<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">&quot;Were We Ready in the First Place?&quot;: An Analysis of Cashless Policy Implementation in Nigeria</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oluwafemi</forename><surname>Osho</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Temidayo H.Ajisola</orgName>
								<address>
									<postBox>D. Onoja +2347039165474</postBox>
									<postCode>+2347063194947</postCode>
									<settlement>Agada</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Joel</forename><forename type="middle">N</forename><surname>Ugwu</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Temidayo H.Ajisola</orgName>
								<address>
									<postBox>D. Onoja +2347039165474</postBox>
									<postCode>+2347063194947</postCode>
									<settlement>Agada</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">&quot;Were We Ready in the First Place?&quot;: An Analysis of Cashless Policy Implementation in Nigeria</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">AD0E7A6FB4D3368100E78E14C79BCFC7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T00:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cashless society</term>
					<term>cashless economy</term>
					<term>cashless policy</term>
					<term>implementation</term>
					<term>subscribe</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>On 1 st January, 2012, Nigeria commenced the implementation of cashless policy, with the kick-off in Lagos State. By the end of that year it was evident the implementation could not be extended to other states of the federation, as earlier scheduled. This raised a crucial question: was Nigeria prepared in the first place, in terms of availability of needed infrastructures, to commence implementation of the cashless economy? This study seeks to answer this question. In addition, it identifies potential consequences of implementation on the security of the nation's cyberspace. Both primary and secondary data were collected. Our findings reveal that when the implementation of the cashless policy kicked-off, awareness, required infrastructures, and the security of the country's cyberspace were inadequate. We suggest that the consequences of implementing cashless policy in Nigeria will have various security effects on the Nigerian cyberspace if the level of awareness and existing infrastructures are not improved.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>A cashless economy is one in which a given society is regulated to have the least needed amount of cash in circulation, the rest of which is transacted electronically through the use of direct debit, mobile payments, electronic fund transfer, internet banking, multifunctional Automated Teller Machines (ATMs), point of sale terminals (POSs), amongst others <ref type="bibr" target="#b1">[1]</ref>, <ref type="bibr" target="#b2">[2]</ref>. Simply put, a cashless economy entails a pervasive application of various computer technologies in the financial system <ref type="bibr" target="#b3">[3]</ref>. The system gives way for goods and services to be purchased by individuals without anything tangible being exchanged, using what is known as electronic cash. The term money still exists, but it is more in an electronic processes form than previously.</p><p>An effective and modernized payment system has been found to be positively correlated with the development of the economy <ref type="bibr" target="#b4">[4]</ref>, <ref type="bibr" target="#b5">[5]</ref>, being a tool for more effective, convenient and faster methods of buying goods and rendering of services. This explains why several governments and their financial institutions have been taking steady steps towards achieving a cashless society.</p><p>The benefits of adoption of cashless economy include reduction in corruption and the cost of services by banks (such as cost of credit), increased operational efficiency, improved financial inclusion, via providing alternatives that aid easy transactions and greater reach, and improved efficiency of the monetary policy in managing the rate of inflation and driving the growth of the economy <ref type="bibr" target="#b4">[4]</ref>, <ref type="bibr" target="#b6">[6]</ref>, <ref type="bibr">[7]</ref>, <ref type="bibr" target="#b8">[8]</ref>, <ref type="bibr" target="#b9">[9]</ref>. Other benefits include increased convenience in transaction; promotion of e-commerce; reduction in circulation of fake currency, theft of cash from individuals, money laundering, and stockpiling of cash in houses by corrupt government officials <ref type="bibr" target="#b6">[6]</ref>, <ref type="bibr" target="#b8">[8]</ref>, <ref type="bibr" target="#b10">[10]</ref>.</p><p>However, implementing cashless policy poses some risks. Since personal information and data will now reside online, it becomes increasingly difficult to curb internet hackers and thieves. Other demerits are potential increase in cyber crimes, increased sophistication in operation of hackers and scammers, increase in theft of ATM, credit and debit cards, to mention but few <ref type="bibr" target="#b4">[4]</ref>, <ref type="bibr" target="#b8">[8]</ref>, <ref type="bibr" target="#b11">[11]</ref>. This underscores why a secure national cyberspace is fundamental to the success of cashless policy implementation.</p><p>Activities of hackers and other cyber criminals have always posed different threats to the cyberspace. Activities such as phishing attack, website spoofing by masquerading, creating different entity similar to the operated entity, identity theft, virus attacks, key loggers and cracking encryption channels that are guarding a system are capable of stifling the capacity of the cyberspace to support effective implementation of the cashless policy. As a result of these, the need for necessary facilities to ensure effectiveness, efficiency, security, privacy, integrity, confidentiality, convenience, acceptability, mobility, for successful actualization of cashless economy cannot be overemphasized.</p><p>In line with the nation's vision 20:20, which is being among the first 20 economies by year 2020 <ref type="bibr" target="#b8">[8]</ref>, to enable the development and modernization of the payment system, to attain reduction in cost of banking services, improve financial inclusion and effectiveness of monetary policy, the cashless policy was introduced in Nigeria, with a test run in Lagos in 1 st January, 2012 <ref type="bibr" target="#b4">[4]</ref>, <ref type="bibr" target="#b5">[5]</ref>. On 6 th January 2013, the Central bank of Nigeria (CBN) suspended the spread of the cashless policy from Lagos state to other states. Some of the contributing factors included insufficient POS, ATM, and low level of awareness, connectivity, and bandwidth penetration. Other challenges included low ICT penetration and other logistics issues <ref type="bibr" target="#b12">[12]</ref>. The suspension raised some pertinent issues: was Nigeria prepared in the first place to commence implementation of the cashless economy? And having commenced, what are the potential consequences on the security of the nation's cyberspace.</p><p>This study seeks to assess the level of readiness of Nigeria, in respect of provisioning of required infrastructures, when the implementation of the policy commenced in 2012, and identify possible implications of implementation considering the current state of her cyberspace. This study is significant in many ways. First, it would expose the state of Nigeria's cyberspace at the commencement of implementing cashless policy. It also assesses the current capacity of the cyberspace to effectively support the policy. These would provide decision makers, including the government, relevant agencies, IT managers, policy makers, and other stakeholders, responsible for the Nigerian cashless policy implementation, better insight into the security implications, which would enable them to implement necessary strategies towards more effective implementation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">LITERATURE REVIEW 2.1 Requirements for Effective Implementation of Cashless Policy</head><p>Effective implementation of cashes policy is predicated on the availability of some requirements. These are divided into hardware, software, legal, personnel, and logistic requirements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.1">Hardware Requirement</head><p>Some of the hardware requirements include computer systems; smart (debit and credit) cards, used as alternative to cash for making purchases, for making withdrawals or deposits at ATMs, updating account information and for other transactions made in the banks. Others are smart phones, which provide services such as multimedia message service (MMS), email, short-range wireless communications (infrared and bluetooth), text messaging, internet access, business applications, supporting online transactions <ref type="bibr" target="#b9">[9]</ref>, <ref type="bibr" target="#b13">[13]</ref>, <ref type="bibr" target="#b14">[14]</ref>; and Point-of-Sale (POS) terminals <ref type="bibr" target="#b6">[6]</ref>, an equivalent of an electronic cash register, which aids transactions through the use of smart chip cards, credit cards, debit cards, and other electronically-dependent transactions in a traditional retail environment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.2">Software Requirement</head><p>These are the software components used to drive and secure the different hardware. They include phishing detection tools, to detect and block suspicious sites. For example, when a customer transacts on a fake website, these tools can be used to detect the Domain Name System (DNS) roots of the sites. Anti-phishing software can be installed on the customer's computer, so as to detect addresses that are not on the database during a transaction. Another requirement is antivirus software. They are used in detecting, preventing and removing malware such as virus, worms, hijacker, key loggers, root kits, Trojan horses, spyware, and backdoors. Antivirus software enhances computer security, protecting it from social engineering attacks. Real time protection and access scanning are provided by most antivirus, anti-spyware and anti-malware software. It prevents attackers from having access to banking information <ref type="bibr" target="#b14">[14]</ref>. A third requirement in this category is firewall. This filters information coming into a computer system or private network through the internet, preventing flagged packet of information from going through. Firewalls are used in controlling traffic flowing in and out of the network. They can be used to prevent direct connection between bank-end systems and to address security concerns of external deceives such as ATMs and PCs that are in connection to the bank's network. They protect computers from remote login, application backdoors, Simple Mail Transfer Protocol (SMTP) session hijacking and macros. One other important software requirement is intrusion detection system (IDS). This is a software application or hardware device that monitors network systems for policy violations and malicious activities. Identifying possible incidents, logging information and reporting attempts are primarily the functions of IDS. The IDS can be either host-based or network-based <ref type="bibr" target="#b15">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.3">Legal Requirement</head><p>The legal requirement consists of relevant laws, standards, policies, and regulations to clearly define the roles and regulate the activities of the different stakeholders in the system. An important component is the development of relevant policies on cyber security. These based on national leadership, sharing of responsibilities, partnership with all concerned agencies, active international engagement, risk management control. They enhance both collective and individual security. According to <ref type="bibr" target="#b16">[16]</ref>, the objectives of these policies are to the effect that all citizens should be adequately aware of cyber risks and how their computers can be secure, thereby protecting their finances, online privacy and identities; to ensure smooth operations and privacy of customers; and for the government to ensure security of the country's information and communications technologies and make them resistant to attack from malicious hackers. Also pertinent for effective implementation of cashless policy are cyber laws. The availability, confidentiality, and integrity of information being stored, processed, and communicated electronically is ultimate. Therefore, relative measures have to be taken to this regard. As there might be an ill effect from an increase in cybercrime on the economy, country and society at large, there is need for activities of law enforcement, regulatory detection, and strong legal frameworks to enhance the operations of a cashless economy. Strong legislative Acts are required for comprehensive, effective and unified legal framework catering for the prevention, detection, banning, prosecution, and punishment for cyber crimes in the nation <ref type="bibr" target="#b14">[14]</ref>.</p><p>A third component is the monetary policy. Cashless policy enhances the payment system of a country. It regulates the cash collection and lodgment in the country and stipulates that there exists a monitor and feedback mechanism that allows the full adoption and smooth implementation of cashless economy in a country. A monetary policy ensures that there is a limit to cash withdrawal and lodgment fees for corporate and individual customers <ref type="bibr" target="#b14">[14]</ref>, <ref type="bibr" target="#b17">[17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.4">Personnel Requirement</head><p>These comprise Payment Terminal Services Provider (PSTP), Computer Emergency Response Team (CERT), Communications and Media Authority (CMA), and the Attorney-General's Department (AGD). PTSPs, amongst other things, are engaged in proper maintenance/support of infrastructure to ensure effectiveness of POS operations. Their services include all aspects relating to both terminal management and support, and not limited to purchase and replacement of spare parts, provision of training, repairs, connectivity, and development of value-added services <ref type="bibr" target="#b14">[14]</ref>. The CERT facilitates information sharing and improves response co-ordination to cyber threats between citizens and the Government. They help in identifying and analyzing high level cyber-attacks as well as other cyber events, aiding response across the private sector systems and government infrastructure. They ensure that access to information on cyber security threats are available to the community, including vulnerabilities in their systems, how information can be better protected and the potential consequences of an incidence in the information technology environment <ref type="bibr" target="#b16">[16]</ref>.</p><p>The Communications and Media Authority (CMA) is responsible for broadcasting regulations on the internet, radio and telecommunications. It contributes to the objectives of cyber security by gathering evidence, assisting in preventing identity theft, computer fraud and regulatory obligations in regard to criminal misuse and illegal act, and makes sure standards are met by the telecommunications providers and Internet Service Providers (ISPs). The last component of this requirement, the Attorney-General's Department (AGD), consists of security policy protection departments, criminal law and the law enforcement that collectively provide harmonization of cyber security policies, which includes international collaboration and crisis management as well as protection of security policies for government agencies. They oversee such government business partnerships as CERT, and provide guidance on cyber security to owners and critical infrastructure operators <ref type="bibr" target="#b16">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.5">Logistics Requirement</head><p>The logistic requirement includes standards on application and system software; standards for computer network and internet; and high speed/broadband internet technologies, which describes a broad range of technologies that provides higher rate of data access to the internet, supporting faster World Wide Web (WWW) browsing, file download, virtual private networks and remote system administration <ref type="bibr" target="#b14">[14]</ref>. Also, there is absolute need for international engagement. The global challenges of cyber security require multilateral or bilateral efforts with key ally nations to strengthen cyberspace. Increase in multilateral forums with relevant international bodies is necessary to enhance international efforts in development of global standards, legal system capacity to combat cybercrime, promotion of situational awareness, strategic warning and even response <ref type="bibr" target="#b16">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Implementing Cashless Policy in Nigeria</head><p>Prior to the commencement of the implementation of the cashless policy in Nigeria, the banking sector was rife with investment environments characterized by high risk, corruption, payment fraud, poor credit administration, lack of credit facility, and system unreliability <ref type="bibr" target="#b4">[4]</ref>. Having identified the need to reduce significantly the industry's cost to serve, the CBN, in alliance with the Banker's committee, initiated a shared service program with five key areas in focus: cash management, payment systems transformation, IT infrastructure and services, IT standards, and back office operations. Transformation of the payments system became the key driver. Out of the payments transformation initiative was borne the cashless policy <ref type="bibr" target="#b18">[18]</ref>. The policy was aimed, amongst many, to reduce cost of maintenance of cashbased economy by 90% <ref type="bibr" target="#b19">[19]</ref>.</p><p>Part of the efforts by the CBN towards modernizing the payments system was initiating the National Payments System (NPS) in 2005 <ref type="bibr" target="#b5">[5]</ref>, automating the cheque clearing system through the introduction of an MICR-based technology and the first automated clearing process in Lagos <ref type="bibr" target="#b4">[4]</ref>. Other efforts include establishment of frameworks and guidelines on payments system <ref type="bibr" target="#b4">[4]</ref>, licensing of Payments Terminal Service Providers (PTSPs) and 14 mobile payment schemes, campaigns and public awareness <ref type="bibr" target="#b18">[18]</ref>. Banks and non-bank stakeholders also embarked on measures to promote the cashless initiative. Within the space of seven months, the number of PoS terminals increased from 6,019 to 89,700 <ref type="bibr">[7]</ref>; number of registered merchants reached 151,717 by July 2012 <ref type="bibr" target="#b5">[5]</ref>. Major initiatives in the implementation of the cashless policy are presented in Figure <ref type="figure" target="#fig_0">1</ref>  <ref type="bibr" target="#b20">[20]</ref>.</p><p>After wide consultations with relevant stakeholders, the implementation of the policy, termed 'Cashless Lagos,' kicked off in Lagos on 1 st January, 2012 <ref type="bibr" target="#b4">[4]</ref>, <ref type="bibr" target="#b18">[18]</ref> and was expected to commence officially in the rest of the country by January, 2013 <ref type="bibr" target="#b5">[5]</ref>, <ref type="bibr" target="#b8">[8]</ref>. Seven months into the implementation of the policy in Lagos, many challenges had surfaced: insufficient and unevenly spread PoS terminals, many instances of deployed but yet-to-beconfigured PoS terminals, frequent network downtime which were affecting completion of transactions, Short Cash conversion cycle, lack of clarity on allocation of handling charges, transparency in the manner settlements were to be carried out for PoS transactions, clearly-defined data and network security standards across electronic payment channels, and availability and stability of mobile money platforms <ref type="bibr">[7]</ref>. Nweke <ref type="bibr" target="#b5">[5]</ref> recommended some pre-conditions that should be met before the proposed nationwide take-off in 2013. These, amongst others, included provision of necessary payment infrastructure: power supply, mobile telecoms infrastructure, electronic clearing technology; relevant legal and regulatory framework, and a law enforcement agency equipped to adequately tackle cyber-crime and internet fraud. However, overwhelmed by the challenges during the 'Cashless Lagos' exercise, the earlier plan to extend the cashless policy to the rest of the country was readjusted to commence in the Federal Capital Territory (Abuja), Abia, Anambra, Kano, Ogun, and River States effective July 1, 2013.</p><p>A critical appraisal reveals that the introduction of the cashless policy has recorded little success <ref type="bibr" target="#b21">[21]</ref>. In spite of measures so far deployed, e-payment fraud has continued to pervade the country's banking-sphere. In six months, up to N20 billion was lost to fraudsters. This was despite report by CBN on reduction in ATM card fraud upon the introduction of chip-and-PIN cards <ref type="bibr" target="#b21">[21]</ref>, and institution of ATM Anti-Fraud Committee, which was upscaled to E-Payment Fraud Forum <ref type="bibr" target="#b18">[18]</ref>. There were instances where hackers were found to fix tools on ATMs that harvest passwords of customers who come to transact using the machines. In 2013 alone, according to CBN, N40 billion was lost to electronic frauds <ref type="bibr" target="#b22">[22]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">MATERIALS AND METHODS</head><p>To achieve our objectives of assessing the level of readiness of Nigeria, in respect of provisioning of required infrastructures, when the implementation of the policy was commenced in 2012, and identifying possible implications of implementation considering the current state of her cyberspace, the study used both primary and secondary data. We believe effective implementation is anchored on adequate awareness and availability of necessary infrastructures. Consequently, we collected self-report data to collate views on the state of these factors. Also, relevant documents are investigated to ascertain the available quantity and/or quality, as the case may be, of selected basic requirements, during the period when the implementation of the cashless policy was commenced in Nigeria. The variables are then compared with international standards and/or world average. The indices are used to determine the adequacy or otherwise of the requirements. Specifically, in respect of infrastructures, the study focused on the e-index of the country; number of available ATMs, POSs; availability of broadband technology, enabling laws, CERT; and the authentication methods commonly in use. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Participants</head><p>To collate primary data, a survey was conducted in 2013 in Lagos, Ekiti, and Niger States. The choice of Lagos was natural being the state where the cashless policy implementation was kicked off. The research instrument used was questionnaire. A total of 250 questionnaires were distributed. Out of these, 219 were returned. 37 were found to be invalid. Consequently, 182 were used for analysis. There were slightly more male respondents, 51.6% v. 48.4%. Most were within the ages of 21 -30 (46.7%), students (56.0%), and aware of the term cashless society and government's plan to implement it (87.9%). The demographic compositions of the respondents are presented in Table <ref type="table" target="#tab_0">1</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Measures</head><p>The questionnaire used for the survey had three sections. The first section sought information on respondent demographics. The second section bordered on perception about government's effort in terms of awareness, the country's readiness in respect of availability of necessary facilities, and the security of the nation's cyberspace to support implementation of the cashless policy. In the last section, respondents were asked if they were willing to subscribe to the cashless policy, considering the state of infrastructures. Those who expressed unwillingness were then requested to select reason(s). Respondents were also asked to indicate potential consequences of implementation, considering the state of infrastructures. Lastly, they were asked if they would be willing to subscribe if necessary requirements are put in place.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">FINDINGS 4.1 Readiness to Implement Cashless Policy</head><p>As can be seen from Table <ref type="table" target="#tab_1">2</ref>, most respondents believed the government did not do enough, in terms of creating awareness of the cashless policy (84.6%), and necessary infrastructures were not adequately put in place (89.6%) before the implementation of the policy was commenced in 2012. Equally, most felt the country's cyberspace was not secure enough to support the kickoff of the implementation (87.9%).</p><p>Respondents who were unemployed, compared with those who were students and employed, were most critical of the government in their failure to adequately create awareness of the policy. Specifically, 94.7% of unemployed, 90.2% of students, and 72.1% of employed respondents reported government effort was insufficient. The study was found to be significant ( ).</p><p>In terms of adequacy of infrastructures provided for the kick-off of the cashless policy, more of the females, compared to the male, 96.6% v. 83.0%, felt the available infrastructures were inadequate ( ). In the same vein, more females, 97.7% v. 78.7%, rated the country's cyberspace not secure enough to support implementation of the policy (</p><p>). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.1">E-Index</head><p>The ICT Development Index (IDI) is a composite index which is used to combine 11 indicators into one benchmark measure (presented on a scale from 0 to 10) that compares and monitors the developments in information and communication technology (ICT) across countries. A country with Low level of ICT development, indicated by an IDI value below or equal to 2.33, is not making enough effort into catching up in terms of ICT developmental progress. This group of countries, referred to as least connected countries (LCCs), has very low levels of ICT uptake and use. Between 2011 and 2012, these countries recorded the smallest increase in the average IDI value. In majority of LCCs, internet access are very limited, low-speed, very expensive and used by small percentage of the population. LCCs also tend to have very low fixed and mobile broadband penetration levels, and most only launched and commercialized 3G mobile-broadband networks relatively. The LCCs include many of the world's least developed countries (LDCs), with majority in Africa. They also include some highly populated countries that are not LDCs, such as Nigeria, India and Pakistan. Considering the ICT Development Index (IDI) for 2011 and 2012, Nigeria was ranked 123 in 2011 and 122 in 2012 out of 157 countries in the world <ref type="bibr" target="#b23">[23]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.2">PoS Terminals</head><p>As at March, 2012 the PoS density per 100,000 people in Nigeria was 13. Countries such as India had 67 PoS per 100,000 adults, Kenya had 88, Namibia 338, Uganda 453, , Malaysia and South Africa 1,063, Singapore 1,889, United State 2156, Brazil 2193, New Zealand 3,916, and Australia 3,939 <ref type="bibr" target="#b5">[5]</ref>, <ref type="bibr" target="#b18">[18]</ref>, <ref type="bibr" target="#b24">[24]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.3">ATM</head><p>In 2012, the value for ATMs per 100,000 adults in Nigeria was only 11.9, while other country such as Thailand had 77.95, South Africa 60.01, Brazil 120.6, United Kingdom 122.77, United State 173.43, Australia 166, Canada 208.98, and Japan 129.04 <ref type="bibr" target="#b24">[24]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.4">Availability of Broadband Technology</head><p>In the area of broadband, while 2G mobile enjoyed significant coverage, which was at 98%, 3G technology coverage was less than 35%. And this was found to be mostly focused in the urban areas. Though, internet penetration had attained 33%, broadband penetration was only at a mere 6% <ref type="bibr" target="#b25">[25]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.5">Enabling Laws</head><p>By 2012, necessary bills such as Cyber Security Bill and Cybercrime Bill were yet to be passed by the Nigerian National Assembly. Even the likes of Information Protection Agency Bill, Computer Security and Critical Information Infrastructure Protection Bill, the Cyber Security and Data Protection Agency bill, the Electronic Fraud Prohibition Bill, Computer Misuse Bill were all pending in the National House of Assembly, yet to become law <ref type="bibr" target="#b26">[26]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.6">Authentication Methods in Use</head><p>The authentication mechanism used by banks for transactions in Nigeria was mainly log-in passwords. However, in addition to the password, some of the banks also adopted the use of hardware token and PINs <ref type="bibr" target="#b27">[27]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.7">Availability of CERT</head><p>As at 2012, when the implementation of cashless policy was commenced, Nigeria had no CERT to share information, identify, analyze sophisticated cyber attacks and respond to cyber security threat.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Willingness to Subscribe to Cashless Policy and Potential Consequences of Implementation</head><p>When asked to indicate their intention to subscribe to the cashless policy, considering the state of infrastructures which they had agreed were inadequate, slightly more respondents (52.7%) indicated they were willing. Compared to the employed and unemployed, the students were most willing in subscribing to the policy, regardless of the state of the infrastructures. The percentage among students, employed, and unemployed respondents were 63.7%, 42.6%, and 26.3% respectively. The finding was significant ( ). Having understanding about the concept of cashless economy and knowledge of government's decision to implement it was found to increase the likelihood of subscribing to the policy. While 55.6% of those aware of what cashless economy was were willing to subscribe, only 31.8% of those who reported they had no understanding indicated willingness. This finding was equally significant (</p><p>).</p><p>Among those who were unwilling to subscribe, low awareness level ranked as the most common reason (77.9%). Other reasons indicated by most in this category were potential increase in card theft (61.6%), fear of leakage of sensitive personal information (55.8%), and unavailability/insufficiency of required infrastructures (53.5%).</p><p>For potential consequences of commencing the implementation of the cashless policy, considering the state of infrastructure, most of the respondents believed it would lead to increase in card theft (77.5%), number of hackers (72.0%), internet or cybercrimes (68.1%), and sophistication of hackers' operations (60.4%).</p><p>When requested again to indicate their willingness to subscribe to the policy, with necessary infrastructures in place, 94.5% of the respondents reported they would subscribe. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">DISCUSSION</head><p>The objective of this study was evaluating how ready Nigeria was, in the provisioning of necessary requirements, when the implementation of the policy commenced in 2012, and identifying potential implications of implementation considering the current state of her cyberspace. From the findings, most respondents were aware of concept of cashless economy and government's plan to implement it. Confirming the results of <ref type="bibr" target="#b4">[4]</ref>, <ref type="bibr">[7]</ref>, <ref type="bibr" target="#b28">[28]</ref>, the level of awareness by relevant bodies was inadequate. In the same vein, most respondents believed availability of necessary infrastructures, and the security of the country's cyberspace were inadequate at the time implementation of cashless policy was commenced in Nigeria in 2012. Secondary data supported these findings.</p><p>A critical look at the current level of implementation makes evident the fact that most of the challenges, which were cyberrelated, are still being faced. For instance, the CBN set a target for the deployment of over 400,000 PoS terminals in 2015, with the hope of accelerating PoS density in the country to 2,247 per 100,000 people by the end of the same year <ref type="bibr" target="#b18">[18]</ref>, <ref type="bibr" target="#b29">[29]</ref>. However, by first half of 2014, number of deployed PoS was 121,886 <ref type="bibr" target="#b30">[30]</ref>. By 2015, the number was still around this range <ref type="bibr" target="#b31">[31]</ref>. In 2014, number of ATMs had increased to just 16.05 per 100,000 adults <ref type="bibr" target="#b32">[32]</ref>. In 2014, fixed broadband penetration was 0.01 per 100 people, international internet bandwidth was 3.15 bits/sec per internet user, and by 2015, the number of secure internet servers was 3 per million people <ref type="bibr" target="#b33">[33]</ref>. These could have been responsible for the poor connectivity experienced by PoS users in Lagos, as reported by <ref type="bibr" target="#b28">[28]</ref> as part of their findings.</p><p>Respondents who were willing to subscribe to the cashless policy despite inadequate infrastructures were slightly more than those not interested. However, with necessary infrastructures in place, almost all were willing. The study revealed that the willingness to subscribe was influenced by some demographic characteristics.</p><p>Though almost all the students agreed that the government did not do enough in terms of creating awareness, they were most willing to subscribe to the policy when it was commenced. One possible explanation of this finding is the perceived performance expectancy on subscribing to the policy. This entails the extent to which a subscriber believes the policy would help achieve some gains in job performance. Age has been found to moderate this variable, with the effect stronger for younger subscribers <ref type="bibr" target="#b34">[34]</ref>.</p><p>Relatively, students fall under this category.</p><p>Those who knew what cashless economy was about, and also knew about government's plan to implement it were also found to be more willing to subscribe. This underscores the necessity of adequate awareness. Not surprisingly, inadequate awareness was found to be the biggest factor that influenced apathy towards the cashless policy. Other factors cited by those unwilling to subscribe centered on online security risks and inadequate infrastructures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Implications, Limitations, and Further Studies</head><p>It is evident, from our study, that Nigeria was not well prepared, considering the level of awareness and available infrastructures, when the implementation of the cashless policy commenced in 2012. This submission corroborates part of the findings of <ref type="bibr" target="#b6">[6]</ref>. Consequently, we suggest that the implications of implementing cashless policy in Nigeria will have various security effects on the Nigerian cyberspace, if proper requirements are not put in place. Specifically, if the states of infrastructures are not upgraded, most respondents reported likely increase in card theft, number of hackers, internet or cybercrimes, and sophistication of hackers' operations. These findings agree with those of <ref type="bibr" target="#b6">[6]</ref> and <ref type="bibr" target="#b11">[11]</ref>, as cited by <ref type="bibr" target="#b19">[19]</ref>.</p><p>Our study is not without some limitations. Using self-report data always poses the problem of generalization. For instance, the findings might have been different if the entire data were collected in Lagos alone. Additionally, the number of alternatives available for those who were unwilling to subscribe to and as potential consequences of implementation of the policy was not exhaustive. Future studies could explore a more exhaustive list of options. No doubt, new challenges must have been identified since the commencement of the policy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">CONCLUSION</head><p>From our study, it was evident that Nigeria was ill-prepared when the implementation of cashless policy was kicked-off in Lagos in 2012. Unfortunately, much has not changed in terms of available infrastructures. This poses potential risks to the cyberspace, and much more the economy, of the country. These findings highlight the necessity of continuous and more intense awareness, increasing and improving existing infrastructures, and strengthening the security of the cyberspace.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Some major milestones in the implementation of the cashless policy [20]</figDesc><graphic coords="4,82.82,140.05,446.61,493.14" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 . Demographic profile of respondents</head><label>1</label><figDesc></figDesc><table><row><cell></cell><cell>Freq</cell><cell>%</cell></row><row><cell>Sex</cell><cell></cell><cell></cell></row><row><cell>Male</cell><cell>94</cell><cell>51.6</cell></row><row><cell>Female</cell><cell>88</cell><cell>48.4</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row><row><cell>Age</cell><cell></cell><cell></cell></row><row><cell>&lt; 20</cell><cell>42</cell><cell>23.1</cell></row><row><cell>21 -30</cell><cell>85</cell><cell>46.7</cell></row><row><cell>31 -40</cell><cell>35</cell><cell>19.2</cell></row><row><cell>41 -50</cell><cell>16</cell><cell>8.8</cell></row><row><cell>51 -60</cell><cell>3</cell><cell>1.6</cell></row><row><cell>&gt; 60</cell><cell>1</cell><cell>0.5</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row><row><cell>Occupation</cell><cell></cell><cell></cell></row><row><cell>Student</cell><cell>102</cell><cell>56.0</cell></row><row><cell>Employed</cell><cell>61</cell><cell>33.5</cell></row><row><cell>Unemployed</cell><cell>19</cell><cell>10.4</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row><row><cell cols="3">Aware of the term cashless society</cell></row><row><cell cols="2">and government's plan to</cell><cell></cell></row><row><cell>implementate it</cell><cell></cell><cell></cell></row><row><cell>Yes</cell><cell>160</cell><cell>87.9</cell></row><row><cell>No</cell><cell>22</cell><cell>12.1</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 . Assessment of readiness to implement cashless policy Freq % Adequacy of awareness by government</head><label>2</label><figDesc></figDesc><table><row><cell>Yes</cell><cell>28</cell><cell>15.4</cell></row><row><cell>No</cell><cell>154</cell><cell>84.6</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row><row><cell cols="2">Adequacy of necessary facilities</cell><cell></cell></row><row><cell>Yes</cell><cell>19</cell><cell>10.4</cell></row><row><cell>No</cell><cell>163</cell><cell>89.6</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row><row><cell cols="3">Security of the country's cyberspace</cell></row><row><cell>Yes</cell><cell>22</cell><cell>12.1</cell></row><row><cell>No</cell><cell>160</cell><cell>87.9</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3 . Willingness to subscribe to cashless policy and potential consequences of implementation Freq % Willingness to subscribe, considering state of infrastructures</head><label>3</label><figDesc></figDesc><table><row><cell>Yes</cell><cell>96</cell><cell>52.7</cell></row><row><cell>No</cell><cell>86</cell><cell>47.3</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Willingness to subscribe if necessary requirements are put in place</head><label></label><figDesc></figDesc><table><row><cell>Yes</cell><cell>172</cell><cell>94.5</cell></row><row><cell>No</cell><cell>10</cell><cell>5.5</cell></row><row><cell>Total</cell><cell>182</cell><cell>100.0</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">CoRI'16, Sept 7-9, 2016, Ibadan, Nigeria.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title/>
		<author>
			<persName><surname>References</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A critical analysis of cashless banking policy in Nigeria</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">N</forename><surname>Ezuwore-Obodoekwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Eyisi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Emengini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Chukwubuzo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IOSR J Bus Manag</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="30" to="42" />
			<date type="published" when="2014-05">2014. May. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">An Appraisal of Cashless Economy Policy in Development of Nigerian Economy</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V C</forename><surname>Okoye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ezejiofor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Research Journal of Finance and Accounting</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="237" to="252" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Policy Implications of Cashless Banking on Nigeria&apos;s Economy</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Oluwabiyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Public Policy and Administration Research</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="214" to="220" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Anatomy of Cashless Banking in Nigeria</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Atanda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">Y</forename><surname>Alimi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Centre for Management, Development &amp; Policy Modelling (CMDPM)</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="1" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Nigeria in 2012: The Vision of Cash-less Economy</title>
		<author>
			<persName><forename type="first">F</forename><surname>Nweke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Annual Public Lecture</title>
				<imprint>
			<publisher>the J-K Gadzama &amp; Partners LLP</publisher>
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Nigeria&apos;s Cashless Economy: The Imperatives</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Akhalumeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Friday</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Management and Business Studies</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="31" to="36" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Managing the transition to a cashless economy in Nigeria: The Challenges and Strategies</title>
		<author>
			<persName><forename type="first">B</forename><surname>Lamikanra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Presentation at the Nigeria Computer Society (NCS) 24 th National Conference</title>
				<imprint>
			<date type="published" when="2012-07">2012. July, 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The Central Bank of Nigeria&apos;s Cashless Policy in Nigeria: Benefits and Challenges</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">O</forename><surname>Ovat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Economics and Sustainable Development</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">14</biblScope>
			<biblScope unit="page" from="128" to="133" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Facing the home truth of cashless policy, IT &amp; Telecom digest</title>
		<author>
			<persName><forename type="first">O</forename><surname>Sunday</surname></persName>
		</author>
		<ptr target="http//www.ittelecomdigestcom" />
		<imprint>
			<date type="published" when="2013-01-25">2013. January 25, 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Effective Strategies for Monitoring and Controlling Overspending in a Cashless Society: Lessons for Citizenship Empowerment</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">C</forename><surname>Ochei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">African journal of computing &amp; ICT</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="159" to="162" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Nigeria&apos;s Cashless Economy: The Imperatives</title>
		<author>
			<persName><forename type="first">P</forename><surname>Akhalumeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ohiokha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International journal of management &amp; business studies</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="31" to="36" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Cashless Policy: Shift in Take-off Dates in Order</title>
		<author>
			<persName><forename type="first">F</forename><surname>Akanbi</surname></persName>
		</author>
		<ptr target="http://www.thisdaylive.com/articles/cashless-policy-shift-in-take-off-date-in-states-in-order-say-cbn-experts/135481/" />
	</analytic>
	<monogr>
		<title level="m">Say CBN, Experts. Thisday Live</title>
				<imprint>
			<date type="published" when="2013-01-06">2013. 2013. January 6</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Cashless Society, Problems and Prospects, Data Mining Research Potentials</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">S</forename><surname>Akinola</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Science and Telecommunications</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="49" to="55" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Guidelines on Electronic Banking in Nigeria</title>
		<ptr target="http://www.nibss-plc.com.ng/wp-content/uploads/2012/07/E-BANKING.pdf" />
		<imprint>
			<date type="published" when="2003-05-14">2003. May 14, 2013</date>
			<publisher>CBN</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">M</forename><surname>Wu</surname></persName>
		</author>
		<title level="m">Intrusion detection system (6 th ed) Information Assurance Technology Analysis Center (IATAC)</title>
				<meeting><address><addrLine>Woodland park, Herndon</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Cyber Security strategy, Australian government</title>
		<author>
			<persName><forename type="first">M</forename><surname>Robert</surname></persName>
		</author>
		<ptr target="http://www.ag.gov.au/cybersecurity" />
		<imprint>
			<date type="published" when="2009-06-16">2009. June 16, 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">What does the CBN&apos;s Cash-less policy mean for financial inclusion in Nigeria? Bankable Frontier Associate</title>
		<author>
			<persName><surname>Bfa</surname></persName>
		</author>
		<ptr target="http://www.efina.org.ng/assets/manualUploads/EFInAWhat-does-the-CBNs-Cash-less-policy-mean-for-financial-inclusion-in-NigeriaMarch-2013.pdf" />
		<imprint>
			<date type="published" when="2013-02-10">2013. February 10, 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Lessons from Nigeria&apos;s Cashless Society Campaign</title>
		<author>
			<persName><forename type="first">T</forename><surname>Lemo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Keynote presentation at the AITEC Banking and Mobile Money Conference</title>
				<imprint>
			<date type="published" when="2012-03">2012. March, 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Impact of Cashless Economy in Nigeria</title>
		<author>
			<persName><forename type="first">O</forename><surname>Muyiwa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tunmibi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">T</forename><surname>John-Dewole</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Greener Journal of Internet, Information and Communication Systems</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="40" to="043" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Payments System -Introduction</title>
		<author>
			<persName><surname>Cbna</surname></persName>
		</author>
		<ptr target="https://www.cbn.gov.ng/Paymentsystem/" />
		<imprint>
			<date type="published" when="2016-07-09">July 9, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Electronic banking: Little gains, more pains</title>
		<author>
			<persName><forename type="first">C</forename><surname>Nweze</surname></persName>
		</author>
		<ptr target="http://thenationonlineng.net/new/electronicbankinglittle-gainsmorepains/" />
	</analytic>
	<monogr>
		<title level="j">The Nation Newspaper</title>
		<imprint>
			<date type="published" when="2015-05-11">2015. May 11, 2015. May 11, 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Hackers hit bank ATMs in Lagos</title>
		<author>
			<persName><forename type="first">O</forename><surname>Abioye</surname></persName>
		</author>
		<ptr target="http://www.punchng.com/business/business-economy/hackershitbankatmsinlagos/" />
	</analytic>
	<monogr>
		<title level="m">The Punch Newspaper</title>
				<imprint>
			<date type="published" when="2015-04-07">2015. April 7, 2015. April 7, 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<ptr target="http://www.itu.int/go/mis2013" />
		<title level="m">Measuring Information Society</title>
				<imprint>
			<publisher>ITU</publisher>
			<date type="published" when="2013-02-05">2013. February 5, 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<ptr target="http://wdi.worldbank.org/table/5.5" />
		<title level="m">World development indicator: financial access, stability and efficiency</title>
				<imprint>
			<publisher>World Bank</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Nigeria&apos;s National Broadband Plan 2013 -2018</title>
		<ptr target="http://www.researchictafrica.net/countries/nigeria/Nigeria_National_Broadband_Plan_2013-2018.pdf" />
	</analytic>
	<monogr>
		<title level="m">Presidential Committee on Broadband</title>
				<imprint>
			<date type="published" when="2016-07-08">July 8, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Combating Terrorism with Cyber security: the Nigerian perspective</title>
		<author>
			<persName><forename type="first">O</forename><surname>Osho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Falaye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Shafi'i</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">World journal of computer application and technology</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="103" to="109" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Internet Banking Authentication Methods in Nigeria Commercial Banks</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">B</forename><surname>Lawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ibitola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">B</forename><surname>Longe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">African Journal of computer &amp; ICT</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="208" to="215" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">PoS Adoption and Usage: A Study on Lagos State</title>
		<author>
			<persName><surname>Nibss</surname></persName>
		</author>
		<ptr target="http://www.nibss-plc.com.ng/wp-content/uploads/2015/05/NIBSS-2015-POS-Adoption-Study-Lagos-State.pdf" />
		<imprint>
			<date type="published" when="2015-07-08">2015. July 8, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<ptr target="http://www.cbn.gov.ng/cashless/POS_GUIDELINES_August2011_FINAL_FINAL%20(2).pdf" />
		<title level="m">Guidelines on Point of Sale (POS) Card Acceptance Services</title>
				<imprint>
			<publisher>CBN</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Payments System -Payment Modes in Nigeria</title>
		<author>
			<persName><surname>Cbnb</surname></persName>
		</author>
		<ptr target="https://www.cbn.gov.ng/Paymentsystem/Modes.asp" />
		<imprint>
			<date type="published" when="2016-07-09">July 9, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<ptr target="https://www.thecable.ng/cbn-nigerians-make-n1-5bn-transactions-pos-daily" />
		<title level="m">CBN: Nigerians make N1.5bn transactions on POS daily</title>
				<meeting><address><addrLine>The Cable</addrLine></address></meeting>
		<imprint>
			<publisher>News Agency</publisher>
			<date type="published" when="2015-07-09">2015. Oct. 7, 2015. July 9, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<ptr target="http://wdi.worldbank.org/table/5.5#" />
		<title level="m">World Development Indicators: Financial access, stability and efficiency</title>
				<imprint>
			<publisher>World Bank</publisher>
			<date type="published" when="2016-06-30">2016a. June 30, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<ptr target="http://wdi.worldbank.org/table/5.12#" />
		<title level="m">World Development Indicators: The Information society</title>
				<imprint>
			<publisher>World Bank</publisher>
			<date type="published" when="2016-06-30">2016b. June 30, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">User acceptance of information technology: Toward a unified view</title>
		<author>
			<persName><forename type="first">V</forename><surname>Venkatesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Morris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">B</forename><surname>Davis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">D</forename><surname>Davis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS quarterly</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="425" to="478" />
			<date type="published" when="2003-09">2003. Sept. 2003</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
