Security and Software for Cybercafes

Security and Software for Cybercafes

Esharenana E. Adomi (Delta State University, Nigeria)
Indexed In: SCOPUS View 2 More Indices
Release Date: April, 2008|Copyright: © 2008 |Pages: 360
DOI: 10.4018/978-1-59904-903-8
ISBN13: 9781599049038|ISBN10: 1599049031|EISBN13: 9781599049052|ISBN13 Softcover: 9781616927318
  • Printed-On-Demand (POD)
  • Usually ships one day from order
(Multi-User License)
List Price: $180.00
10% Discount:-$18.00
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
(Multi-User License)
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
(Individual Chapters)
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage

Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.

Security and Software for Cybercafes provides relevant theoretical frameworks and current empirical research findings on the security measures and software necessary for cybercafes, offering information technology professionals, scholars, researchers, and educators detailed knowledge and understanding of this innovative and leading-edge issue, both in industrialized and developing countries.


The many academic areas covered in this publication include, but are not limited to:

  • Cyber laws and cybercafes
  • Cybercafe management software
  • Cybercafe systems security
  • Cybercafes cybercrime, detection and prevention
  • Government control of cybercafes
  • Information and security policies
  • Network security devices
  • Research in cybercafe security and software
  • Software requirements
  • Viruses and virus protection in cybercafes
Reviews and Testimonials

This book provides background information to scholars, and researcher who are interested in carrying out research on cybercafe security and software.

– Esharenana E. Adomi, Delta State University, Nigeria

This handbook describes every aspect of setting up both hardware and software for cybercafés.

– Book News Inc. (June 2008)
Table of Contents
Search this Book:
Editor Biographies
Esharenana E. Adomi holds BEd, MEd. MLS and PhD degrees. He attended University of Ibadan, Ibadan and Delta State University, Abraka both in Nigeria. He was secretary of Nigerian Library Association (NLA) 2000 – 2004 and currently the chairman, NLA, Delta State Chapter. He was Acting Head, Department of Library and Information Science, delta State University, Nigeria. January 2008 – February 2009. He received the 2004 Award for Excellence of the Most Outstanding Paper published in The Electronic Library, 2003 volume with an article entitled: “A survey of cybercafés in Delta State, Nigeria” co-authored with two other colleagues. He is a member of Editorial Advisory Board, The Electronic Library, formerly contributing editor, Library Hi-Tech News and currently the editor of Delta Library Journal. He has published over 45 articles in reputable national and international journals, chapters in books and four textbooks. He is the editor of Security Software for Cybercafes published 2008 , Frameworks for ICT Policy: Government, Social and Legal Issues and Handbook of Research on Information Communication Technology: Trends, Issues and Advancements published 2011 by IGI Global, Hershey, PA. His interests lie in ICT policies, community informatics, information/internet security, Internet/web technology and services, and application of ICTs in different settings.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.


Cybercafes, which are places where Internet access is provided for a fee, provide the opportunity for people without access to the Internet or who are traveling to access web mail and instant messages, read newspapers and explore other resources of the Net (Adomi, 2005; Adomi, 2007; Adomi, Okiy, and Ruteyan, 2003; Adomi, Omodeko, and Otolo, 2004). As noted by Stewart (2000) the explosion in the use and profile of the Internet and personal use of new information and communications technology – multimedia – has made cybercafes to becomes part of contemporary culture, established among the public places of modern cities, towns and villages around the world.

In the contemporary era, it is very difficult to think of an urban area that is not connected with the Internet especially for people who use the medium for routine communication, transactions, etc. A cybercafes facilities access to the Internet through computers in a relaxed atmosphere for people belonging to different age groups and having diverse socio-economic backgrounds. Cybercafes are often not selective about the clientele and satisfying users’ varying needs for example, besides providing Internet, consultation and publishing some serve food and liquor. In some areas, cybercafes have become a preferred gathering place for the people of different ages, income and level of computer knowledge and skills (Rathore and Alhabshi, 2005).

It should be noted that cybercafe is not a transitory phenomenon but the evolution an extension of an old and traditional institution, the café. Cybercafes may service and reflect the communication and information needs of people living in a global society, but they place this in a local context through provision of a social space and a convenient and hospitable location for technology access (Stewart, 2000).

Though cybercafes have been used as places for facilitating, e-communication and socialization in different parts of the world, they like other Internet based organizations experience “local” security problems and can be used as avenues to caused / launch security breaches / attacks to others (individuals and organizations) that are connected to the Internet. Whenever computers are connected to the Internet, they are exposed to attacks from intruders (Liverpool John Mores University, 2007). This is because the technology user group had changed from one consisting mainly of researchers and academics which has resulted in a shift from the desired results of improving economics to increase in the risk of using information technology as well (Rudasill and Moyer, 2004). Cybercafes can experience systems / network security breaches such as cracking, hacking, virus, worms etc. (see for example, chapter one of this book, by Lawan Mohammed), security breaches can cause computers and network malfunction and even breakdown of the systems and network of an affected cybercafe. Security is a key factor for organizations when adopting web services in their mission critical business transactions. Without taking cares of security, enterprises like cybercafes could not use web services in the insecure Internet environment (Rosado, Gutierrez, Fernandez-Medina and Piattini, 2006). The Internet has become increasingly complex, leaving many organizations vulnerable to malicious attacks. Organizations are therefore faced with trying to protect their infrastructure against network security attacks, as well as attacks that are specific to the security layer (F5 Networks Inc, 2004).

Cybercafes are set up in order for the entrepreneurs to make money and to enable their clients to access the Net. When security breaches occur in the cafes, this could lead to dissatisfaction of clients which eventually may affect income especially if measures are not taken to correct such breaches quickly. It would even be better for cybercafes to put security measure in place to prevent occurrence of breaches. Installation of antivirus software, firewall etc. could assist cybercafes to prevent occurrence of network attacks. Knowledge of network security would also enhance cybercafe security as it has been found that few café personnel know little about hacking / Internet security (ApiAP, 2005).

Apart from cybercafes being potential victims of cyber attcka, cybercafe can be used by cyber criminals to launch attacks on individuals and organizations. Criminals can explore the anonymity provided by cybercafes to commit cyber defamation, terrorism, hacking, etc. (Gruenwald, 2001). In order to stem the activities of cyber criminals who use cybercafes to carry out their negative acts, governments of some countries have taken steps to regulate the operations of cafes within their jurisdictions (Gruenwald,2001; Hong Kong Legislative Council Panel on Home Affairs, 2002; Glaser, 2003; Rathore and Alhabshi, 2005). The regulations include requiring cybercafes to install software filters to block some sites, compelling clients to show identity cards among others. Several cafes have been raided and even closed down for failing to comply with government orders. While restrictions on and closure of cybercafes may hamper Internet access for some users in the short term, such moves have not been able to hurt cafes popularity down the road (Gruenwald, 2001).

Software which is the detailed instrument that controls the operation of the computer system (Laudon and Laudon, 2001) is very crucial to the smooth and successful operations of computers that are connected to the Internet. Software is a necessary requirement in a cybecafe. As noted by Ajewole in chapter two of this book, it is essential to install necessary software in a café because the demands of the typical cybercafe user are numerous, that besides the basic software usually bundled with operating systems, there are other software required to make customers visit to a café a successful one. A cybercafe operator needs to install software that should ensure the smooth operation and management of the systems, network, and enhance client satisfaction.

The objective of this book is to

  • Be a source book on cybercafé systems/network security and software
  • Provides background information to scholars, and researcher who are interested in carrying out research on cybercafé security and software.
  • Furnish teachers of information technology with necessary knowledge of systems/network security which they can impart to their students/trainees.
  • Be a source book on cyber crime perpetration, detection and prevention in cybercafés and other network environments.
  • Acquaint cybercafe operators and personnel with necessary information on security and software required to run and manage a café successfully.


    The book is organized into seventeen chapters. A brief description of each of the chapters follows:

  • Chapter 1 introduces the vulnerability and security issues associated with the use and operations of Internet cafés or cybercafé by demonstrating different methods of launching different attacks. The author discusses the challenges facing those operating and managing Internet cafes He also argues that defense mechanism against breaches should be dynamic and strong enough due to the increasing number of new freely available cracking tools and harmful websites..
  • Chapter 2 looks at security situation in Cybercafes with the view to unveil network security, network breaches, and methods of protecting Cybercafes’ systems. The author explores various ways through which Cybercafes experience breaches and the methods of protecting the Cybercafes computers from such attacks
  • Chapter 3 focuses on how cyber café security policy can be used to reduce criminal activities perpetrated in Nigerian cyber cafés against individuals and organizations. The author proposes that, if Nigeria and Nigerians are to benefit from the highly electronic modern business environment, is is essential for relevant authorities to develop and implement an all-encompassing cybercafé security policy.
  • Chapter 4 concentrates on issues and threats to children cyber security vis-à-vis access to useful children online literature and the implications for sub Saharan Africa. The author points out that Africa could learn a lot from developed countries on how to balance between access to useful online information resources against the growing cyber crime targeting children.
  • Chapter 5 takes a look at the use of campus cybercafés as a possible solution to the inadequate or lack of Internet facilities in university libraries. The authors discusses the issues, controversies and problems of the café operations in relation to cyber security in order to determine the level of security awareness among their users, identify serious security threats and to find out the type of anti-virus software used.
  • Chapter 6 investigates physical and electronic security issues in cybercafés in Ibadan city, Nigeria. The security measures taken by cybercafé managers for physical and electronic facilities and clients also, were ivestigated in an in-depth study. Participatory observation, interview and questionnaire methods were adopted..
  • Chapter 7 offers an alternate perspective upon issues of management and security in cybercafés. It places attention upon the wider social environment in which cybercafés operate and the development of ‘soft’ skills in cybercafé management in order to mitigate security risks.
  • Chapter 8 provides an insight into the meaning of cybercafé management software, eatures of cybercafé management software, cybercafé management software systems requirement, criteria for selecting cybercafé management software, some examples of cybercafé management software, the role of cybercafé management software in enhancing internet security, limitations of cybercafé software, future trend and future research direction.
  • Chapter 9 discusses basic software that should be found in a typical cybercafé setup. The author broadly divides software required for a café into those for the server side and client side of the network. He states that though whole lot of software could be used in a café the actual software installed and used depends on general client’s requirements and/or the operator’s amount of know-how /preferences which may vary across different environments
  • Chapter 10 examines the nature of maleware evolution and various facets of maleware threats. The authors further present appropriate strategies for maleware detection, prevention, and mitigation through appropriate use of safeguards.
  • Chapter 11 dwells on viruses, types of viruses, classification of viruses, sources of viruses in cybercafe, why cybercafe systems are vulnerable to attacks or infections, and how to detect virus infections or symptoms of virus infection in cybercafe systems/ networks, It also focuses on virus prevention and control in cybercafés.
  • Chapter 12 examines computer viruses, some of the devices used by hackers to circumvent the security of cybercafé systems. The history, sources, spread, detection and removal of viruses are set forth.
  • Chapter13 focuses on a research intended to determine certain certain evaluation and selection process process is used to acquire software to meet business objectives and the requirement of users in an Internet based organization. The results confirmed that the organization, Media24 uses suggested protocol as noted in the theory of for software acquisition in most cases.
  • Chapter 14 examines the existing cyber laws in some Commonwealth countries and the United State jurisdictions. The author compares the various definitions accorded to cyber crimes in these countries. She examines and discusses when cyber crime occurs in the various jurisdictions, the significance of jurisdiction for Internet criminals in all these countries. as well as when cybercafé operators are liable in cyber related crimes
  • Chapter 15 looks at the concept of cyber crimes as it relates to cyber café. The author discuss various forms of cyber crimes, what cyber crimes are as they relates to cybercafes, find out how cyber crimes are perpetrated, identifies the various forms of cyber crimes and explores how cyber crimes can be controlled and prevented in cybercafes
  • Chapter 16 introduces the cybercafes of Nepal and explores the prospect of criminals exploiting them to commit global cyber crimes. The author discusses cybercafes and cyber crimes and introduces them with specific reference to Nepal Based on research carried out, he argues that they can be easily exploited to commit cyber crimes. Further, in terms of the facts that have emerged from the research, appropriate recommendations have also been derived and presented.
  • Chapter 17 describes the use of the Internet by terrorists in cybercafés and explores measures intended to stem the use of cybercafés for terrorist activities. Specifically, the authors x-ray the reasons terrorists use of the Internet, how they use the Net, their motivations for utilization of cybercafés, various measures adopted in different countries for combating terrorists’ use of cafes for their acts and impediments to prevention of terrorism via cybercafés.
  • Chapter 18 discusses the challenges and problems governments and other stakeholders are facing in fighting and controlling cyber crimes in developing countries cybercafés. It reveals reasons for the increase in the incidences of cyber crimes in developing countries; strategies to control and tackle the problem of cyber crimes are also highlighted.
  • Chapter 19 highlight the various categories of persons involved in cyber crime in Nigeria. It identifies the different agencies established by the government to curb the crime and their roles and the factors affecting cyber crimes in Nigeria The author makes recommendations on how cyber crime can be prevented in Cybercafes