<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cybercafés in Nigeria: Curse to the Internet?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oluwafemi Osho</string-name>
          <email>1femi.osho@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Solomon A. Adepoju</string-name>
          <email>2solo.adepoju@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Cyber Security Science, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>117</fpage>
      <lpage>123</lpage>
      <abstract>
        <p>-Cybercafés have grown in popularity since their emergence. This popularity is predicated on their capacity to offer relatively cheap, immediate and convenient access to the internet. Regrettably, cybercriminals, and even terrorists, have been exploiting them to perpetrate their unwholesome activities. This study evaluates the security posture of cybercafés in Nigeria. Using a combination of survey and observation, a total of ninety nine cybercafés, covering nine states, in five of the six geopolitical zones of the country, were covered. The findings suggest that most of the cybercafés have adequate capacity to prevent unauthorized access to their network, and the exploitation of the network to remotely perpetrate cybercrimes. However, within the physical confines of most of the internet cafes, cybercrimes are and could easily be carried out, and their networks exploited for other unethical uses of the internet. Security needs to be given more attention than it currently enjoys in the management of cybercafés by managers. On the other hand, government must ensure the regulation of the activities of the sector.</p>
      </abstract>
      <kwd-group>
        <kwd>-cybercafé</kwd>
        <kwd>internet café</kwd>
        <kwd>Nigeria</kwd>
        <kwd>management</kwd>
        <kwd>security</kwd>
        <kwd>cybercrime</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        Cybercafés, also known as internet cafes, are public
places that provide commercial – paid or metered – access to
the internet [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]–[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However, it is not unlikely to see other
services including selling refreshments [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] being rendered.
This is common in advanced countries where cybercafés
offer not only internet access, but also beverages [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] or
food and other types of drinks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Depending on the
business model, types of cybercafé include traditional
internet cafés, gaming, self-serve internet cafés, standalone
internet kiosks, information and advertising-based kiosks,
and wireless hotspots [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Since the emergence of internet cafes, they have grown
in popularity. In Africa and most developing countries,
internet access is largely through cybercafés [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]–[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. A
survey by [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] reveals that for up to 25% of students in
Turkey cybercafé was the dominant place for accessing the
internet. Li, Zhang, Lu, Zhang, &amp; Wang [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] found out that
while internet café was the 2nd most commonly used place
for internet access among elementary and middle school
students in China, it was the most used among those who
were found to be internet addict. Internet cafes provide many
advantages. They offer convenient [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], immediate, and
relatively cheap access to internet. They have even been
proposed as an essential component for social security [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        However, similar to other information technology (IT)
components, cybercafés are prone to abuse. Like all
networks on the internet, their networks are exposed to
security risks. In a study by [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], 80% of cybercafé operators
identified malware, while 20% identified the users, as their
biggest threat. A cybercafé network has to contend with risks
from those within and outside the network. There are users
whose intent is to exploit the systems in the café for
unethical purposes. When appropriate security mechanisms
are not in place, the network of such cybercafé could be used
to perpetrate cybercrime, including installing a keylogger
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], spamming, fraud, hacking, to mention but few. On the
other hand, there are malicious internet users, outside the
network of the café, who intrude into vulnerable networks.
There are many potential attacks that could be launched. One
of these is remotely infecting vulnerable systems with
malware that automatically adds them to a botnet operated
by the attacker. The bots are used for criminal activities.
Even terrorists use cybercafés [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The internet has become
indispensable to terrorists for planning and coordinating their
attacks [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Internet café offers a platform for the terrorist to
veil their identities.
      </p>
      <p>
        Apart from users who have malicious intents for using
the café, another category of user that needs proper
monitoring is children. Online attacks that target children are
continually on the increase. Cybercafés have been
discovered to be locations for different adolescent crimes [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
and social excesses [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        Most internet café users have little or no knowledge of
the security risks they are exposed to and how to mitigate the
risks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. It therefore lies on the managers of the cybercafés
to provide adequate security. To achieve the needed security,
there are requirements that must be provided. Some of these
include surveillance/security system, legal software [17],
firewalls, antivirus software, making regular backup of data,
and up-to-date updating of applications [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        However, studies have shown that security is often not
given due attention. Cybercafés engage staff who are
unskilled, with little or no IT knowledge [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ], [
        <xref ref-type="bibr" rid="ref18">19</xref>
        ].While
many of the cafes have anti-malware applications, few
regularly update them [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. And in most cybercafés,
articulated policies guiding activities of users are often not
available [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In cases where there are they are often not
comprehensive [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
In Nigeria, internet cafes have contributed tremendously
to digital inclusion. Since the deregulation of the
telecommunication sector in 1999 [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ], and the introduction
of the Global System for Mobile (GSM) communication
services in 2001 [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ], [
        <xref ref-type="bibr" rid="ref21">22</xref>
        ], the adoption rate of mobile
technology in the country has proliferated. This,
unfortunately, has resulted in cybercafés losing their place as
the primary platform used for accessing the internet. One of
the effects is the demise of many of these cybercafés in the
country [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ]. This sharp drop in number and patronage
notwithstanding, because not all users can afford internet
access through mobile and other personal devices, existing
and functioning cybercafés have continued to enjoy some
measure of patronage. As is the case in other parts of the
world, they are used for their traditional purposes of
researching, sending and accessing emails, communicating,
job search and application, to mention but few. In some
academic environments cybercafés are the primary
instrument for accessing the internet [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ], [
        <xref ref-type="bibr" rid="ref23">24</xref>
        ].
      </p>
      <p>
        Regrettably, while internet cafes have improved the
adoption of IT in the country, they have also helped to
multiply its abuses. Teenagers use cybercafés as havens for
accessing pornographic materials, scammers utilize them for
their criminal activities, sending out scam emails [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ]–[
        <xref ref-type="bibr" rid="ref26">27</xref>
        ].
Many cybercafés have been sealed off by security agencies
due to the perpetration of cybercrimes using the café network
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. And in some cases, the activities of criminal have led to
their outright shutting down [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ].
      </p>
      <p>In the light of the foregoing realities, we pose some
critical questions: Do internet cafes in Nigeria have the
capacity to prevent unauthorized access to their network? Do
they have the capacity to prevent their systems from being
used locally or remotely to perpetrate cybercrimes? Are they
likely locations for other unethical uses of the internet? This
paper investigates management of cybercafés in Nigeria,
with emphasis on security.</p>
      <p>This study is significant in at least two ways. First, it
exposes the security state of internet cafes in Nigeria. While
there are laws that tend to relate indirectly to different
activities that are associated with cybercafés in Nigeria, there
are currently no known comprehensive guidelines on the
establishment and operations of cybercafé. This study,
secondly, would assist relevant policy and regulatory
agencies of government in the development of regulatory
framework for the operations and management of cybercafés
in Nigeria.</p>
      <p>The rest of the paper is sectionalized as follows: section
two presents a summary of studies related to internet cafes.
In section three, the methodology adopted is described. The
findings are presented in section four. Subsequently, these
findings are discussed is section five. The limitations of the
study are highlighted and suggestions for further works
given in section six. Lastly, in section seven, the study is
concluded, and some recommendations suggested.</p>
      <p>II.</p>
      <p>RELATED WORKS</p>
      <p>Many literatures have focused on different aspects of
internet café, including their management, use, effect of
usage, and security.</p>
      <p>
        On the management of cybercafés, [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] concentrated on
the management of infrastructures, [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] on operational issues,
controversies, and challenges, while discussion of
management software was the focus of [
        <xref ref-type="bibr" rid="ref27">28</xref>
        ], [
        <xref ref-type="bibr" rid="ref28">29</xref>
        ].The
objectives of other studies in the domain of cybercafé
management include management of e-waste by cybercafés
[
        <xref ref-type="bibr" rid="ref29">30</xref>
        ], factors that affect provision of quality services [
        <xref ref-type="bibr" rid="ref30">31</xref>
        ],
evaluation of technical efficiency of internet access methods
used in the cafes [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ], and identification of factors
responsible for closure of cybercafés [
        <xref ref-type="bibr" rid="ref32">33</xref>
        ].
      </p>
      <p>
        Studies on cybercafé usage majorly center on rate,
purposes and effects of, and factors that affect use. Very few
of the studies have explored internet café usage effects. One
of these is the work of [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] which investigated the effect of
usage on cigarette smoking and alcohol use among Chinese
adolescents and youth. Another, by [
        <xref ref-type="bibr" rid="ref33">34</xref>
        ], entails a survey on
the consequences of internet café usage on students’ social
capital. And in [
        <xref ref-type="bibr" rid="ref34">35</xref>
        ], the effects of playing computer games
in internet cafes on the flow experiences of adolescents was
investigated.
      </p>
      <p>
        On the other hand, studies on rate and purposes of usage
have considered different countries. These include China
[
        <xref ref-type="bibr" rid="ref35">36</xref>
        ], Indonesia [
        <xref ref-type="bibr" rid="ref36">37</xref>
        ], Malaysia [
        <xref ref-type="bibr" rid="ref37">38</xref>
        ], Nigeria [
        <xref ref-type="bibr" rid="ref38">39</xref>
        ], [
        <xref ref-type="bibr" rid="ref39">40</xref>
        ],
Pakistan [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], Philippines [
        <xref ref-type="bibr" rid="ref40">41</xref>
        ], Tanzania [
        <xref ref-type="bibr" rid="ref41">42</xref>
        ], Tanzania and
Indonesia [
        <xref ref-type="bibr" rid="ref42">43</xref>
        ], and Turkey [
        <xref ref-type="bibr" rid="ref43">44</xref>
        ]. On factors that affect use,
[
        <xref ref-type="bibr" rid="ref44">45</xref>
        ] proposed a framework with perceived trust as
antecedent of internet café continuance intention.
      </p>
      <p>
        The issue of security of internet cafes is very crucial to
their survival. It is therefore not surprising that this area has
attracted the attention of some authors. Specifically, some of
the studies discussed security issues related to cybercafé use
and operation, highlighting sources and types of security
risks, and proffering countermeasures [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].The focus of
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] was the development of cybercafé security policy in
Nigeria. This, the author argued, can enhance social security.
Consequently, it was recommended that such policy should
be integrated into the National Information Policy. Another
similar study by [
        <xref ref-type="bibr" rid="ref45">46</xref>
        ] centered on the development of
regulation of internet cafes in China. However, one study
[
        <xref ref-type="bibr" rid="ref46">47</xref>
        ] departed from the traditional notion of the security of
cybercafé being solely dependent on technological
infrastructure. They proposed security measures that, in
addition to technological mechanism, are also based on
social and soft components of management. Other aspects of
security explored in different literatures include malware
detection and prevention [
        <xref ref-type="bibr" rid="ref47">48</xref>
        ], [
        <xref ref-type="bibr" rid="ref48">49</xref>
        ], security evaluation [
        <xref ref-type="bibr" rid="ref49">50</xref>
        ],
cybercafés and cybercrimes [
        <xref ref-type="bibr" rid="ref18">19</xref>
        ], [
        <xref ref-type="bibr" rid="ref50">51</xref>
        ]–[
        <xref ref-type="bibr" rid="ref53">54</xref>
        ], and cybercafé
and terrorism [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        As far as research related to cybercafé is concerned
security has not been given due attention [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Very few
studies have centered on the state of security in internet cafes
using empirical data. One of these is the study by [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ]. The
authors investigated physical and security issues faced by
managers of cybercafés in Ibadan, and measures to tackle the
challenges. They however recommended similar research
across the country.
      </p>
      <p>Our study examines security measures provided by
internet café managers to prevent unauthorized access to
their network, mitigate perpetration of cybercrimes via and
other unethical uses of their networks.</p>
    </sec>
    <sec id="sec-2">
      <title>METHODOLOGY To achieve the aim of this study, descriptive research was adopted. Two methods were employed to collate data: survey and observation. To collect data that were considerably</title>
      <p>representative of the country, the stratified random sampling
method was used. Nigeria is composed of geopolitical zones,
with each composed of states which are essentially
homogeneous. Consequently, this formed the basis for
stratification. For each stratum, random samples were
selected from at least one of the component states. The
objective was to cover at least a state in each of the six
geopolitical zones of the country. A total of ninety nine
internet cafes, located in nine states, in five of the zones
(with the exception of North East) were covered in the
survey. The survey was conducted within 2013 and 2014.
Table I presents the composition of cybercafés by state and
zone.</p>
      <p>The survey questions were administered through
questionnaires. Observation was used to ascertain the
correctness of the data supplied by the managers/operators.
The questionnaire sought information on the number of
systems used for browsing and café attendant, availability of
wireless access technology, those permitted to use the
cybercafé, availability of introductory class for novice users,
permissions, security measures, and managers’ observations
and experiences. The ninety nine questionnaires were
returned, found to be valid, and thus used for analysis. To
identify relationships among variables, we performed some
statistical tests, including chi-square, t-test, Fisher’s exact
test, and Pearson’s correlations. All tests were conducted at
95% confidence interval.</p>
      <p>IV.</p>
      <p>ANALYSIS</p>
      <p>The findings, presented in Table II, revealed that
majority of the cybercafés, 61.6% operate with no more than
10 computers. Only 13.1% have above 15 systems. Most of
the cybercafés (71.7%) did not have more than 3 café
attendants. A positive linear correlation was found to exist
between number of systems used for browsing and café
attendants ( = 0.426,  &lt; 0.001). This, expectedly, implies
that the higher the number of browse-able systems the more
the number of café attendants employed by the owners.</p>
      <p>Other characteristics considered in the study revealed that
97.0% of the internet cafes surveyed allow any individual to
access the internet using their network, regardless of age;
62.6% provide access via wireless, in addition to wired,
technology; and about half of the cybercafés, 50.5%, offer
introductory classes for novice users who need assistance in
using the internet. The results are presented in Table III. The
practice of offering this class to novice users was
significantly dependent on the number of café attendants (
= 0.015). On average, 39.96% of internet cafes with a
maximum of 3 attendants offered introductory classes for
novice users. Conversely, among those with a minimum of 4
operators, an average of 77.93% offered introductory classes.</p>
      <sec id="sec-2-1">
        <title>A. Permissions</title>
        <p>Table III also reveals the some basic activities a customer
is permitted by managers to undertake in the cybercafé.
78.8% of the cafes permit saving on their computer memory,
79.8% allowed customers to use their personal external
memory drive to save. Most of the cafes equally permit the
use of their systems to make payment online (87.9%) and
download from the internet (86.9%).</p>
        <p>Perhaps, to mitigate downloading of malicious and illegal
software documents, more than half, precisely 51.2%, of the
cafés that allow downloading required customers to obtain
authorization before actually downloading.</p>
        <p>In order to secure their networks and systems cybercafé
managers provide security measures. From Table III, other
findings revealed that more than three-quarter of (76.8%)
and almost all the cafes (97.0%) provide firewall and
antivirus software respectively. However, many of them do
not provide regulatory policy and measures to monitor power
users. Specifically, only slightly more than half of the cafes
have policy displayed to regulate the activities of their
customers (53.5%) and have developed measures to monitor
customers with expert knowledge in the use of the internet
(58.6%).</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Security Measures</title>
        <p>Providing regulatory policy to curtail user activities was
found to significantly influence putting measures to monitor
power users ( 2(1) = 6.127,  = 0.013). Those who had
regulatory policy in place were found to be less interested in
monitoring power users. While 71.7% of internet cafes
without regulatory policy had measures to monitor users in
place, only 47.2% of those with policy did have measures.
Only about one-quarter (25.3%) of the cafes provide both
policy and measures. And far fewer cafés, 11.1% ( 2(1) =
12.01,  = 0.001), provide both in addition to offering
introductory classes for novice users.</p>
        <p>More crucial are the availability of regulatory policy and
monitoring measures to internet cafes that permit customers
to use the cafe network to make online payments, download,
and store on system’s memory and their memory drive. Less
than one-quarter, 24.1%, of cafes which allowed their
network to be used for online payment provided both
regulatory policy and measures to monitor power users
(  2(1) = 6.656,  = 0.010 ). Among the cafes that
allowed customers to save on the café system memory and
their personal memory devices, only 24.4% and 22.8%
( 2(1) = 8.711,  = 0.003) respectively provided both.
And for internet cafes which expectedly permitted
downloading via their networks, only 22.1% provide both
policy and measures ( 2(1) = 5.883,  = 0.015).</p>
        <p>Cybercafés naturally are expected to make use of
passwords to manage access to the internet via their network.
However, the associated security issues lie with the strength
of the password. From our survey, depicted in Table IV,
there are internet cafes that actually do not use passwords.
1.0% of the cafes fell into category. In contrast, 40.4% use
passwords but less than 8 characters long, while the rest
reported they used passwords with length more than 8.
Fisher’s exact test revealed an evidence of relationship
between cafés using wireless LAN and length of password
( = 0.006). Only 30.6% of internet cafes using both wired
and wireless technology for providing internet access either
did not provide password mechanism for accessing their
systems or used passwords that are less than 8 characters.</p>
      </sec>
      <sec id="sec-2-3">
        <title>C. Managers’ Observations and Experiences</title>
        <p>From Table III, 80.8% of the cybercafés had had to
format their systems at least once in the last one year. Almost
half of the population, precisely 48.7%, as presented in Table
V, had formatted either twice or thrice. Providing wireless
technology for accessing the internet significantly influenced
the likelihood of formatting systems ( 2(1) = 4.230,  =
0.04). Findings revealed that while 70.3% of internet cafes
that provided internet access via wired network only
formatted their systems in the last one year, 87.1% of those
with wireless network, in addition to wired network, have
formatted theirs.</p>
        <p>In most of the cybercafés (76.8%), there have been
instances where a customer was noticed to always prefer the
use of a particular system. On administrative settings being
changed by customers, more than half (52.5%) of the cafés
confessed they had experience that. The study found
significant evidence of association between customer who
loves using a particular system and administrative setting
being tampered (  2(1) = 8.398,  = 0.004 ). The
occurrence of a customer being noticed to prefer the use of a
particular system increased the likelihood of administrative
settings of systems being tampered with. Specifically, 60.5%
of cybercafés that reported noticing a customer who loved
using particular system, compared with only 26.1% among
those who did not notice any, had experienced their
administrative settings being changed.</p>
        <p>This study sought to evaluate the security state of internet
cafes in Nigeria. Results of keen observation and extensive
survey of ninety-nine internet cafes located in five of the six
geopolitical zones of the country revealed that most internet
cafes in Nigeria are small enterprises, open to everyone,
deploy both wired and wireless network for accessing the
internet, and provide introductory class for novice users.</p>
        <p>The decision by managers of internet cafes to open their
businesses to all categories of users for accessing the internet
is evidently geared towards expanding their customer base,
which in turn can be expected to improve patronage.
However, this poses some inherent risks. One of these is that
children can easily take advantage of it. If not properly
monitored, many of them might exploit the cafes for
purposes unapproved of by their parents.</p>
        <p>Offering introductory classes for rookie internet users by
most managers of internet cafes is commendable. Novice
users often lack the requisite knowledge to use computer
systems appropriately. They can subject systems to physical
abuse, unauthorized adjustment of setting. Thus, having
introductory classes can be seen as a proactive measure to
forestall possible misuse. It can also be considered a
marketing strategy capable of attracting new customers, as
well as a measure to attract customer loyalty. Nevertheless,
providing necessary capacity for conducting introductory
class for this category of users would require increased cost
of management of the cybercafés. One of the findings of the
study confirmed this fact. On average, most cafes offering
introductory classes tend to have higher number of café
attendants, when compared with those which did not.</p>
        <p>Most internet cafes in Nigeria considerably seem capable
of preventing unauthorized access to their network. Hackers
located within a certain range of a cybercafé could gain
internet access through the café’s network without
authorization if the wireless network is not properly secured.
One defence mechanism is to deploy a firewall. Hackers will
often exploit weak defence system and weak passwords,
amongst other things, to penetrate network systems. Our
findings revealed that the availability of firewall in most of
the cafes. Also, most of the internet cafes using both wired
and wireless technology for providing internet access
implemented passwords that were more than 8 characters.</p>
        <p>Regarding the capacity of internet cafes to prevent their
networks from being used to perpetrate cybercrimes, the
study suggest that while most cafes can avert cybercriminals
from using their system remotely, only very few have put
necessary mechanisms in place to prevent perpetration of
cybercrimes by a criminal within the physical confines of the
internet cafe. To commit crime via a cafe network remotely,
the café must be operating, either partially or completely, on
a wireless network, and a cyber criminal would need to gain
access remotely to the network. The capacity to prevent this
by most cafes has already been identified in the study.</p>
        <p>However, on the issue of cybercrime being perpetrated
locally, the study finds significant evidence to suggest that in
most of the internet cafes in Nigeria cybercrimes are and
could easily be carried out. In most of the cafes,
administrative settings on computer systems had been
altered. It was more common among cafes where some
customers accessed the internet using particular systems.
This raises the question of what could be special about the
preferred system. It is possible that a customer might have
developed a preference for a particular system due to the
functionality it provides. This is because, in many
cybercafés, it is common to find one or more components on
most of the computer systems not functioning properly.
From observation, many of the cafés often buy used and
lowgraded computer monitor and peripherals. A second factor is
the position within the café where the preferred system is
located. The physical space occupied by some cafés are so
inadequate that a customer, for instance, may have to sit so
close to the entrance/exit, and consequently have to endure
brushings by those coming into or going out of the café. Any
customer would therefore prefer systems located in positions
that offer the least inconvenience, Notwithstanding, it is not
impossible that the reason a customer would insist on using
only a particular computer in the internet cafe is simply for
illegal activities that constitute cybercrime. Cybercriminals
would tweak the settings on computer systems in the cafe to
permit certain tools to facilitate their criminal intentions. To
minimize such occurrence, as basic, irreducible
requirements, policy regulating users’ activities and
measures to monitor some categories of users are crucial.
One of the most common cybercrimes in Nigeria is the
advance fee fraud. One form of this crime is geared towards
stealing or cloning online transaction cards. Cybercriminals
purchase and pay for goods online using these cards. The
implication of this is that a cybercafé which permit their
network to be used for making online payments without
measures to monitor power users is prone to becoming a
platform through which this kind of criminal activities would
be performed. Equally vulnerable are those without
regulatory policies. Unfortunately, most of the cafes that had
regulatory policy in place were less interested in monitoring
power users. Findings also revealed that most of those that
allowed online payments via their network did not provide
both regulatory policy and monitoring measures.</p>
        <p>There are other unethical uses of the internet. These
include viewing, downloading, uploading, and spreading of
illegal contents and software, including pornographic
materials, and malware. There are basic functions a customer
typically would expect the systems and network of an
internet café to provide. A cybercafé that does not allow
customers to save their documents, download, or, use their
platform to make online payments would displease many
customers. For instance, how would a customer (or tourist)
book a hotel if he cannot conduct payments? No doubt, these
activities, in most cases, are fundamental to other activities
performed in the café. However, they also pose some
potential threats. Being able to use memory drives and
download without restraint can aid accessing, uploading and
spreading of illegal contents and software. Permitting a
malicious customer to save on the hard disk of the system
being used potentially makes the system, if proper security
measures are not put in place, vulnerable to, for example, be
used to store malicious programs. Being able to use external
drives on systems in cybercafés exposes the entire network
of the café to serious risks like malware attack. Other
malicious software can be easily transmitted via these drives.
Regrettably, our findings suggest that most of the internet
cafes in Nigeria are potential locations for other unethical
uses of the internet. Most of the internet cafes had had to
format their systems within a space of one year, despite their
use of antimalware. The percentage was higher for cafes that
used wireless technology partially or fully. In each case, less
than a quarter of the cafes which permitted customers to save
on the cafe systems, their personal systems, and download,
provided both regulatory policy and measures to monitor
power users.</p>
        <p>
          Our study corroborates previous findings, including [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ],
[
          <xref ref-type="bibr" rid="ref25">26</xref>
          ], [
          <xref ref-type="bibr" rid="ref24">25</xref>
          ], that have identified cybercafés as locations for
perpetration of cybercrimes and other unethical internet uses.
It also agrees with [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] who identified users as one of the
biggest threats faced by cybercafé operators.
        </p>
        <p>VI.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>LIMITATIONS AND FUTURE STUDIES</title>
      <p>Our study relied primarily on self-reported data. It is thus
subject to the validity of the measures. Secondly, we cannot
confidently generalize the findings as outrightly
representative of the entire country, since the six geopolitical
zones were not covered. Future studies could consider a
more representative approach.</p>
      <p>It can be expected that the security posture of internet
cafes would differ in the different states/zones. For instance,
in Nigeria, while some states/zones are predominantly urban,
others are rural. This dichotomy, and other factors, could
influence the prevalence of cybercrimes, and consequently
the level of security risk internet cafes in those states/zones.
A comparative security evaluation of cybercafés by
state/zones can be investigated.
Our current study does not evaluate child online safety in
the internet cafe. Considering the increasing online attacks
specifically aimed at young internet users, more empirical
studies that assess their security while online in different
access locations, including internet cafes, are required.</p>
      <p>Much attention has not been given by researchers to
regulation of internet cafes, especially in Nigeria. This is
another critical aspect that requires urgent attention.</p>
      <p>VII.</p>
    </sec>
    <sec id="sec-4">
      <title>CONCLUSION AND RECOMMENDATIONS</title>
      <p>Activities of cybercriminals have been and remain
detrimental to the survival of internet cafes in Nigeria.
Unfortunately, while many of the cafes possess the capacity
to prevent unauthorized access to their network, and forestall
their networks from being used remotely to perpetrate
cybercrimes, in many of them, cybercriminals engage in
criminal activities, and other unethical internet activities take
place with relative ease.</p>
      <p>The findings of this study underscore the need for
necessary interventions by relevant stakeholders, including
managers of cybercafés and the government. Internet cafe
managers need to be more proactive in their management.
From a business perspective, this is essential for their
survival. They need to put in place necessary security
mechanisms to safeguard their networks from being
exploited for unethical purposes. Deploying basic security
tools and mechanisms, including firewalls, antivirus, and
ensuring effective monitoring, whilst not violating
customers’ privacy, can go a long way to ensuring the
nation’s cybercafés are not comfort zones for hackers,
spammers, and other cyber offenders. On the other hand,
government needs to devote more interest in cybercafé
operations in the country. As is obtainable in most sectors of
the country, there is need for regulation of their activities.</p>
    </sec>
    <sec id="sec-5">
      <title>ACKNOWLEDGEMENT</title>
      <p>We wish to acknowledge the following individuals who
served as research assistants, assisting with collection of the
survey data: Andrew Eyo, Christopher I. Onuoha, Eliab S.
Ilemobayo, Godwin Abenege, Joel N. Ugwu, Sefiyat O.
Ohida, and Temidayo H. Ajisola
[17] CCAOI, “Guide for Cyber Café , CSC and eCommerce Service</p>
      <p>Retailer.”</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O. B.</given-names>
            <surname>Adogbeji</surname>
          </string-name>
          , “Computer Security in Cybercafes,” in Security and Software for Cybercafes, E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Mohammed</surname>
          </string-name>
          , “Cybercafe Systems Security,” in Security and Software for Cybercafes, E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R. C.</given-names>
            <surname>Hendrix</surname>
          </string-name>
          , “
          <article-title>A guide to starting an Internet Cafe Business</article-title>
          ,”
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Sodiq</surname>
          </string-name>
          , “
          <article-title>Assessment of the Management of Information and Communication Technology (ICT) Infrastructure of Selected Cybercafes in Lagos State,”</article-title>
          <source>in Journal of Educational and Social Research</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>9</issue>
          ,
          <issue>2012</issue>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>188</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Rangaswamy</surname>
          </string-name>
          , “
          <article-title>Telecenters and Internet cafés: the case of ICTs in small businesses,”</article-title>
          <source>Asian J. Commun.</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>365</fpage>
          -
          <lpage>378</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Mutula</surname>
          </string-name>
          , “
          <article-title>Cyber Security of Children: Implications for SubSaharan Africa,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H. O. C.</given-names>
            <surname>Otokunefor and H. K. Kari</surname>
          </string-name>
          , “Issues, Controversies, and Problems of Cybercafés Located in a University Campus,” in Security and Software for Cybercafes, E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>62</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. C. A.</given-names>
            <surname>Utulu</surname>
          </string-name>
          , “
          <article-title>Enhancing Social Security through Appropriate Cybercafé Security Policy in Nigeria,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>30</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Bola</surname>
          </string-name>
          and
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Ogunlade</surname>
          </string-name>
          , “Accessibility and Utilization of Internet Service by Graduate Students in University of Lagos, Nigeria,”
          <source>Eur. Res.</source>
          , vol.
          <volume>25</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>1092</fpage>
          -
          <lpage>1098</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Batool</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Mahmood</surname>
          </string-name>
          , “
          <article-title>Entertainment, communication or academic use? A survey of Internet cafe users in Lahore</article-title>
          , Pakistan,” Inf. Dev., vol.
          <volume>26</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>141</fpage>
          -
          <lpage>147</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. L.</given-names>
            <surname>Gencer</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Koc</surname>
          </string-name>
          , “
          <article-title>Internet Abuse among Teenagers and Its Relations to Internet Usage Patterns</article-title>
          and Demographics,” Educ.
          <source>Technol. Soc.</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>36</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “
          <article-title>Internet addiction among elementary and middle school students in China: a nationally representative sample study</article-title>
          ,
          <source>” Cyberpsychol Behav Soc Netw</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>116</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>C.</given-names>
            <surname>Herley</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Florencio</surname>
          </string-name>
          , “
          <article-title>How to login from an Internet café without worrying about keyloggers</article-title>
          ,
          <source>” in 2nd Symposium. on Usable Privacy and Security (SOUPS)</source>
          ,
          <source>July 12-14</source>
          , Cornegie Melon University,
          <year>2006</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>E. E.</given-names>
            <surname>Adomi</surname>
          </string-name>
          and
          <string-name>
            <given-names>W. P.</given-names>
            <surname>Akpochafo</surname>
          </string-name>
          , “
          <article-title>Cybercafés and Prevention of Terrorist Activities,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>270</fpage>
          -
          <lpage>282</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Oluwafemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Adesuyi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Abdulhamid</surname>
          </string-name>
          , “
          <article-title>Combating Terrorism with Cybersecurity : The Nigerian Perspective</article-title>
          ,” vol.
          <volume>1</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>103</fpage>
          -
          <lpage>109</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Wu</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Delva</surname>
          </string-name>
          , “
          <article-title>The effect of computer usage in internet cafe on cigarette smoking and alcohol use among Chinese adolescents and youth: A longitudinal study</article-title>
          ,
          <source>” Int. J. Environ. Res. Public Health</source>
          , vol.
          <volume>9</volume>
          , pp.
          <fpage>496</fpage>
          -
          <lpage>510</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Oyelude</surname>
          </string-name>
          and
          <string-name>
            <given-names>C. O. B.</given-names>
            <surname>Adewumi</surname>
          </string-name>
          , “
          <article-title>Cybercafé Physical and Electronic Security Issues,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>84</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Tiemo</surname>
          </string-name>
          and
          <string-name>
            <given-names>C. U.</given-names>
            <surname>Charles-Iyoha</surname>
          </string-name>
          ,
          <article-title>“Cybercafés and Cyber Crime in Nigeria,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>295</fpage>
          -
          <lpage>306</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>F. C.</given-names>
            <surname>Chidozie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. P.</given-names>
            <surname>Odunayo</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Olutosin</surname>
          </string-name>
          , “
          <article-title>Deregulation of the Nigerian Telecommunication Sector : Interrogating the Nexus Between Imperialism and Development,”</article-title>
          <string-name>
            <given-names>Acad. J.</given-names>
            <surname>Interdiscip</surname>
          </string-name>
          . Stud., vol.
          <volume>4</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>173</fpage>
          -
          <lpage>184</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21] NCC, “
          <source>The Nation ( 2nd November</source>
          ,
          <year>2011</year>
          )
          <article-title>­ What makes telecom business tick ?”</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Mamah</surname>
          </string-name>
          , “
          <article-title>The Prospects and Problems of Deregulation of the Nigerian Economy</article-title>
          ,” University of Nigeria, Nsukka,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>P.</given-names>
            <surname>Udende</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Azeez</surname>
          </string-name>
          , “
          <article-title>Internet access and use among students of the University of Ilorin , Nigeria,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Commun</surname>
          </string-name>
          .
          <source>Media Res.</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>42</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>F.</given-names>
            <surname>Osang</surname>
          </string-name>
          , “
          <article-title>Internet Access in Nigeria: Perception of National Open University of Nigeria (Noun) Students,”</article-title>
          <string-name>
            <surname>Int. J. Emerg. Technol. Adv. Eng.</surname>
          </string-name>
          , vol.
          <volume>2</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>492</fpage>
          -
          <lpage>497</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ifedigbo</surname>
          </string-name>
          , “Tribute to the Cyber Café,” Daily Times, pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Chawki</surname>
          </string-name>
          , “Nigeria Tackles Advance Fee Fraud,
          <string-name>
            <given-names>” J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Law Technol.,
          <source>no. 1</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>H.</given-names>
            <surname>Chiroma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abdulhamid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Muhammad</given-names>
            <surname>Usman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Umar</surname>
          </string-name>
          <string-name>
            <surname>Maigari</surname>
          </string-name>
          , “
          <article-title>Academic Community Cyber Cafés -A Perpetration Point for Cyber Crimes in Nigeria,”</article-title>
          <source>Inf. Sci. Comput</source>
          . Eng., vol.
          <volume>2</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Obuh</surname>
          </string-name>
          , “Cybercafé Management Software,” in Security and Software for Cybercafes, E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>113</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <string-name>
            <surname>A. I. Ajewole</surname>
          </string-name>
          , “
          <article-title>Software Requirements for Cybercafés,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Mwathi</surname>
          </string-name>
          , “
          <article-title>Factors influencing effective management of electronic waste: A case study of Cybercafes in Nairabi Central Business District</article-title>
          , Kenya,”
          <source>Project Planning and Management of the University of Nairobi</source>
          <year>2014</year>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <surname>M. M. Marwa</surname>
          </string-name>
          , “
          <article-title>Technology Barriers to Quality of Service Offered by Cyber Cafes: A Case Study of Cyber Cafes in the Nairobi CBD</article-title>
          ,” United States International University,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Magaji</surname>
          </string-name>
          and
          <string-name>
            <surname>C. I. Eke</surname>
          </string-name>
          , “
          <article-title>Measuring Technical Efficiency of Wireless and Wired Technologies in Nigeria Cyber Cafés</article-title>
          ,” vol.
          <volume>4</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>34</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>O. B.</given-names>
            <surname>Adogbeji</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Mabi</surname>
          </string-name>
          , “
          <article-title>Cybercafes operations and its incessant closure in Delta State</article-title>
          , Nigeria,
          <string-name>
            <given-names>” J. Internet</given-names>
            <surname>Inf</surname>
          </string-name>
          . Syst., vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M.</given-names>
            <surname>Koç</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Ferneding</surname>
          </string-name>
          , “
          <article-title>The Consequences of Internet Café Use on Turkish College Students ' Social Capital,” Turkish Online J</article-title>
          .
          <string-name>
            <surname>Educ</surname>
          </string-name>
          . Technol., vol.
          <volume>6</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>88</fpage>
          -
          <lpage>97</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kara</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Cagiltay</surname>
          </string-name>
          , “
          <article-title>Flow Experiences of Adolescents in Terms of Internet Café Environment</article-title>
          and Computer Game Play Characteristics,
          <source>” Procedia - Soc. Behav. Sci.</source>
          , vol.
          <volume>89</volume>
          , pp.
          <fpage>298</fpage>
          -
          <lpage>307</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>W.</given-names>
            <surname>Shang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Arogundade</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Jiang</surname>
          </string-name>
          , “
          <article-title>Understanding Cybercafés Users behavior in Mainland China : An Exploratory Study</article-title>
          ,”
          <source>in Proceedings of IPID Postgraduate Strand at ICTD</source>
          <year>2010</year>
          ,
          <year>2010</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>B.</given-names>
            <surname>Furuholt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kristiansen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wahid</surname>
          </string-name>
          , “
          <article-title>Information Dissemination in a Developing Society: Internet Cafe Users in Indonesia,”</article-title>
          <string-name>
            <given-names>Electron. J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Syst. Dev. Ctries., vol.
          <volume>22</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Abdullah</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Ahsan</surname>
          </string-name>
          , “
          <article-title>Cyber Café Usage in Malaysia : An Exploratory Study,”</article-title>
          <string-name>
            <given-names>J. Internet</given-names>
            <surname>Bank</surname>
          </string-name>
          . Commer., vol.
          <volume>14</volume>
          , no.
          <issue>1-13</issue>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Abdulkareem</surname>
          </string-name>
          , “
          <article-title>Characteristics and information-seeking behaviour of cybercafé users in some Nigerian cities,”</article-title>
          <string-name>
            <given-names>Int. J.</given-names>
            <surname>Libr</surname>
          </string-name>
          . Inf. Sci., vol.
          <volume>2</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>95</fpage>
          -
          <lpage>101</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>E. E.</given-names>
            <surname>Adomi</surname>
          </string-name>
          , “Overnight Internet Browsing Among Cybercafe Users in Abraka , Nigeria,” J.
          <source>Community Informatics</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Bringula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bonifacio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Natanauan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Manuel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Panganiban</surname>
          </string-name>
          , “
          <article-title>Pattern of Internet Usage in Cyber Cafés in Manila: an Exploratory Study,”</article-title>
          <source>Int. J. cyber Soc. Educ.</source>
          , vol.
          <volume>5</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>163</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Sife</surname>
          </string-name>
          , “
          <article-title>Internet use behaviour of cybercaf?? users in Morogoro Municipality</article-title>
          , Tanzania,” Ann. Libr. Inf. Stud., vol.
          <volume>60</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>50</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>B.</given-names>
            <surname>Furuholt</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kristiansen</surname>
          </string-name>
          , “
          <article-title>Internet cafés in Asia and Africa - Venues for education and learning?</article-title>
          <source>,” J. Community Informatics</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gurol</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Sevindik</surname>
          </string-name>
          , “Profile of Internet Cafe users in Turkey,” Telemat. Informatics, vol.
          <volume>24</volume>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>68</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lawan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. S.</given-names>
            <surname>Galadanci</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Abdallah</surname>
          </string-name>
          , “
          <article-title>A Modified Expectation Confirmation Theory with Perceived Trust on Internet Cafes Use Continuance: A Conceptual Framework</article-title>
          ,” in
          <source>IT4InDev</source>
          <year>2015</year>
          ,
          <year>2015</year>
          , pp.
          <fpage>134</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Qiu</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liuning</surname>
          </string-name>
          , “
          <article-title>Through the Prism of the Internet Cafe: Managing Access in an Ecology of Games,” China Inf</article-title>
          ., vol.
          <volume>19</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>261</fpage>
          -
          <lpage>297</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>D.</given-names>
            <surname>Onojaefe</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Leaning</surname>
          </string-name>
          , “Managing Cybercafés:
          <article-title>Achieving Mutual Benefit through Partnership,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>95</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [48] [48]
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Obuh</surname>
          </string-name>
          , “
          <article-title>Viruses and Virus Protection in Cybercafés,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>170</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Garuba</surname>
          </string-name>
          , “Computer Virus Phenomena in Cybercafé,” in Security and Software for Cybercafes, E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>186</fpage>
          -
          <lpage>204</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Paul</surname>
          </string-name>
          and C. Zhang, “Evaluate Security on the Internet-Cafe,”
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dina</surname>
          </string-name>
          , “
          <article-title>Cyber Laws and Cybercafés: Analysis of Operational Legislation in some Commonwealth Jurisdictions and the United States,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>221</fpage>
          -
          <lpage>238</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>O. T.</given-names>
            <surname>Emiri</surname>
          </string-name>
          , “
          <article-title>Prevention of Cyber Crime in Cybercafés,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>239</fpage>
          -
          <lpage>252</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rauniar</surname>
          </string-name>
          , “Cybercafés of Nepal: Passage to Cyber Crime?,” in Security and Software for Cybercafes, E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>253</fpage>
          -
          <lpage>269</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Igun</surname>
          </string-name>
          , “
          <article-title>Cyber Crime Control in Developing Countries' Cybercafés,” in Security and Software for Cybercafes</article-title>
          , E. E. Adomi, Ed.
          <source>Hershey PA: IGI Global</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>283</fpage>
          -
          <lpage>294</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>