=Paper= {{Paper |id=Vol-1830/Paper84 |storemode=property |title=Cybercafés in Nigeria: Curse to the Internet? |pdfUrl=https://ceur-ws.org/Vol-1830/Paper84.pdf |volume=Vol-1830 |authors=Oluwafemi Osho,Solomon A. Adepoju }} ==Cybercafés in Nigeria: Curse to the Internet?== https://ceur-ws.org/Vol-1830/Paper84.pdf
                      International Conference on Information and Communication Technology and Its Applications
                                                             (ICTA 2016)
                                                      Federal University of Technology, Minna, Nigeria
                                                                     November 28 – 30, 2016




                               Cybercafés in Nigeria: Curse to the Internet?


                                         Oluwafemi Osho1 and Solomon A. Adepoju2
                  1
                   Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
                    2
                     Department of Computer Science, Federal University of Technology, Minna, Nigeria
                                      {1femi.osho, 2solo.adepoju}@futminna.edu.ng

Abstract—Cybercafés have grown in popularity since their                   relatively cheap access to internet. They have even been
emergence. This popularity is predicated on their capacity to              proposed as an essential component for social security [8].
offer relatively cheap, immediate and convenient access to the                 However, similar to other information technology (IT)
internet. Regrettably, cybercriminals, and even terrorists, have           components, cybercafés are prone to abuse. Like all
been exploiting them to perpetrate their unwholesome                       networks on the internet, their networks are exposed to
activities. This study evaluates the security posture of                   security risks. In a study by [7], 80% of cybercafé operators
cybercafés in Nigeria. Using a combination of survey and                   identified malware, while 20% identified the users, as their
observation, a total of ninety nine cybercafés, covering nine              biggest threat. A cybercafé network has to contend with risks
states, in five of the six geopolitical zones of the country, were
                                                                           from those within and outside the network. There are users
covered. The findings suggest that most of the cybercafés have
adequate capacity to prevent unauthorized access to their
                                                                           whose intent is to exploit the systems in the café for
network, and the exploitation of the network to remotely                   unethical purposes. When appropriate security mechanisms
perpetrate cybercrimes. However, within the physical confines              are not in place, the network of such cybercafé could be used
of most of the internet cafes, cybercrimes are and could easily            to perpetrate cybercrime, including installing a keylogger
be carried out, and their networks exploited for other unethical           [13], spamming, fraud, hacking, to mention but few. On the
uses of the internet. Security needs to be given more attention            other hand, there are malicious internet users, outside the
than it currently enjoys in the management of cybercafés by                network of the café, who intrude into vulnerable networks.
managers. On the other hand, government must ensure the                    There are many potential attacks that could be launched. One
regulation of the activities of the sector.                                of these is remotely infecting vulnerable systems with
                                                                           malware that automatically adds them to a botnet operated
    Keywords-cybercafé; internet café; Nigeria; management,                by the attacker. The bots are used for criminal activities.
security; cybercrime                                                       Even terrorists use cybercafés [14]. The internet has become
                                                                           indispensable to terrorists for planning and coordinating their
                                                                           attacks [15]. Internet café offers a platform for the terrorist to
                      I.    INTRODUCTION                                   veil their identities.
    Cybercafés, also known as internet cafes, are public                       Apart from users who have malicious intents for using
places that provide commercial – paid or metered – access to               the café, another category of user that needs proper
the internet [1]–[5]. However, it is not unlikely to see other             monitoring is children. Online attacks that target children are
services including selling refreshments [2] being rendered.                continually on the increase. Cybercafés have been
This is common in advanced countries where cybercafés                      discovered to be locations for different adolescent crimes [6]
offer not only internet access, but also beverages [1], [6] or             and social excesses [16].
food and other types of drinks [7]. Depending on the                           Most internet café users have little or no knowledge of
business model, types of cybercafé include traditional                     the security risks they are exposed to and how to mitigate the
internet cafés, gaming, self-serve internet cafés, standalone              risks [2]. It therefore lies on the managers of the cybercafés
internet kiosks, information and advertising-based kiosks,                 to provide adequate security. To achieve the needed security,
and wireless hotspots [3].                                                 there are requirements that must be provided. Some of these
    Since the emergence of internet cafes, they have grown                 include surveillance/security system, legal software [17],
in popularity. In Africa and most developing countries,                    firewalls, antivirus software, making regular backup of data,
internet access is largely through cybercafés [7]–[10]. A                  and up-to-date updating of applications [1].
survey by [11] reveals that for up to 25% of students in                       However, studies have shown that security is often not
Turkey cybercafé was the dominant place for accessing the                  given due attention. Cybercafés engage staff who are
internet. Li, Zhang, Lu, Zhang, & Wang [12] found out that                 unskilled, with little or no IT knowledge [18], [19].While
while internet café was the 2nd most commonly used place                   many of the cafes have anti-malware applications, few
for internet access among elementary and middle school                     regularly update them [2]. And in most cybercafés,
students in China, it was the most used among those who                    articulated policies guiding activities of users are often not
were found to be internet addict. Internet cafes provide many              available [7]. In cases where there are they are often not
advantages. They offer convenient [6], immediate, and                      comprehensive [2].
                                                                     117
                                         International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

    In Nigeria, internet cafes have contributed tremendously             management software was the focus of [28], [29].The
to digital inclusion. Since the deregulation of the                      objectives of other studies in the domain of cybercafé
telecommunication sector in 1999 [20], and the introduction              management include management of e-waste by cybercafés
of the Global System for Mobile (GSM) communication                      [30], factors that affect provision of quality services [31],
services in 2001 [21], [22], the adoption rate of mobile                 evaluation of technical efficiency of internet access methods
technology in the country has proliferated. This,                        used in the cafes [32], and identification of factors
unfortunately, has resulted in cybercafés losing their place as          responsible for closure of cybercafés [33].
the primary platform used for accessing the internet. One of                 Studies on cybercafé usage majorly center on rate,
the effects is the demise of many of these cybercafés in the             purposes and effects of, and factors that affect use. Very few
country [18]. This sharp drop in number and patronage                    of the studies have explored internet café usage effects. One
notwithstanding, because not all users can afford internet               of these is the work of [16] which investigated the effect of
access through mobile and other personal devices, existing               usage on cigarette smoking and alcohol use among Chinese
and functioning cybercafés have continued to enjoy some                  adolescents and youth. Another, by [34], entails a survey on
measure of patronage. As is the case in other parts of the               the consequences of internet café usage on students’ social
world, they are used for their traditional purposes of                   capital. And in [35], the effects of playing computer games
researching, sending and accessing emails, communicating,                in internet cafes on the flow experiences of adolescents was
job search and application, to mention but few. In some                  investigated.
academic environments cybercafés are the primary                             On the other hand, studies on rate and purposes of usage
instrument for accessing the internet [7], [23], [24].                   have considered different countries. These include China
    Regrettably, while internet cafes have improved the                  [36], Indonesia [37], Malaysia [38], Nigeria [39], [40],
adoption of IT in the country, they have also helped to                  Pakistan [10], Philippines [41], Tanzania [42], Tanzania and
multiply its abuses. Teenagers use cybercafés as havens for              Indonesia [43], and Turkey [44]. On factors that affect use,
accessing pornographic materials, scammers utilize them for              [45] proposed a framework with perceived trust as
their criminal activities, sending out scam emails [25]–[27].            antecedent of internet café continuance intention.
Many cybercafés have been sealed off by security agencies                    The issue of security of internet cafes is very crucial to
due to the perpetration of cybercrimes using the café network            their survival. It is therefore not surprising that this area has
[7]. And in some cases, the activities of criminal have led to           attracted the attention of some authors. Specifically, some of
their outright shutting down [18].                                       the studies discussed security issues related to cybercafé use
    In the light of the foregoing realities, we pose some                and operation, highlighting sources and types of security
critical questions: Do internet cafes in Nigeria have the                risks, and proffering countermeasures [1], [2].The focus of
capacity to prevent unauthorized access to their network? Do             [8] was the development of cybercafé security policy in
they have the capacity to prevent their systems from being               Nigeria. This, the author argued, can enhance social security.
used locally or remotely to perpetrate cybercrimes? Are they             Consequently, it was recommended that such policy should
likely locations for other unethical uses of the internet? This          be integrated into the National Information Policy. Another
paper investigates management of cybercafés in Nigeria,                  similar study by [46] centered on the development of
with emphasis on security.                                               regulation of internet cafes in China. However, one study
    This study is significant in at least two ways. First, it            [47] departed from the traditional notion of the security of
exposes the security state of internet cafes in Nigeria. While           cybercafé being solely dependent on technological
there are laws that tend to relate indirectly to different               infrastructure. They proposed security measures that, in
activities that are associated with cybercafés in Nigeria, there         addition to technological mechanism, are also based on
are currently no known comprehensive guidelines on the                   social and soft components of management. Other aspects of
establishment and operations of cybercafé. This study,                   security explored in different literatures include malware
secondly, would assist relevant policy and regulatory                    detection and prevention [48], [49], security evaluation [50],
agencies of government in the development of regulatory                  cybercafés and cybercrimes [19], [51]–[54], and cybercafé
framework for the operations and management of cybercafés                and terrorism [14].
in Nigeria.                                                                  As far as research related to cybercafé is concerned
    The rest of the paper is sectionalized as follows: section           security has not been given due attention [8]. Very few
two presents a summary of studies related to internet cafes.             studies have centered on the state of security in internet cafes
In section three, the methodology adopted is described. The              using empirical data. One of these is the study by [18]. The
findings are presented in section four. Subsequently, these              authors investigated physical and security issues faced by
findings are discussed is section five. The limitations of the           managers of cybercafés in Ibadan, and measures to tackle the
study are highlighted and suggestions for further works                  challenges. They however recommended similar research
given in section six. Lastly, in section seven, the study is             across the country.
concluded, and some recommendations suggested.                               Our study examines security measures provided by
                                                                         internet café managers to prevent unauthorized access to
                    II.   RELATED WORKS                                  their network, mitigate perpetration of cybercrimes via and
                                                                         other unethical uses of their networks.
    Many literatures have focused on different aspects of
internet café, including their management, use, effect of
usage, and security.                                                                          III.   METHODOLOGY
    On the management of cybercafés, [4] concentrated on                    To achieve the aim of this study, descriptive research was
the management of infrastructures, [7] on operational issues,            adopted. Two methods were employed to collate data: survey
controversies, and challenges, while discussion of                       and observation. To collect data that were considerably
                                                                   118
                                           International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

representative of the country, the stratified random sampling             maximum of 3 attendants offered introductory classes for
method was used. Nigeria is composed of geopolitical zones,               novice users. Conversely, among those with a minimum of 4
with each composed of states which are essentially                        operators, an average of 77.93% offered introductory classes.
homogeneous. Consequently, this formed the basis for
stratification. For each stratum, random samples were                       TABLE II.      NUMBER OF SYSTEMS USED FOR BROWSING AND CAFÉ
                                                                                                      ATTENDANTS
selected from at least one of the component states. The
objective was to cover at least a state in each of the six                                             Frequency      Percent
geopolitical zones of the country. A total of ninety nine                                 Number of systems used for browsing
internet cafes, located in nine states, in five of the zones                                   1-5        18            18.2
(with the exception of North East) were covered in the                                        6 - 10      43            43.4
survey. The survey was conducted within 2013 and 2014.                                       11 - 15      25            25.3
                                                                                           Above 15       13            13.1
Table I presents the composition of cybercafés by state and                                   Total       99           100.0
zone.
    The survey questions were administered through                                      Number of café attendants
questionnaires. Observation was used to ascertain the                                             1        19            19.2
correctness of the data supplied by the managers/operators.                                       2        32            32.3
                                                                                                  3        20            20.2
The questionnaire sought information on the number of                                             4        17            17.2
systems used for browsing and café attendant, availability of                                     5         4             4.0
wireless access technology, those permitted to use the                                     Above 5          7             7.1
cybercafé, availability of introductory class for novice users,                              Total         99           100.0
permissions, security measures, and managers’ observations
and experiences. The ninety nine questionnaires were
returned, found to be valid, and thus used for analysis. To               A. Permissions
identify relationships among variables, we performed some                     Table III also reveals the some basic activities a customer
statistical tests, including chi-square, t-test, Fisher’s exact           is permitted by managers to undertake in the cybercafé.
test, and Pearson’s correlations. All tests were conducted at             78.8% of the cafes permit saving on their computer memory,
95% confidence interval.                                                  79.8% allowed customers to use their personal external
                                                                          memory drive to save. Most of the cafes equally permit the
                         IV.    ANALYSIS                                  use of their systems to make payment online (87.9%) and
                                                                          download from the internet (86.9%).
    The findings, presented in Table II, revealed that                        Perhaps, to mitigate downloading of malicious and illegal
majority of the cybercafés, 61.6% operate with no more than               software documents, more than half, precisely 51.2%, of the
10 computers. Only 13.1% have above 15 systems. Most of                   cafés that allow downloading required customers to obtain
the cybercafés (71.7%) did not have more than 3 café                      authorization before actually downloading.
attendants. A positive linear correlation was found to exist                  In order to secure their networks and systems cybercafé
between number of systems used for browsing and café                      managers provide security measures. From Table III, other
attendants (𝑟 = 0.426, 𝑝< 0.001). This, expectedly, implies               findings revealed that more than three-quarter of (76.8%)
that the higher the number of browse-able systems the more                and almost all the cafes (97.0%) provide firewall and
the number of café attendants employed by the owners.                     antivirus software respectively. However, many of them do
TABLE I.       NUMBER OF CYBERCAFÉS BY STATE AND GEOGRAPHICAL             not provide regulatory policy and measures to monitor power
                               REGION                                     users. Specifically, only slightly more than half of the cafes
                                                                          have policy displayed to regulate the activities of their
           Zone          State       Frequency     Percent
                                                                          customers (53.5%) and have developed measures to monitor
       North Central     Abuja          14             14.1
       North Central      kogi          10             10.1
                                                                          customers with expert knowledge in the use of the internet
       North Central     Niger           6              6.1               (58.6%).
         North West     Kaduna          15             15.2
          South East      Abia           5              5.1               B. Security Measures
          South East     Enugu           9              9.1
        South South    Cross River      13             13.1                   Providing regulatory policy to curtail user activities was
         South West       Ekiti          8              8.1               found to significantly influence putting measures to monitor
         South West      Lagos          19             19.2               power users (𝜒2(1) = 6.127, 𝑝 = 0.013). Those who had
                                        99             100.0              regulatory policy in place were found to be less interested in
                                                                          monitoring power users. While 71.7% of internet cafes
    Other characteristics considered in the study revealed that           without regulatory policy had measures to monitor users in
97.0% of the internet cafes surveyed allow any individual to              place, only 47.2% of those with policy did have measures.
access the internet using their network, regardless of age;               Only about one-quarter (25.3%) of the cafes provide both
62.6% provide access via wireless, in addition to wired,                  policy and measures. And far fewer cafés, 11.1% (𝜒 2 (1) =
technology; and about half of the cybercafés, 50.5%, offer                 12.01, 𝑝 = 0.001), provide both in addition to offering
introductory classes for novice users who need assistance in              introductory classes for novice users.
using the internet. The results are presented in Table III. The               More crucial are the availability of regulatory policy and
practice of offering this class to novice users was                       monitoring measures to internet cafes that permit customers
significantly dependent on the number of café attendants (𝑝               to use the cafe network to make online payments, download,
= 0.015). On average, 39.96% of internet cafes with a                     and store on system’s memory and their memory drive. Less
                                                                    119
                                                International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

than one-quarter, 24.1%, of cafes which allowed their                            half of the population, precisely 48.7%, as presented in Table
network to be used for online payment provided both                              V, had formatted either twice or thrice. Providing wireless
regulatory policy and measures to monitor power users                            technology for accessing the internet significantly influenced
( 𝜒2(1) = 6.656, 𝑝 = 0.010 ). Among the cafes that                               the likelihood of formatting systems (𝜒2(1) = 4.230, 𝑝 =
allowed customers to save on the café system memory and                           0.04). Findings revealed that while 70.3% of internet cafes
their personal memory devices, only 24.4% and 22.8%                              that provided internet access via wired network only
(𝜒2(1) = 8.711, 𝑝 = 0.003) respectively provided both.                           formatted their systems in the last one year, 87.1% of those
And for internet cafes which expectedly permitted                                with wireless network, in addition to wired network, have
downloading via their networks, only 22.1% provide both                          formatted theirs.
policy and measures (𝜒2(1) = 5.883, 𝑝 = 0.015).                                      In most of the cybercafés (76.8%), there have been
                                                                                 instances where a customer was noticed to always prefer the
   TABLE III.     OTHER CHARACTERISTICS, PERMISSIONS, SECURITY                   use of a particular system. On administrative settings being
              MEASURES, EXPERIENCES AND OBSERVATIONS
                                                                                 changed by customers, more than half (52.5%) of the cafés
                                                    Frequency    Percent         confessed they had experience that. The study found
Other Characteristics                                                            significant evidence of association between customer who
                         Café open to Everyone          96         97.0          loves using a particular system and administrative setting
                           Use of wireless LAN          62         62.6          being tampered ( 𝜒2(1) = 8.398, 𝑝 = 0.004 ). The
              Introductory class for novice users       50         50.5
                                                                                 occurrence of a customer being noticed to prefer the use of a
Permissions                                                                      particular system increased the likelihood of administrative
                    Save on computer memory             78         78.8          settings of systems being tampered with. Specifically, 60.5%
                 Save on customer’s USB drive           79         79.8          of cybercafés that reported noticing a customer who loved
              Systems Used for Online Payment           87         87.9          using particular system, compared with only 26.1% among
                                    Download            86         86.9
                                                                                 those who did not notice any, had experienced their
Security Measures                                                                administrative settings being changed.
                         Availability of firewall       76         76.8
                       Availability of anti-virus       96         97.0           TABLE V.      NUMBER OF TIMES COMPUTERS HAD BEEN FORMATTED
                Availability of regulatory policy       53         53.5
                Measures to monitor power users         58         58.6                                       Frequency      Percent
                                                                                                      Once       21            26.2
Experiences and observations                                                                         Twice       25            31.2
     Computers in café formatted in the last one                                                     Thrice      22            17.5
                                                        80         80.8                          Four times       7             8.8
                                            year
          Noticed a customer who loves using a                                                   Five times       5             6.2
                                                        76         76.8                               Total      80           100.0
                              particular system
           Someone successfully tampered with
                                                        52         52.5
                         administrative settings                                                        V.    DISCUSSION
                                                                                     This study sought to evaluate the security state of internet
                 TABLE IV.        LENGTH OF PASSWORD                             cafes in Nigeria. Results of keen observation and extensive
                                                                                 survey of ninety-nine internet cafes located in five of the six
                                   Frequency        Percent                      geopolitical zones of the country revealed that most internet
                   More than 8        58              58.6
                    Less than 8       40              40.4
                                                                                 cafes in Nigeria are small enterprises, open to everyone,
                   No password         1               1.0                       deploy both wired and wireless network for accessing the
                          Total       99             100.0                       internet, and provide introductory class for novice users.
                                                                                     The decision by managers of internet cafes to open their
                                                                                 businesses to all categories of users for accessing the internet
    Cybercafés naturally are expected to make use of                             is evidently geared towards expanding their customer base,
passwords to manage access to the internet via their network.                    which in turn can be expected to improve patronage.
However, the associated security issues lie with the strength                    However, this poses some inherent risks. One of these is that
of the password. From our survey, depicted in Table IV,                          children can easily take advantage of it. If not properly
there are internet cafes that actually do not use passwords.                     monitored, many of them might exploit the cafes for
1.0% of the cafes fell into category. In contrast, 40.4% use                     purposes unapproved of by their parents.
passwords but less than 8 characters long, while the rest                            Offering introductory classes for rookie internet users by
reported they used passwords with length more than 8.                            most managers of internet cafes is commendable. Novice
Fisher’s exact test revealed an evidence of relationship                         users often lack the requisite knowledge to use computer
between cafés using wireless LAN and length of password                          systems appropriately. They can subject systems to physical
(𝑝 = 0.006). Only 30.6% of internet cafes using both wired                       abuse, unauthorized adjustment of setting. Thus, having
and wireless technology for providing internet access either                     introductory classes can be seen as a proactive measure to
did not provide password mechanism for accessing their                           forestall possible misuse. It can also be considered a
systems or used passwords that are less than 8 characters.                       marketing strategy capable of attracting new customers, as
C. Managers’ Observations and Experiences                                        well as a measure to attract customer loyalty. Nevertheless,
                                                                                 providing necessary capacity for conducting introductory
   From Table III, 80.8% of the cybercafés had had to                            class for this category of users would require increased cost
format their systems at least once in the last one year. Almost                  of management of the cybercafés. One of the findings of the
                                                                           120
                                         International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

study confirmed this fact. On average, most cafes offering               measures to monitor power users is prone to becoming a
introductory classes tend to have higher number of café                  platform through which this kind of criminal activities would
attendants, when compared with those which did not.                      be performed. Equally vulnerable are those without
    Most internet cafes in Nigeria considerably seem capable             regulatory policies. Unfortunately, most of the cafes that had
of preventing unauthorized access to their network. Hackers              regulatory policy in place were less interested in monitoring
located within a certain range of a cybercafé could gain                 power users. Findings also revealed that most of those that
internet access through the café’s network without                       allowed online payments via their network did not provide
authorization if the wireless network is not properly secured.           both regulatory policy and monitoring measures.
One defence mechanism is to deploy a firewall. Hackers will                  There are other unethical uses of the internet. These
often exploit weak defence system and weak passwords,                    include viewing, downloading, uploading, and spreading of
amongst other things, to penetrate network systems. Our                  illegal contents and software, including pornographic
findings revealed that the availability of firewall in most of           materials, and malware. There are basic functions a customer
the cafes. Also, most of the internet cafes using both wired             typically would expect the systems and network of an
and wireless technology for providing internet access                    internet café to provide. A cybercafé that does not allow
implemented passwords that were more than 8 characters.                  customers to save their documents, download, or, use their
    Regarding the capacity of internet cafes to prevent their            platform to make online payments would displease many
networks from being used to perpetrate cybercrimes, the                  customers. For instance, how would a customer (or tourist)
study suggest that while most cafes can avert cybercriminals             book a hotel if he cannot conduct payments? No doubt, these
from using their system remotely, only very few have put                 activities, in most cases, are fundamental to other activities
necessary mechanisms in place to prevent perpetration of                 performed in the café. However, they also pose some
cybercrimes by a criminal within the physical confines of the            potential threats. Being able to use memory drives and
internet cafe. To commit crime via a cafe network remotely,              download without restraint can aid accessing, uploading and
the café must be operating, either partially or completely, on           spreading of illegal contents and software. Permitting a
a wireless network, and a cyber criminal would need to gain              malicious customer to save on the hard disk of the system
access remotely to the network. The capacity to prevent this             being used potentially makes the system, if proper security
by most cafes has already been identified in the study.                  measures are not put in place, vulnerable to, for example, be
    However, on the issue of cybercrime being perpetrated                used to store malicious programs. Being able to use external
locally, the study finds significant evidence to suggest that in         drives on systems in cybercafés exposes the entire network
most of the internet cafes in Nigeria cybercrimes are and                of the café to serious risks like malware attack. Other
could easily be carried out. In most of the cafes,                       malicious software can be easily transmitted via these drives.
administrative settings on computer systems had been                     Regrettably, our findings suggest that most of the internet
altered. It was more common among cafes where some                       cafes in Nigeria are potential locations for other unethical
customers accessed the internet using particular systems.                uses of the internet. Most of the internet cafes had had to
This raises the question of what could be special about the              format their systems within a space of one year, despite their
preferred system. It is possible that a customer might have              use of antimalware. The percentage was higher for cafes that
developed a preference for a particular system due to the                used wireless technology partially or fully. In each case, less
functionality it provides. This is because, in many                      than a quarter of the cafes which permitted customers to save
cybercafés, it is common to find one or more components on               on the cafe systems, their personal systems, and download,
most of the computer systems not functioning properly.                   provided both regulatory policy and measures to monitor
From observation, many of the cafés often buy used and low-              power users.
graded computer monitor and peripherals. A second factor is                  Our study corroborates previous findings, including [6],
the position within the café where the preferred system is               [26], [25], that have identified cybercafés as locations for
located. The physical space occupied by some cafés are so                perpetration of cybercrimes and other unethical internet uses.
inadequate that a customer, for instance, may have to sit so             It also agrees with [7] who identified users as one of the
close to the entrance/exit, and consequently have to endure              biggest threats faced by cybercafé operators.
brushings by those coming into or going out of the café. Any
customer would therefore prefer systems located in positions
that offer the least inconvenience, Notwithstanding, it is not                     VI.    LIMITATIONS AND FUTURE STUDIES
impossible that the reason a customer would insist on using                  Our study relied primarily on self-reported data. It is thus
only a particular computer in the internet cafe is simply for            subject to the validity of the measures. Secondly, we cannot
illegal activities that constitute cybercrime. Cybercriminals            confidently generalize the findings as outrightly
would tweak the settings on computer systems in the cafe to              representative of the entire country, since the six geopolitical
permit certain tools to facilitate their criminal intentions. To         zones were not covered. Future studies could consider a
minimize such occurrence, as basic, irreducible                          more representative approach.
requirements, policy regulating users’ activities and                        It can be expected that the security posture of internet
measures to monitor some categories of users are crucial.                cafes would differ in the different states/zones. For instance,
One of the most common cybercrimes in Nigeria is the                     in Nigeria, while some states/zones are predominantly urban,
advance fee fraud. One form of this crime is geared towards              others are rural. This dichotomy, and other factors, could
stealing or cloning online transaction cards. Cybercriminals             influence the prevalence of cybercrimes, and consequently
purchase and pay for goods online using these cards. The                 the level of security risk internet cafes in those states/zones.
implication of this is that a cybercafé which permit their               A comparative security evaluation of cybercafés by
network to be used for making online payments without                    state/zones can be investigated.
                                                                   121
                                                International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

    Our current study does not evaluate child online safety in                      [8]  S. C. A. Utulu, “Enhancing Social Security through Appropriate
the internet cafe. Considering the increasing online attacks                             Cybercafé Security Policy in Nigeria,” in Security and Software for
                                                                                         Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 30–
specifically aimed at young internet users, more empirical                               45.
studies that assess their security while online in different                        [9] O. O. Bola and O. O. Ogunlade, “Accessibility and Utilization of
access locations, including internet cafes, are required.                                Internet Service by Graduate Students in University of Lagos,
    Much attention has not been given by researchers to                                  Nigeria,” Eur. Res., vol. 25, no. 7, pp. 1092–1098, 2012.
regulation of internet cafes, especially in Nigeria. This is                        [10] S. H. Batool and K. Mahmood, “Entertainment, communication or
another critical aspect that requires urgent attention.                                  academic use? A survey of Internet cafe users in Lahore, Pakistan,”
                                                                                         Inf. Dev., vol. 26, no. 2, pp. 141–147, 2010.
          VII. CONCLUSION AND RECOMMENDATIONS                                       [11] S. L. Gencer and M. Koc, “Internet Abuse among Teenagers and Its
                                                                                         Relations to Internet Usage Patterns and Demographics,” Educ.
    Activities of cybercriminals have been and remain                                    Technol. Soc., vol. 15, no. 2, pp. 25–36, 2012.
detrimental to the survival of internet cafes in Nigeria.                           [12] Y. Li, X. Zhang, F. Lu, Q. Zhang, and Y. Wang, “Internet addiction
Unfortunately, while many of the cafes possess the capacity                              among elementary and middle school students in China: a nationally
                                                                                         representative sample study,” Cyberpsychol Behav Soc Netw, vol. 17,
to prevent unauthorized access to their network, and forestall                           no. 2, pp. 111–116, 2014.
their networks from being used remotely to perpetrate
                                                                                    [13] C. Herley and D. Florencio, “How to login from an Internet café
cybercrimes, in many of them, cybercriminals engage in                                   without worrying about keyloggers,” in 2nd Symposium. on Usable
criminal activities, and other unethical internet activities take                        Privacy and Security (SOUPS), July 12-14, Cornegie Melon
place with relative ease.                                                                University, 2006, pp. 1–2.
    The findings of this study underscore the need for                              [14] E. E. Adomi and W. P. Akpochafo, “Cybercafés and Prevention of
necessary interventions by relevant stakeholders, including                              Terrorist Activities,” in Security and Software for Cybercafes, E. E.
managers of cybercafés and the government. Internet cafe                                 Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 270–282.
managers need to be more proactive in their management.                             [15] O. Oluwafemi, F. A. Adesuyi, and S. M. Abdulhamid, “Combating
                                                                                         Terrorism with Cybersecurity : The Nigerian Perspective,” vol. 1, no.
From a business perspective, this is essential for their                                 4, pp. 103–109, 2013.
survival. They need to put in place necessary security                              [16] L. Wu and J. Delva, “The effect of computer usage in internet cafe on
mechanisms to safeguard their networks from being                                        cigarette smoking and alcohol use among Chinese adolescents and
exploited for unethical purposes. Deploying basic security                               youth: A longitudinal study,” Int. J. Environ. Res. Public Health, vol.
tools and mechanisms, including firewalls, antivirus, and                                9, pp. 496–510, 2012.
ensuring effective monitoring, whilst not violating                                 [17] CCAOI, “Guide for Cyber Café , CSC and eCommerce Service
customers’ privacy, can go a long way to ensuring the                                    Retailer.”
nation’s cybercafés are not comfort zones for hackers,                              [18] A. A. Oyelude and C. O. B. Adewumi, “Cybercafé Physical and
spammers, and other cyber offenders. On the other hand,                                  Electronic Security Issues,” in Security and Software for Cybercafes,
                                                                                         E. E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 84–94.
government needs to devote more interest in cybercafé
                                                                                    [19] P. A. Tiemo and C. U. Charles-Iyoha, “Cybercafés and Cyber Crime
operations in the country. As is obtainable in most sectors of                           in Nigeria,” in Security and Software for Cybercafes, E. E. Adomi,
the country, there is need for regulation of their activities.                           Ed. Hershey PA: IGI Global, 2008, pp. 295–306.
                                                                                    [20] F. C. Chidozie, L. P. Odunayo, and A. O. Olutosin, “Deregulation of
                        ACKNOWLEDGEMENT                                                  the Nigerian Telecommunication Sector : Interrogating the Nexus
    We wish to acknowledge the following individuals who                                 Between Imperialism and Development,” Acad. J. Interdiscip. Stud.,
                                                                                         vol. 4, no. 1, pp. 173–184, 2015.
served as research assistants, assisting with collection of the
                                                                                    [21] NCC, “The Nation ( 2nd November , 2011 ) ­ What makes telecom
survey data: Andrew Eyo, Christopher I. Onuoha, Eliab S.                                 business tick ?”
Ilemobayo, Godwin Abenege, Joel N. Ugwu, Sefiyat O.
                                                                                    [22] S. K. Mamah, “The Prospects and Problems of Deregulation of the
Ohida, and Temidayo H. Ajisola                                                           Nigerian Economy,” University of Nigeria, Nsukka, 2012.
                                                                                    [23] P. Udende and A. L. Azeez, “Internet access and use among students
                             REFERENCES                                                  of the University of Ilorin , Nigeria,” J. Commun. Media Res., vol. 2,
[1]   O. B. Adogbeji, “Computer Security in Cybercafes,” in Security and                 no. 1, pp. 33–42, 2010.
      Software for Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI Global,             [24] F. Osang, “Internet Access in Nigeria: Perception of National Open
      2008, pp. 18–29.                                                                   University of Nigeria (Noun) Students,” Int. J. Emerg. Technol. Adv.
[2]   L. A. Mohammed, “Cybercafe Systems Security,” in Security and                      Eng., vol. 2, no. 10, pp. 492–497, 2012.
      Software for Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI Global,             [25] S. Ifedigbo, “Tribute to the Cyber Café,” Daily Times, pp. 1–3, 2012.
      2008, pp. 1–17.
                                                                                    [26] M. Chawki, “Nigeria Tackles Advance Fee Fraud,” J. Inf. Law
[3]   R. C. Hendrix, “A guide to starting an Internet Cafe Business,” 2013.              Technol., no. 1, pp. 1–20, 2009.
[4]   K. A. Sodiq, “Assessment of the Management of Information and                 [27] H. Chiroma, M. Abdulhamid, A. Ya, A. Muhammad Usman, and T.
      Communication Technology (ICT) Infrastructure of Selected                          Umar Maigari, “Academic Community Cyber Cafés -A Perpetration
      Cybercafes in Lagos State,” in Journal of Educational and Social                   Point for Cyber Crimes in Nigeria,” Inf. Sci. Comput. Eng., vol. 2, no.
      Research, vol. 2, no. 9, 2012, pp. 181–188.                                        2, pp. 7–13, 2011.
[5]   N. Rangaswamy, “Telecenters and Internet cafés: the case of ICTs in           [28] A. O. Obuh, “Cybercafé Management Software,” in Security and
      small businesses,” Asian J. Commun., vol. 18, no. 4, pp. 365–378,                  Software for Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI Global,
      2008.                                                                              2008, pp. 113–124.
[6]   S. M. Mutula, “Cyber Security of Children: Implications for Sub-              [29] A. I. Ajewole, “Software Requirements for Cybercafés,” in Security
      Saharan Africa,” in Security and Software for Cybercafes, E. E.                    and Software for Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI
      Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 46–61.                                Global, 2008, pp. 125–146.
[7]   H. O. C. Otokunefor and H. K. Kari, “Issues, Controversies, and               [30] E. M. Mwathi, “Factors influencing effective management of
      Problems of Cybercafés Located in a University Campus,” in Security                electronic waste: A case study of Cybercafes in Nairabi Central
      and Software for Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI
      Global, 2008, pp. 62–83.
                                                                              122
                                                   International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

     Business District, Kenya,” Project Planning and Management of the                   [42] A. S. Sife, “Internet use behaviour of cybercaf?? users in Morogoro
     University of Nairobi 2014, 2014.                                                        Municipality, Tanzania,” Ann. Libr. Inf. Stud., vol. 60, no. 1, pp. 41–
[31] M. M. Marwa, “Technology Barriers to Quality of Service Offered by                       50, 2013.
     Cyber Cafes: A Case Study of Cyber Cafes in the Nairobi CBD,”                       [43] B. Furuholt and S. Kristiansen, “Internet cafés in Asia and Africa –
     United States International University, 2013.                                            Venues for education and learning?,” J. Community Informatics, vol.
[32] S. Magaji and C. I. Eke, “Measuring Technical Efficiency of Wireless                     3, no. 2, pp. 1–12, 2007.
     and Wired Technologies in Nigeria Cyber Cafés,” vol. 4, no. 1, pp.                  [44] M. Gurol and T. Sevindik, “Profile of Internet Cafe users in Turkey,”
     15–34, 2013.                                                                             Telemat. Informatics, vol. 24, pp. 59–68, 2006.
[33] O. B. Adogbeji and M. N. Mabi, “Cybercafes operations and its                       [45] A. Lawan, B. S. Galadanci, and A. A. Abdallah, “A Modified
     incessant closure in Delta State, Nigeria,” J. Internet Inf. Syst., vol. 5,              Expectation Confirmation Theory with Perceived Trust on Internet
     no. 1, pp. 1–8, 2015.                                                                    Cafes Use Continuance: A Conceptual Framework,” in IT4InDev
[34] M. Koç and K. A. Ferneding, “The Consequences of Internet Café                           2015, 2015, pp. 134–140.
     Use on Turkish College Students ’ Social Capital,” Turkish Online J.                [46] J. L. Qiu and Z. Liuning, “Through the Prism of the Internet Cafe:
     Educ. Technol., vol. 6, no. 3, pp. 88–97, 2007.                                          Managing Access in an Ecology of Games,” China Inf., vol. 19, no. 2,
[35] N. Kara and K. Cagiltay, “Flow Experiences of Adolescents in Terms                       pp. 261–297, 2005.
     of Internet Café Environment and Computer Game Play                                 [47] D. Onojaefe and M. Leaning, “Managing Cybercafés: Achieving
     Characteristics,” Procedia - Soc. Behav. Sci., vol. 89, pp. 298–307,                     Mutual Benefit through Partnership,” in Security and Software for
     2013.                                                                                    Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 95–
[36] W. Shang, G. Li, O. Arogundade, and X. Jiang, “Understanding                             111.
     Cybercafés Users behavior in Mainland China : An Exploratory                        [48] [48] A. O. Obuh, “Viruses and Virus Protection in Cybercafés,” in
     Study,” in Proceedings of IPID Postgraduate Strand at ICTD 2010,                         Security and Software for Cybercafes, E. E. Adomi, Ed. Hershey PA:
     2010, pp. 1–4.                                                                           IGI Global, 2008, pp. 170–185.
[37] B. Furuholt, S. Kristiansen, and F. Wahid, “Information                             [49] A. R. Garuba, “Computer Virus Phenomena in Cybercafé,” in
     Dissemination in a Developing Society: Internet Cafe Users in                            Security and Software for Cybercafes, E. E. Adomi, Ed. Hershey PA:
     Indonesia,” Electron. J. Inf. Syst. Dev. Ctries., vol. 22, no. 3, pp. 1–                 IGI Global, 2008, pp. 186–204.
     16, 2005.                                                                           [50] A. A. Paul and C. Zhang, “Evaluate Security on the Internet-Cafe,”
[38] S. S. Alam, Z. Abdullah, and N. Ahsan, “Cyber Café Usage in                              2013.
     Malaysia : An Exploratory Study,” J. Internet Bank. Commer., vol.                   [51] Y. Dina, “Cyber Laws and Cybercafés: Analysis of Operational
     14, no. 1–13, 2009.                                                                      Legislation in some Commonwealth Jurisdictions and the United
[39] M. Y. Abdulkareem, “Characteristics and information-seeking                              States,” in Security and Software for Cybercafes, E. E. Adomi, Ed.
     behaviour of cybercafé users in some Nigerian cities,” Int. J. Libr. Inf.                Hershey PA: IGI Global, 2008, pp. 221–238.
     Sci., vol. 2, no. 5, pp. 95–101, 2010.                                              [52] O. T. Emiri, “Prevention of Cyber Crime in Cybercafés,” in Security
[40] E. E. Adomi, “Overnight Internet Browsing Among Cybercafe Users                          and Software for Cybercafes, E. E. Adomi, Ed. Hershey PA: IGI
     in Abraka , Nigeria,” J. Community Informatics, vol. 3, no. 2, pp. 1–8,                  Global, 2008, pp. 239–252.
     2007.                                                                               [53] D. Rauniar, “Cybercafés of Nepal: Passage to Cyber Crime?,” in
[41] R. P. Bringula, J. Bonifacio, A. Natanauan, M. Manuel, and K.                            Security and Software for Cybercafes, E. E. Adomi, Ed. Hershey PA:
     Panganiban, “Pattern of Internet Usage in Cyber Cafés in Manila: an                      IGI Global, 2008, pp. 253–269.
     Exploratory Study,” Int. J. cyber Soc. Educ., vol. 5, no. 2, pp. 149–               [54] S. E. Igun, “Cyber Crime Control in Developing Countries’
     163, 2012.                                                                               Cybercafés,” in Security and Software for Cybercafes, E. E. Adomi,
                                                                                              Ed. Hershey PA: IGI Global, 2008, pp. 283–294.




                                                                                   123