Page 123 - The-5th-MCAIT2021-eProceeding
P. 123
the Internet makes it an ideal channel and instrument for many organized criminal activities (Ajeet, 2014;
Omodunbi et al. 2016). The speed of cyber technology changes always beats security agencies' efforts, making
it difficult for them to identify the origin of cybercrimes (Majesty, 2010; Roshan, 2008). As such, cybercafé
operators and system developers need to consider developing an in-built tracking system that can detect and
block all suspicious activities on their servers before the intrusion (Aliyu et al., 2020).
In developing countries like Nigeria, Internet café (i.e., cybercafé), also called business centers, are roadside
shops opened specifically to provide computer-related services such as Internet access, typesetting, photocopy,
scanning, printing, hardware repairs, software installation, computer training, etc. (Sodiq, 2012). The Internet
cafés provide great commercial opportunities to small-scale entrepreneurs and employment sources to the youth,
ultimately supporting the developing economy. It is crucial to protect these small scale businesses' IT
infrastructure and assets from cyber threats and crimes. Since Internet café are not as buoyant as other
institutions like banks, hospitals, agencies, examinations bodies, etc. According to Frank and Odunayo (2013),
the cybercrime phenomenon has become a sophisticated and extraordinary increase recently and therefore called
for a quick response in providing laws as highlighted by Ezeanokwasa (2019) that would protect cyberspace
and its users. Cybercrime is involved and committed mostly from remote locations, making it difficult for police.
The absence of enabling regulation makes policing even more difficult. Statistically, Nigeria ranked 43 in
EMEA and ranked third among the ten nations that commit cybercrime in the world (Frank & Odunayo, 2013;
Adebusuyi, 2008) Even though, the National Cybersecurity Initiatives (NCI) that was created in 2003 are yet to
meet the proposed desired objectives, despite the help from the Nigerian cybercrime working group (NCWG)
(Awhefeada & Bernice, 2020). Therefore, the government through the ministry of communication and digital
economy must come in to protect the private sector, IT infrastructures, and facilities for information security
and economic development.
Presently, cybercafés provide services such as personal browsing, emails, filling application forms (i.e., for
jobs, admissions, exams, visas, licensing, etc.), online exams (CBT), academic research, online video games,
and entertainment, etc. In higher institutions, cybercafés are the hub of accessing the Internet for assignments
and final year projects. Unfortunately, while Internet cafes helped enhance IT adoption in the country, they have
also allowed multiplying its abuses. Some youth visits cybercafés to access pornographic materials. Despite the
consistent fight against Internet pornography in the country, only a few cybercafés where content filters are
downloaded and installed to filter unwanted Internet content (Kshetri, 2019; Geoff et al. 2005; Longe et al.,
2005). Despite majority of the cybercafés placed warning notices against surfing pornographic sites and
spamming activities, still many users often ignored the notice, and keep sending spam mails, browse sex sites,
surf and download unauthorized contents (such as video films, musical audios and other multimedia contents).
Apart from the readiness and usage of Internet facilities in cybercafés for pornography and other cybercrimes,
the installation of fixed wireless facilities in the Nigerian network landscape has added another dimension to the
cybercrimes problem (Longe et al., 2005).
Similarly, the yahoo boys used cybercafés across the country as a medium for safe criminal activities against
vulnerable users. They are engaged in illegal activities such as hacking e-commerce sites, bank accounts, ATM
cards, email accounts, examination systems, travel sites, etc. As a result, phishing has become very popular as
criminals simulate product websites to deceive innocent Internet users into submitting their financial credentials
while ordering fake products (Longe et al., 2005). Thus, many cybercafés have been sealed off by security
agencies due to the perpetration of cybercrimes, e.g., spamming, credit card fraud, ATM frauds, phishing, and
identity theft using that café network (Olumide and Victor, 2010; Augustine, 2010). Currently, there is a lack of
standardized up-to-date cybersecurity guidelines on the establishment and operations of cybercafé. Some
cybercafés were shut down due to a lack of patronage by people scared of scammed, hacking, or virus attacks.
This study's primary purpose is to investigate and assess the current cybersecurity threats and practices
affecting Internet café operations in Sokoto and Kebbi States of Nigeria; the paper explored the current
cybersecurity countermeasures adopted by the selected Internet Café. Specifically, the paper examines the level
of cybercrime and security awareness among operators, their knowledge about cybercrime and security threats,
E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021) [110]
Artificial Intelligence in the 4th Industrial Revolution