. The variables are
then compared with international standards and/or world average.
The indices are used to determine the adequacy or otherwise of
the requirements. Specifically, in respect of infrastructures, the
study focused on the e-index of the country; number of available
ATMs, POSs; availability of broadband technology, enabling
laws, CERT; and the authentication methods commonly in use.</p>
    </sec>
    <sec id="sec-8">
      <title>3.1 Participants</title>
      <p>To collate primary data, a survey was conducted in 2013 in Lagos,
Ekiti, and Niger States. The choice of Lagos was natural being the
state where the cashless policy implementation was kicked off.
The research instrument used was questionnaire. A total of 250
questionnaires were distributed. Out of these, 219 were returned.
37 were found to be invalid. Consequently, 182 were used for
analysis. There were slightly more male respondents, 51.6% v.
48.4%. Most were within the ages of 21 – 30 (46.7%), students
(56.0%), and aware of the term cashless society and government’s
plan to implement it (87.9%). The demographic compositions of
the respondents are presented in Table 1.</p>
    </sec>
    <sec id="sec-9">
      <title>3.2 Measures</title>
      <p>The questionnaire used for the survey had three sections. The first
section sought information on respondent demographics. The
second section bordered on perception about government’s effort
in terms of awareness, the country’s readiness in respect of
availability of necessary facilities, and the security of the nation’s
cyberspace to support implementation of the cashless policy. In
the last section, respondents were asked if they were willing to
subscribe to the cashless policy, considering the state of
infrastructures. Those who expressed unwillingness were then
requested to select reason(s). Respondents were also asked to
indicate potential consequences of implementation, considering
the state of infrastructures. Lastly, they were asked if they would
be willing to subscribe if necessary requirements are put in place.</p>
    </sec>
    <sec id="sec-10">
      <title>4. FINDINGS</title>
    </sec>
    <sec id="sec-11">
      <title>4.1 Readiness to Implement Cashless Policy</title>
      <p>As can be seen from Table 2, most respondents believed the
government did not do enough, in terms of creating awareness of
the cashless policy (84.6%), and necessary infrastructures were
not adequately put in place (89.6%) before the implementation of
the policy was commenced in 2012. Equally, most felt the
country’s cyberspace was not secure enough to support the
kickoff of the implementation (87.9%).</p>
      <p>Respondents who were unemployed, compared with those who
were students and employed, were most critical of the government
in their failure to adequately create awareness of the policy.
Specifically, 94.7% of unemployed, 90.2% of students, and 72.1%
of employed respondents reported government effort was
insufficient. The study was found to be significant
( ).</p>
      <p>
        In terms of adequacy of infrastructures provided for the kick-off
of the cashless policy, more of the females, compared to the male,
96.6% v. 83.0%, felt the available infrastructures were inadequate
( ). In the same vein, more females,
97.7% v. 78.7%, rated the country’s cyberspace not secure enough
to support implementation of the policy
( ).
4.1.1 E-Index
The ICT Development Index (IDI) is a composite index which is
used to combine 11 indicators into one benchmark measure
(presented on a scale from 0 to 10) that compares and monitors
the developments in information and communication technology
(ICT) across countries. A country with Low level of ICT
development, indicated by an IDI value below or equal to 2.33, is
not making enough effort into catching up in terms of ICT
developmental progress. This group of countries, referred to as
least connected countries (LCCs), has very low levels of ICT
uptake and use. Between 2011 and 2012, these countries recorded
the smallest increase in the average IDI value. In majority of
LCCs, internet access are very limited, low-speed, very expensive
and used by small percentage of the population. LCCs also tend to
have very low fixed and mobile broadband penetration levels, and
most only launched and commercialized 3G mobile-broadband
networks relatively. The LCCs include many of the world’s least
developed countries (LDCs), with majority in Africa. They also
include some highly populated countries that are not LDCs, such
as Nigeria, India and Pakistan. Considering the ICT Development
Index (IDI) for 2011 and 2012, Nigeria was ranked 123 in 2011
and 122 in 2012 out of 157 countries in the world [
        <xref ref-type="bibr" rid="ref24">23</xref>
        ].
      </p>
      <sec id="sec-11-1">
        <title>4.1.2 PoS Terminals</title>
        <p>
          As at March, 2012 the PoS density per 100,000 people in Nigeria
was 13. Countries such as India had 67 PoS per 100,000 adults,
Kenya had 88, Namibia 338, Uganda 453, , Malaysia and South
Africa 1,063, Singapore 1,889, United State 2156, Brazil 2193,
New Zealand 3,916, and Australia 3,939 [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ],[
          <xref ref-type="bibr" rid="ref19">18</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">24</xref>
          ].
        </p>
      </sec>
      <sec id="sec-11-2">
        <title>4.1.4 Availability of Broadband Technology</title>
        <p>
          In the area of broadband, while 2G mobile enjoyed significant
coverage, which was at 98%, 3G technology coverage was less
than 35%. And this was found to be mostly focused in the urban
areas. Though, internet penetration had attained 33%, broadband
penetration was only at a mere 6% [
          <xref ref-type="bibr" rid="ref26">25</xref>
          ].
        </p>
      </sec>
      <sec id="sec-11-3">
        <title>4.1.5 Enabling Laws</title>
        <p>
          By 2012, necessary bills such as Cyber Security Bill and
Cybercrime Bill were yet to be passed by the Nigerian National
Assembly. Even the likes of Information Protection Agency Bill,
Computer Security and Critical Information Infrastructure
Protection Bill, the Cyber Security and Data Protection Agency
bill, the Electronic Fraud Prohibition Bill, Computer Misuse Bill
were all pending in the National House of Assembly, yet to
become law [
          <xref ref-type="bibr" rid="ref27">26</xref>
          ].
        </p>
      </sec>
      <sec id="sec-11-4">
        <title>4.1.6 Authentication Methods in Use</title>
        <p>
          The authentication mechanism used by banks for transactions in
Nigeria was mainly log-in passwords. However, in addition to the
password, some of the banks also adopted the use of hardware
token and PINs [
          <xref ref-type="bibr" rid="ref28">27</xref>
          ].
        </p>
      </sec>
      <sec id="sec-11-5">
        <title>4.1.7 Availability of CERT</title>
        <p>As at 2012, when the implementation of cashless policy was
commenced, Nigeria had no CERT to share information, identify,
analyze sophisticated cyber attacks and respond to cyber security
threat.</p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>4.2 Willingness to Subscribe to Cashless</title>
    </sec>
    <sec id="sec-13">
      <title>Policy and Potential Consequences of</title>
    </sec>
    <sec id="sec-14">
      <title>Implementation</title>
      <p>When asked to indicate their intention to subscribe to the cashless
policy, considering the state of infrastructures which they had
agreed were inadequate, slightly more respondents (52.7%)
indicated they were willing. Compared to the employed and
unemployed, the students were most willing in subscribing to the
policy, regardless of the state of the infrastructures. The
percentage among students, employed, and unemployed
respondents were 63.7%, 42.6%, and 26.3% respectively. The
finding was significant ( ). Having
understanding about the concept of cashless economy and
knowledge of government’s decision to implement it was found to
increase the likelihood of subscribing to the policy. While 55.6%
of those aware of what cashless economy was were willing to
subscribe, only 31.8% of those who reported they had no
understanding indicated willingness. This finding was equally
significant ( ).</p>
      <p>Among those who were unwilling to subscribe, low awareness
level ranked as the most common reason (77.9%). Other reasons
indicated by most in this category were potential increase in card
theft (61.6%), fear of leakage of sensitive personal information
(55.8%), and unavailability/insufficiency
infrastructures (53.5%).
of
required
For potential consequences of commencing the implementation of
the cashless policy, considering the state of infrastructure, most of
the respondents believed it would lead to increase in card theft
(77.5%), number of hackers (72.0%), internet or cybercrimes
(68.1%), and sophistication of hackers’ operations (60.4%).
When requested again to indicate their willingness to subscribe to
the policy, with necessary infrastructures in place, 94.5% of the
respondents reported they would subscribe.</p>
    </sec>
    <sec id="sec-15">
      <title>5. DISCUSSION</title>
      <p>
        The objective of this study was evaluating how ready Nigeria was,
in the provisioning of necessary requirements, when the
implementation of the policy commenced in 2012, and identifying
potential implications of implementation considering the current
state of her cyberspace. From the findings, most respondents
were aware of concept of cashless economy and government’s
plan to implement it. Confirming the results of [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref29">28</xref>
        ], the
level of awareness by relevant bodies was inadequate. In the same
vein, most respondents believed availability of necessary
infrastructures, and the security of the country’s cyberspace were
inadequate at the time implementation of cashless policy was
commenced in Nigeria in 2012. Secondary data supported these
findings.
      </p>
      <p>
        A critical look at the current level of implementation makes
evident the fact that most of the challenges, which were
cyberrelated, are still being faced. For instance, the CBN set a target for
the deployment of over 400,000 PoS terminals in 2015, with the
hope of accelerating PoS density in the country to 2,247 per
100,000 people by the end of the same year [
        <xref ref-type="bibr" rid="ref19">18</xref>
        ], [
        <xref ref-type="bibr" rid="ref30">29</xref>
        ]. However,
by first half of 2014, number of deployed PoS was 121,886 [
        <xref ref-type="bibr" rid="ref31">30</xref>
        ].
By 2015, the number was still around this range [
        <xref ref-type="bibr" rid="ref32">31</xref>
        ]. In 2014,
number of ATMs had increased to just 16.05 per 100,000 adults
[
        <xref ref-type="bibr" rid="ref33">32</xref>
        ]. In 2014, fixed broadband penetration was 0.01 per 100
people, international internet bandwidth was 3.15 bits/sec per
internet user, and by 2015, the number of secure internet servers
was 3 per million people [
        <xref ref-type="bibr" rid="ref34">33</xref>
        ]. These could have been responsible
for the poor connectivity experienced by PoS users in Lagos, as
reported by [
        <xref ref-type="bibr" rid="ref29">28</xref>
        ] as part of their findings.
      </p>
      <p>
        Respondents who were willing to subscribe to the cashless policy
despite inadequate infrastructures were slightly more than those
not interested. However, with necessary infrastructures in place,
almost all were willing. The study revealed that the willingness to
subscribe was influenced by some demographic characteristics.
Though almost all the students agreed that the government did not
do enough in terms of creating awareness, they were most willing
to subscribe to the policy when it was commenced. One possible
explanation of this finding is the perceived performance
expectancy on subscribing to the policy. This entails the extent to
which a subscriber believes the policy would help achieve some
gains in job performance. Age has been found to moderate this
variable, with the effect stronger for younger subscribers [
        <xref ref-type="bibr" rid="ref35">34</xref>
        ].
Relatively, students fall under this category.
      </p>
      <p>Those who knew what cashless economy was about, and also
knew about government’s plan to implement it were also found to
be more willing to subscribe. This underscores the necessity of
adequate awareness. Not surprisingly, inadequate awareness was
found to be the biggest factor that influenced apathy towards the
cashless policy. Other factors cited by those unwilling to
subscribe centered on online security risks and inadequate
infrastructures.</p>
    </sec>
    <sec id="sec-16">
      <title>5.1 Implications, Limitations, and Further</title>
    </sec>
    <sec id="sec-17">
      <title>Studies</title>
      <p>
        It is evident, from our study, that Nigeria was not well prepared,
considering the level of awareness and available infrastructures,
when the implementation of the cashless policy commenced in
2012. This submission corroborates part of the findings of [
        <xref ref-type="bibr" rid="ref16 ref6">6</xref>
        ].
Consequently, we suggest that the implications of implementing
cashless policy in Nigeria will have various security effects on the
Nigerian cyberspace, if proper requirements are not put in place.
Specifically, if the states of infrastructures are not upgraded, most
respondents reported likely increase in card theft, number of
hackers, internet or cybercrimes, and sophistication of hackers’
operations. These findings agree with those of [
        <xref ref-type="bibr" rid="ref16 ref6">6</xref>
        ] and [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], as
cited by [
        <xref ref-type="bibr" rid="ref20">19</xref>
        ].
      </p>
      <p>Our study is not without some limitations. Using self-report data
always poses the problem of generalization. For instance, the
findings might have been different if the entire data were collected
in Lagos alone. Additionally, the number of alternatives available
for those who were unwilling to subscribe to and as potential
consequences of implementation of the policy was not exhaustive.
Future studies could explore a more exhaustive list of options. No
doubt, new challenges must have been identified since the
commencement of the policy.</p>
    </sec>
    <sec id="sec-18">
      <title>6. CONCLUSION</title>
      <p>From our study, it was evident that Nigeria was ill-prepared when
the implementation of cashless policy was kicked-off in Lagos in
2012. Unfortunately, much has not changed in terms of available
infrastructures. This poses potential risks to the cyberspace, and
much more the economy, of the country. These findings highlight
the necessity of continuous and more intense awareness,
increasing and improving existing infrastructures, and
strengthening the security of the cyberspace.
Center</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Ezuwore-Obodoekwe</surname>
            ,
            <given-names>C. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eyisi</surname>
            ,
            <given-names>A. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emengini</surname>
            ,
            <given-names>S. E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Chukwubuzo</surname>
            ,
            <given-names>A. F.</given-names>
          </string-name>
          <year>2014</year>
          .
          <article-title>A critical analysis of cashless banking policy in Nigeria</article-title>
          .
          <source>IOSR J Bus Manag</source>
          ,
          <volume>16</volume>
          , 5 (May.
          <year>2014</year>
          ),
          <fpage>30</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Okoye</surname>
            ,
            <given-names>P. V.C.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ezejiofor</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>An Appraisal of Cashless Economy Policy in Development of Nigerian Economy</article-title>
          .
          <source>Research Journal of Finance and Accounting. 4</source>
          ,
          <issue>7</issue>
          ,
          <fpage>237</fpage>
          -
          <lpage>252</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Oluwabiyi</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Policy Implications of Cashless Banking on Nigeria's Economy</article-title>
          .
          <source>Public Policy and Administration Research</source>
          .
          <volume>5</volume>
          ,
          <issue>3</issue>
          ,
          <fpage>214</fpage>
          -
          <lpage>220</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Atanda</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Alimi</surname>
            ,
            <given-names>O. Y.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Anatomy of Cashless Banking in Nigeria</article-title>
          . Centre for Management,
          <source>Development &amp; Policy Modelling (CMDPM)</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Nweke</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Nigeria in 2012: The Vision of Cash-less Economy. Delivered at the J-</article-title>
          K Gadzama &amp;
          <string-name>
            <surname>Partners LLP 2012 Annual Public</surname>
          </string-name>
          <article-title>Lecture</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Akhalumeh</surname>
            ,
            <given-names>P. B.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Friday</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Nigeria's Cashless Economy: The Imperatives</article-title>
          .
          <source>International Journal of Management and Business Studies</source>
          ,
          <volume>2</volume>
          ,
          <issue>2</issue>
          ,
          <fpage>31</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Lamikanra</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Managing the transition to a cashless economy in Nigeria: The Challenges and Strategies</article-title>
          .
          <source>Presentation at the Nigeria Computer Society (NCS) 24th National Conference (July</source>
          ,
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Ovat</surname>
            ,
            <given-names>O. O.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>The Central Bank of Nigeria's Cashless Policy in Nigeria: Benefits and Challenges</article-title>
          .
          <source>Journal of Economics and Sustainable Development</source>
          ,
          <volume>3</volume>
          ,
          <issue>14</issue>
          ,
          <fpage>128</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Sunday</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Facing the home truth of cashless policy, IT &amp; Telecom digest</article-title>
          .
          <source>Retrieved January 25</source>
          ,
          <year>2013</year>
          from http//www.ittelecomdigestcom.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Ochei</surname>
            ,
            <given-names>L. C.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Effective Strategies for Monitoring and Controlling Overspending in a Cashless Society: Lessons for Citizenship Empowerment</article-title>
          .
          <source>African journal of computing &amp; ICT, 5</source>
          ,
          <issue>5</issue>
          ,
          <fpage>159</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Akhalumeh</surname>
          </string-name>
          , P. B and
          <string-name>
            <surname>Ohiokha</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Nigeria's Cashless Economy: The Imperatives</article-title>
          .
          <source>International journal of management &amp; business studies</source>
          ,
          <volume>2</volume>
          ,
          <issue>12</issue>
          ,
          <fpage>31</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Akanbi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Cashless Policy: Shift in Take-off Dates in Order</article-title>
          ,
          <string-name>
            <surname>Say</surname>
            <given-names>CBN</given-names>
          </string-name>
          , Experts. Thisday
          <string-name>
            <surname>Live</surname>
          </string-name>
          (
          <year>2013</year>
          , January 6). Retrieved from http://www.thisdaylive.com/articles/cashlesspolicy
          <article-title>-shift-in-take-off-date-in-states-in-order-say-cbnexperts/135481/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Akinola</surname>
            ,
            <given-names>O.S.</given-names>
          </string-name>
          ,
          <year>2012</year>
          . Cashless Society, Problems and Prospects, Data Mining Research Potentials.
          <source>International Journal of Computer Science and Telecommunications</source>
          ,
          <volume>3</volume>
          ,
          <issue>8</issue>
          ,
          <fpage>49</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>CBN</surname>
          </string-name>
          ,
          <year>2003</year>
          . Guidelines on Electronic Banking in Nigeria.
          <source>Retrieved May 14</source>
          ,
          <year>2013</year>
          from http://www.nibssplc.com.ng/wp-content/uploads/2012/07/E-BANKING.pdf
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>T. M.</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>Intrusion detection system Information Assurance Technology Analysis (IATAC)</article-title>
          .Woodland park, Herndon.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>(6thed)</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Robert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>Cyber Security strategy, Australian government</article-title>
          .
          <source>Retrieved June 16</source>
          ,
          <year>2013</year>
          from http://www.ag.gov.au/cybersecurity
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [17]
          <string-name>
            <surname>BFA</surname>
          </string-name>
          ,
          <year>2013</year>
          .
          <article-title>What does the CBN's Cash-less policy mean for financial inclusion in Nigeria? Bankable Frontier Associate</article-title>
          .
          <source>Retrieved February 10</source>
          ,
          <year>2013</year>
          from http://www.efina.org.ng/assets/manualUploads/
          <article-title>EFInAWhatdoes-the-CBNs-Cash-less-policy-mean-for-financialinclusion-in-NigeriaMarch-2013</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Lemo</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Lessons from Nigeria's Cashless Society Campaign</article-title>
          .
          <source>Keynote presentation at the AITEC Banking and Mobile Money Conference (March</source>
          ,
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Muyiwa</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tunmibi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , and John-Dewole,
          <string-name>
            <surname>A. T.</surname>
          </string-name>
          <year>2013</year>
          .
          <article-title>Impact of Cashless Economy in Nigeria</article-title>
          .
          <source>Greener Journal of Internet, Information and Communication Systems</source>
          ,
          <volume>1</volume>
          ,
          <issue>2</issue>
          ,
          <fpage>040</fpage>
          -
          <lpage>043</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [20]
          <string-name>
            <surname>CBNa. Payments</surname>
          </string-name>
          System - Introduction.
          <source>Retrieved July 9</source>
          ,
          <year>2016</year>
          from https://www.cbn.gov.ng/Paymentsystem/
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Nweze</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Electronic banking: Little gains, more pains</article-title>
          .
          <source>The Nation Newspaper (May</source>
          <volume>11</volume>
          ,
          <year>2015</year>
          ).
          <source>Retrieved May 11</source>
          ,
          <year>2015</year>
          from http://thenationonlineng.net/new/electronicbankinglittlegainsmorepains/
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Abioye</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Hackers hit bank ATMs in Lagos</article-title>
          .
          <source>The Punch Newspaper (April</source>
          <volume>7</volume>
          ,
          <year>2015</year>
          ).
          <source>Retrieved April 7</source>
          ,
          <year>2015</year>
          from http://www.punchng.com/business/businesseconomy/hackershitbankatmsinlagos/
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [23]
          <string-name>
            <surname>ITU</surname>
          </string-name>
          ,
          <year>2013</year>
          . Measuring Information Society.
          <source>Retrieved February 5</source>
          ,
          <year>2014</year>
          from http://www.itu.int/go/mis2013
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>World</given-names>
            <surname>Bank</surname>
          </string-name>
          ,
          <year>2013</year>
          .
          <article-title>World development indicator: financial access, stability and efficiency</article-title>
          . Retrieved from http://wdi.worldbank.
          <source>org/table/5</source>
          .5
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>Presidential</given-names>
            <surname>Committee</surname>
          </string-name>
          on Broadband.
          <source>Nigeria's National Broadband Plan 2013 - 2018. Retrieved July 8</source>
          ,
          <year>2016</year>
          from http://www.researchictafrica.net/countries/nigeria/Nigeria_N ational_Broadband_Plan_
          <fpage>2013</fpage>
          -
          <lpage>2018</lpage>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Osho</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falaye</surname>
            <given-names>A. A.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Shafi</surname>
            'I,
            <given-names>M. A.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Combating Terrorism with Cyber security: the Nigerian perspective</article-title>
          .
          <source>World journal of computer application and technology, 1</source>
          ,
          <fpage>4</fpage>
          .
          <fpage>103</fpage>
          -
          <lpage>109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Lawal</surname>
            ,
            <given-names>O. B.</given-names>
          </string-name>
          <string-name>
            <surname>Ibitola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Longe</surname>
            ,
            <given-names>O .B.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Internet Banking Authentication Methods in Nigeria Commercial Banks</article-title>
          .
          <source>African Journal of computer &amp; ICT, 6</source>
          ,
          <issue>1</issue>
          ,
          <fpage>208</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [28]
          <string-name>
            <surname>NIBSS</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>PoS Adoption and Usage: A Study on Lagos State</article-title>
          .
          <source>Retrieved July 8</source>
          ,
          <year>2016</year>
          http://www.nibssplc.com.ng/wp-content/uploads/2015/05/NIBSS-2015
          <string-name>
            <surname>-POSAdoption-Study-</surname>
          </string-name>
          Lagos-State.pdf
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [29]
          <string-name>
            <surname>CBN</surname>
          </string-name>
          ,
          <year>2011</year>
          .
          <article-title>Guidelines on Point of Sale (POS) Card Acceptance Services</article-title>
          . Retrieved from http://www.cbn.gov.ng/cashless/POS_GUIDELINES_
          <article-title>Augus t2011_FINAL_FINAL%20(2</article-title>
          ).pdf
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [30]
          <string-name>
            <surname>CBNb. Payments</surname>
          </string-name>
          System - Payment Modes in Nigeria.
          <source>Retrieved July 9</source>
          ,
          <year>2016</year>
          from https://www.cbn.gov.ng/Paymentsystem/Modes.asp
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>News</given-names>
            <surname>Agency</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>CBN: Nigerians make N1.5bn transactions on POS daily</article-title>
          .
          <source>The Cable (Oct. 7</source>
          ,
          <year>2015</year>
          ).
          <source>Retrieved July 9</source>
          ,
          <year>2016</year>
          from https://www.thecable.
          <article-title>ng/cbnnigerians-make-n1-5bn-transactions-pos-daily</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>World</given-names>
            <surname>Bank</surname>
          </string-name>
          . 2016a. World Development Indicators:
          <article-title>Financial access, stability and efficiency</article-title>
          .
          <source>Retrieved June 30</source>
          ,
          <year>2016</year>
          from http://wdi.worldbank.
          <source>org/table/5</source>
          .5#
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <source>[33] World Bank. 2016b. World Development Indicators: The Information society. Retrieved June 30</source>
          ,
          <year>2016</year>
          from http://wdi.worldbank.org/table/5.12#
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Venkatesh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morris</surname>
            ,
            <given-names>M. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>G. B.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>F. D.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>User acceptance of information technology: Toward a unified view</article-title>
          .
          <source>MIS quarterly (Sept</source>
          .
          <year>2003</year>
          ),
          <volume>27</volume>
          ,
          <issue>3</issue>
          ,
          <fpage>425</fpage>
          -
          <lpage>478</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>