Author Archives: hammjustsaying

About hammjustsaying

An IT Consultant for 15 years and also a Social Commentator



Nigeria remains one of the most challenging environments for any entrepreneur to start up a business and thrive. The country is also a very difficult place to have a formal business-inclined relationship across the spectrum of associations between people – customer to customer, business to customers and to a large extent, business to business, despite the presence of a legal system that can intervene in the event of a contractual breakdown, and this causality is as a result of the absence of trust in the society. This paper is being written to identify the multiple systems the Nigerian Government presently use in establishing a citizen’s identity. To provide an analysis of these systems, including but not necessarily limited to – their strengths, weaknesses; To look for the opportunity to create a possible alternative system or initiate a better process that provides the necessary increase in accuracy and efficiency that can be achieved,using our approach. The paper identifies the fundamental cause of these challenges, after critical analysis, and profers an improvising solution that can work effectively within the Nigeria environment.





When Ebay was founded in 1995, it started as an online marketplace for buying and selling personal items in a very rudiment way by today’s standards – with no guarantee, no payment platform, no fee or 3rd party interaction. Critics thought it was a foolish idea, and expected a scenario where a seller will ship a bad item and the buyer in return, mail a bounced check.

eBay outgrew Pierre Omidyar, the CEO’s, personal account within 5 months and had to be moved to a business account. Buyers and sellers who became members of the online communinity were charged a small fee to participate on the platform. eBay continued to grow by leaps and bounds and “Omidyar in an interview told the New York Times that he had so many checks piling up at his door, he had to hire an assistance to open them all” (Wells, 2018). Pierre Omidyar is now worth roughly $11 billion.

Societies become more wealthy as the level of trust and cooperation between members of that environment increases. Ebay was able to grow in leaps and bounds because it was a business that was built based on trust, in an almost entirely trustworthy society.

But how was the United States able to develop the level of trust within its population? Over the years, societies in the western worlds, have been able to efficiently gather every single relevant information about an identity within its population. These information gathering are consistently cross-checked and updated, and even given score points, fundamentally to have accurate information about an individual and to be able to plan social welfare, but as a subset, to also ensure good behavior and citizenship.

An efficient information gathering on citizens is lacking in Nigeria and in effect, businesses are unable to flourish, thereby causing business-like citizen to citizen relationship to be grounded in so much distrust, dishonesty and bad faith.

Identity: Individual and Social Identity


For the vast history of man, humans lived in small groups of 50 that never grew past 150. Scientists believe that from a genetic stand point, we are only built to cooperate with as many people as we can know well. Everybody knew everyone. If you stole someone’s dinner, or did not defend the group against an enemy, everyone knew you and you will get punished.
“But when you start having strangers in the group, people you don’t know well, it means people can free ride and cheat in the group with impunity” (Azim, 2018). As societies start to expand in population, groups started experiencing cheaters within them, making the groups unable to self-sustain. The group needs a level of cooperation for it to act and work harmoniously, and this can only be achieved through the identification of people.

We often define ourselves internally with limited reference to others, and social identity is used to define a “person’s sense of who they are, based on their membership” (Tajfel, 1979) to that tribe or population.

“A person’s identity is defined as the totality of one’s self-construal, in which how one interprets oneself in the present expresses the continuity between how one interprets oneself as one was in the past and how one interprets oneself as one aspires to be in the future”; this lets us define some aspects of identity, for instance: “One’s ethnic identity is defined as that part of the totality of one’s self-interpretation made up of those dimensions that express the continuity between one’s understanding of past ancestry and one’s future aspirations in relation to ethnicity”.

“Group such as social class, family, football team or nation, which people belonged to were an important source of pride and self-esteem” (Tajfel, 1979).

There are many considerations that add toward the identity of an individual, and this can be classified in the following identity components:

  1. Socio-demographic characteristics– “Includes characteristics such as gender, age, ethnic group, household size, or employment status. It is based on the premise that demographic groups are relatively homogenous and lends itself easily to quantification, measurement and classification. Additionally, it is difficult to falsify unless a false identity is being used” (Dr. F, 2018).
  2. Benefit sought after– “The benefits desired from pursuing certain behaviour, including the underlying motivation. It focuses on common values and attitudes across cultural groups. It may be extremely difficult to observe and is not suitable to assess individual, rather than group, behavior” (Dr. F, 2018).
  3. Behaviour displayed – “In relation to the financial institution. That is, based on data resulting from actions of the account holders, such as the length of relationship with the bank, modes of payment and shopping preferences, product ownership, and contributions to political, religious, and charitable groups. An underlying assumption prevails that past or current behaviour offers the best predictor of future behaviour. It is very useful in anti-money laundering, but easy to falsify and often difficult to measure” (Dr. F, 2018).


The capacity to construct a profile for an identity using one or more of the above components, is how societies have been able to identify people, so as to create an enabling and a successful environment for them.



Data Collection and Identity Documents

In the United States, the US Passport document and the Social Securit ID can be legally used as national identification, however, the state-issued driver’s license or state-issued identity card, is what is mostly used as a means of identification, nationally.

There is nothing like the term official national identity card from a federal agency that is mandatory for all US citizens. The uniformity of driving in the United States makes the driver’s license, which is issued by each State, the unofficial national identity card.

“A driver’s license or the State ID card contains a wealth of private information. In addition to full name, date of birth, signature, and photograph, licenses and state ID cards typically bear one’s home address, color of the eye, gender, and height. Some states go beyond that, including natural hair color, weight, Social Security number, and fingerprints (the latter two being stored in the license or state ID’s barcode)” (Wong, 2014).

One point to note is that despite having federal jurisdiction, the social security card cannot verify an identity. They are essentially used to comply with Social Security payroll tax laws and to verify the match between the name of an identity and an assigned Social Security Number.


Secondary Identity Verification Documents

There are other secondary documents that can be used to establish the identity of a person, which are naturally unacceptable as a primary form of identification. However, they are also useful in obtaining a primary form of identification, when a primary documentation have been lost or stolen. “These other documents include:

  • The Internal identification card issued by one’s employer, university, or school
  • Voter’s registration card
  • Credit cards and debit cards
  • Proof of professional certification for members of regulated professions
  • Health insurance card issued by a private health insurance company, by Medicare, or by a government agency
  • Library cards
  • Membership or Loyalty cards issued by private companies such as, supermarkets, warehouse club stores, etc.
  • Utility bills, which are often used as proof of residence or address”.

Credit System

 Micro to Macro Impact of Credit on an Economy

From personal experiences, we have a general understanding of how credit works. We borrow money from the bank or other people, to purchase goods and services immediately, and then repay with interest at a later date. The immediate purchase could be, to buy a house, a car, or grocery shopping.

However, there are other agendas and different objectives which economic policymakers have, so as to create an impact on the broader economy.

“Instead of having to save for long time in order to obtain a big-ticket item like a house or a car, credit allows the borrower to have the item immediately, while using future earnings to make repayments over a period of time” (Butler, 2009). Economic policymakers understand that access to credit expands purchasing power, allowing people the ability to buy more things. The more transactions are conducted, the more the economy booms.

Economy policymakers understand that having easy credit access, is a main factor in growing economies. Unfortunately, 3rd world economies such as Nigeria, performs poorly in understanding and implementing such policies. According to the International Finance Corporation, which is the lending arm of the World Bank, “Lack of access to finance is a key constraint on the growth of small and medium enterprises in Sub-Saharan Africa, and thus also an important limitation on employment, economic growth and shared prosperity”.





In any case, for a society to credibly run a functioning credit system, there are two important subsystems that have to be reliably put in place – A credit bureau and a reliable system to background checks. From these two, any registered Consumer Reporting Agency can pull records and provide reliable information about an identity.


Credit Bureau

“Consumer credits are granted by banks, retailers and a variety of other lending institutions and this is a sector of the economy that has seen rapid growth over the last few decades”. Credit scoring, which is broadly applied in consumer lending, is a statistical approach that predicts the probability that a credit applicant will default or become delinquent. Credit analysis, which consists of the valuation of the financial history and financial statements of the applicant credit background, aims to evaluate the borrower’s probability of repayment, to determine the financial strength of the borrower, and to minimize the risk of non-payment to an acceptable level. Good borrowers with low credit risk would be granted a loan, while a high risk borrower would be denied” (Roszbach 2004)

“The procedure with which an applicant’s creditworthiness is being determined, was based on the 6 C’s namely Character, Capacity, Cash, Collateral, Conditions and Control” (Rose, 1993), which some experts find unreliable. However, this augmented demand for credit has since led to the innovative idea of a credit scoring system. The “credit scoring methods have produce more precise classifications in comparison with subjective judgmental assessments by loan officers” (Rosenberg et al. 1994). An advantage to this is that it makes credit scoring  more efficient, while also assisting lenders to review the borrowers’ creditworthiness more regularly.

“Credit scoring enhances and sometimes replaces the traditional subjective assessment, since it measures the credit risk of applicants much more accurately and quickly than the latter one. This method of measuring credit risk is mostly used in consumer loans, especially in credit cards but, nowadays, has become commonly used in mortgage lending and in complex business loans as well” (Roszbach 2004)


The United States has three major credit reporting agencies, and they are, Equifax, Experian and TransUnion. “They were set up to help keep track of consumer and corporate spending and repayment history, thereby protecting creditors.

Prior to this, a consumer could default on a financial obligation and simply shift over to obtain financing from an unsuspecting creditor who had no way to know that the consumer was a credit risk” (Rotter, 2018). In the case of Nigeria, for instance, the Asset Management Corporation of Nigeria, recently mentioned that about “350 Nigerians are responsible for more than 80 per cent of the $15bn debt portfolio of the company” (AMCON, 2015), out of 180 million people living in the country.








Ahmed Kuru, CEO AMCON, in an interview with the News Agency of Nigeria, disclosed that “the 350 Nigerians or their businesses, owe a whopping $12bn of the $15bn debt profile of the company, an amount which is over 50 per cent of the 2018 Budget of Nigeria”.



These 350 individuals have registered businesses and are able to accumulate this substantial debt profile, by seeking loans from one bank to the other using the same credentials, and defaulting on these loans.

Thankfully, the advent of internet which as further eased efficient data collection and error correction, has reduced the ability to defraud creditors


Background Check

“There are different types of background checks, that contain overlapping results. For instance, a criminal background check can reveal sex offender crimes, but there are also sex offender-only background checks (Criminalwatchdog, 2018).

Below is a list of the different kinds of background checks:

  • Arrests
  • Convictions of felonies and misdemeanors
  • Court records (dockets, judgements, etc.)
  • Warrants
  • Sex offenses
  • Incarceration records

Background checks from a county are self explanatory, containing records of arrests and convictions within that particular county. Whereas State background checks, vary. Some states have just a handful of county records on file, while other states have all county records in their databases” (Criminalwatchdog, 2018).


Employment Screening

Employment verification exercise is the most common type of background check carried by people and organizations, and these checks produce the following kind of information

Criminal history, Character references, Social security number verification, Education verification.

One point to however note is, pre-employment verification checks differ depending on the need of the employer and the type of job involved. If an employer is seeking to hire an account officer or a Chief Finance Officer, running a credit check is ideal. Whereas, a parent seeking the services of a nanny will most likely specifically look for sex offenses.

Tenant Screening

“Landlords use this exercise to screen potential tenants in order to make sure they are responsible. This background check review criminal records, credit reports, and contact past landlords for personal references” (Criminalwatchdog, 2018)

In Nigeria, there have been many cases where tenants are unable to fulfill their rental obligations. These free rent seekers are able to twist around laws that protect the tenant, enabling them stay rent free for a duration up to 6 months.

Childcare Background Checks

Extensive background checks is always required for childcare workers. The requirements for screening nannies or childcare workers vary, but most will require checks from:

  • State criminal records
  • State and federal fingerprint records
  • Child abuse and neglect list records
  • State and federal sex offender records







Consumer Reporting Agencies

Every credit report contain rich of information that lenders are able to use to assess applicant’s risk as a borrowers.

This information have details about their credit account, the type of account, the credit limit and account balance, and payment history, or collections that are in the account holder’s name.

“The information in this credit report comes directly from companies that have extended credit in the past. Credit card companies, banks, credit unions, retailers and mortgage lenders all report the details of the credit activity to the credit reporting agencies (CRAs)” (Equifax, 2014).

“CRAs also receive information from debt collectors, and they purchase public records, such as bankruptcies, from public record providers”. (Equifax 2014)


The Importance of Conducting Background Checks

The hiring of new employees can be a difficult experience. It is important to find the right candidate with the education and capacity to do the job. In an environment such as Nigeria, verifying claims are problematic, and many employers have found themselves in circumstances where they have hired incompetent employees that are discovered later to be unable to perform the task they were hired for.

“To be effective in hiring practices involves delving into the background of applicants to get a better idea of their abilities and employment performance. However, this has to be restrained with respect for the privacy of each individual candidate as well as being compliant with relevant laws” (TheAdvancedGroup, 2011).

Primarily, background checks are run to determine the accuracy of the information provided by an applicant. It also an opportunity to assist in creating a profile for the applicant beyond what can be discovered in a short encounter. For instance, a security officer position is not open to anybody with a criminal record.



Legal Issues with Background Checks

“Before a background check is initiated, proper evaluation for the purpose is important. Some activities of a background check may not be necessary. An organization can easily go overboard in a background check to err on the side of caution. Certain information such as medical and credit history require written consent from the applicant” (TheAdvancedGroup, 2011).

Employers have the right to know who they are hiring and background checks are legal. Technically, any information that comes up on a background check is usually public record. “Employers can therefore research this information and take it into account when making hiring decisions and most employers exercise this right. According to a survey conducted by CareerBuilder, 72% of employers conduct background checks on every new employee” (Klazema, 2018)

Background Check Laws and Limitations

It is vital to note that there are several laws that limit an employer’s ability to use background checks in making hostile decisions about hiring. Both employers and applicants should always check what information is legal about the background check that will be run.

The limitations that often apply to employment background checks:

FCRA Compliance

In United States, “the Fair Credit Recording Act (FCRA) is one of the most important documents that protects the legality of employment background checks. The FCRA documents does not prohibit employers from conducting background checks on applicants” (Klazema, 2018). Instead, it provides a process that employers must go through before and after checks are run on prospective employees.

“Before the check, an employer must follow a rigid set of rules to obtain a candidate’s written consent to the check and after the background check, if the employer wishes to make an adverse hiring decision based on the findings of the report (Klazema, 2018), it must first:

  1. Inform the candidate in writing about the decision,
  2. Provide a copy of the background check report that led to the decision
  3. The candidate must be given the details of the company that prepared the background check report
  4. Tell the candidate the background check company did not make the hiring decision, despite preparing the relevant report
  5. Inform the candidate that he or she can request an additional copy of the report from the background check company
  6. Inform the candidate of their right to contact the background check company and dispute the report’s accuracy” (Klazema, 2018)



Information Gathering and Identification In Nigeria

In Nigeria, the Bank Verification Number, which is widely known as the BVN is an identification system executed by the Central Bank of Nigeria to reduce illegitimate banking transactions in the country. “It is a modern security measure in line with the Central Bank of Nigeria Act 1958 to reduce fraud in the banking system”.

“BVN verification works by recording the fingerprints and facial photograph of the applicant. It uses a biometric technology to register customers in the financial system.  It records these unique physical features, such as the fingerprints and eye of an individual. A BVN is generated once a person’s biometrics have been recorded” (Punch, 2015). The mandate is to protect bank customers, reduce fraud and strengthen the Nigerian banking system.

The BVN have been a successful venture ecause of its Biometric enrolment technology, as it “is helpful to people who cannot read and write. Their finger prints and pictures would serve the same purpose as signatures” (Punch, 2015). Bank customers who have multiple account with different banks would be covered when they do a single registration in any of the banks where they have accounts.

“BVN was initiated to help the banking system reduce situations where loan defaulters, for instance, move from one bank to the other and the banks extend new credits to them, without knowing their history.  Banks would be able to track transactions across all banks in Nigeria with more ease” (Vanguard, 2015). The BVN project has captured no fewer than 31 million Nigerians, with its unique identifier number.

According to Dipo Fatokun, CBN Director, Banking and Payment System, “disclosed in a paper titled, `Nigeria’s progress towards the creation of a robust, trusted and inclusive Financial Services Environment’, that CBN had also linked a total of 43,959,282 banks accounts” (Vanguard, 2015).

The objectives include the following: “increase access, convenience, service levels across the industry; enable greater financial inclusion and integration of financial services into the economy, with its attendant positive impact on economic development’’ (Fatokun, 2015).

According to Fatokun, “the BVN has also helped to increase deterrent controls on financial transactions and reduce or mitigate fraud risk and identity theft. Most importantly, it has created avenues for people who cannot write regular signature to make financial transactions, thus, facilitating financial inclusion” (Vanguard 2018).


Drivers License

Everywhere in the world, because of the common use of vehicle licensing, the driver’s license remains a document which users get after a well defined process. “As an official document, it permits individuals to operate any motorized vehicles, such as motorcycle, car, truck or bus on public roads in accordance to the law of the country” (Odumade, 2018).

In Nigeria, “the first and most important purpose of driver’s license is to identify the owner as duly certified by the state to operate a motor vehicle. It is the first document a state enforcement officer will demand from a driver, without which a driver has no right to operate a vehicle on public roadway” (Odumade, 2018).

The Nigerian driver’s license serves as an official document which can be presented to open a bank account, when applying for government benefits and loans. “A current driver’s license is a universally accepted form of personal identification, because it displays contact information and picture of the holder. In the instance of accident or emergency, it has also been structured to provide vital information concerning contact details of the next of kin, blood group of driver, which sometimes determine treatment to be administered during casualty” (Odumade, 2018)

However,” many Nigerians try to circumvent the application process of securing driver’s license because of the cumbersomeness involved. They often engage in the services of middlemen who have knowledge about the system are contracted to fasts track the process. A document that is officially obtained for $20 for a three year license will be obtained unofficially for $60. This middleman arrangement is also facilitated by the corruption of many officials who have been compromised”  (Odumade, 2018). An additional consequence is, a different false identity can also be created.


Integrating Existing Identification Systems

The “National Identity Management Commission (NIMC) is a statutory Nigerian organization that operates the country’s national identity management systems. The NIMC Act No. 23 of 2007 established the commission to create, operate and manage Nigeria’s a national identity card database, integrate the existing identity database in government institutions, register individuals and legal residents, assign a unique national identification number and introduce general multi-purpose cards” (Nwezeh, 2010).

This project is an initiative to create a national identity database and to prevent both double identity and identity fraud by assigning a unique identifier number, just as done with the Social Security Number, in the United States.

Every citizen and legal resident of Nigeria are required to enrol for the National Identification Number (NIN).

The NIN is a unique set of numbers assigned to Nigerian citizens after their biometric records have been taken and the National Identity Database confirms that there is no previous entry of the same data. The NIN once issued to a person cannot be reissued, even if the number was previously assigned to a dead person.

The NIN references all records from other agencies such as Vehicle Licensing office, Tax ID, Passports, BVN, etc about a person in the database, harmonize the data and, used to check the identity verified.

Challenges Deploying the National Identification Number

One of the challenges facing the National Identity Management Commission is the  production of national identity cards for everyone who enrolled for it, despite the huge public clamour for it. According to the commission, “national identity cards that are ready are mainly for people who enrolled in 2012 and 2013, adopting a first-come, first-served approach”, the Director-General, NIMC, Aliyu Aziz. He also expressed concern in the huge cost being incurred in the identity management of different sectors in Nigeria.

Aziz said that the “duplication of efforts have led to uncoordinated identity approach, as well as unreliable identity information due to lack of interoperability and disconnected databases”.

He said NIMC was tasked with the responsibility to ensure absolute integrity and security of this information. He added that the linkages between agencies such as the birth and death agencies would be an advantage.

“The Identity Management System in Nigeria is rigged with many other challenges such as underfunding from the Nigerian Government; corruption; the inability to integrate identity systems from other government agencies – NIMC, NPC, INEC, FRSC, National Passport Office; and Incompetence from the NIMC administration and its inability to coordinate its processes along the framework of the agency” (Ibanga, 2017)

Developing Credit and Identity Check Solution

AO Incorporated has been looking at various opportunities for its organization to apply the IT and Software capabilities of the Company in some potential new markets and has decided to be registered as an authorized Consumer Reporting Agency in Nigeria. As part of its research on possible projects, developing a robust private driven credit and identity check system comes highly recommended, in such a way that it would help the Nigerian Government tackle some of its citizen’s identity crisis while also spurning economic growth.

In order to optimize the delivery of a cost effective, yet an efficient solution that provides value for users and the Nigerian environment as a whole, AO Inc will be limiting its identity check scope of service to the development and deployment of a bespoke solution that addresses specific background check services for


  • Nanny Solution: To conduct background checks on any household employee. AO Inc. will offer different levels of screening options and also provide the ability for additional secondary searches.

Nigeria has an expanding middle class, which mean many parents are having to work longer hours and at the same time, not having time for child care. Unfortunately, theft and abuse crimes are existing in the childcare world. No parent will want to endanger the life of their child. In Nigeria, when many families find a nanny they really like, they feel a background check is unnecessary. This is aside the fact that going about a background check is not a straightforward process and easily accessible.

To do a Nanny Background Check, the information will search for

Identity Confirmation – NIN number, Full name, Driver’s license

Criminal Records – 5 year non criminal activities, 5 year address history, sex offenses, court cases, misdemeanors

Reference Check – work history

Driving records – If any


  • Employee Verification Solution – To offer a comprehensive class of background screenings, including an abundance of checks designed specifically for most industry workers. In addition, AO Inc. will conduct deep criminal history searches and provide a wide variety of verifications, such as those for past education and employment. For example, CBC News of Canada reported that fraud in the workplace cost Canadian Businesses over $3.2 Billion in 2011

The employment verification solution will check for job competency. For many employers, a background check is a reliable way of verifying claims made by job seekers during the hiring process. With a tight employment market, the appeal of overstating educational qualifications or enhancing job histories, can grow.

The employment verification will also check that it has enough information to protect against workplace safety and theft. Employers know that most business theft today is performed by insiders. A background check can help employers to make intelligent and informed hiring decisions to help reduce their risk of theft.

  • Credit Check – To offer a solution that reveals credit history, including paying habits, judgments, liens, and bankruptcies for the individual. This information is useful in determining financial responsibility and money management for the applicant.
  • Tenant Screening Report – A service that runs a thorough search and screening process on a potential tenant, to help a landlord avoid future problems by detailing a history of past rental behavior and rental responsibility.



AO Inc. IDM Application Software Flow Charts


Chart 1 – AO Inc. IDM System















Chart 2 – AO Inc. IDM Services











Chart 3 – Interaction between AO Inc. IDM and Integrated Identification Agencies in Nigeria to pull Identity






Project Management






Project Milestone






SOAR on Consumer Reporting Agency in Nigeria

This section will be focusing on a brief analysis of the business opportunities and strengths of running a consumer reporting agency such as which, AO Inc intend to engage in Nigeria. This SOAR analysis will be a useful approach for the strategic planning of the project.

AO Inc is looking at registering as a consumer reporting agency in Nigeria to be able to carry out various checks on an identity – from credit reporting to other forms of background checks.based on research and findings, there is only one existing company Background Check Internation, BCI, which as a first market mover, is already running similar services, and is also the only kind of organization presently registered in Nigeria offering such services.

The following AO Inc core organization strengths and assets are determined to be

  • A state of the art technology, covering applications and equipment, that we will be bringing from the United States
  • An excellent training program that will be designed specifically for new field operation personnels
  • A solid long term relationship with top key Nigeria Government officials who are willing to fast track licensing and other regulation requirements

Opportunities are already identified and that’s why AO Inc will be limiting its scope of services to areas of specific need to the average Nigerian – Employment verification, Tenant Screening, Credit reporting and Nanny Services. Based on research, it was found that the competitor, BCI, running similar services charge a steep cost to run its services. AO Inc will be bringing down the cost implication to a fraction lower, making it more affordable and covering a larger, marginalized customers within the market space.


This paper is written to look at the opportunities where AO Inc will be able to apply its IT and Software capabilities in some potential market. Nigeria as a business environment does not have a credible and or easily assessible Consumer Reporting Agencies that offer a robust private driven credit and identity check systems, in such a way that it would benefit the Nigerian Government and its people, and also help to tackle some of its citizen’s identity crisis.

A thriving and booming economy is one which has people having a high level of cooperation and trust. To develop trust and cooperation, individuals within that environment must be identifiable, and a system has to be designed to force them into having credible values and uprightness. Will AO Inc. mission and vision be able to achieve this project?

“When your vision becomes your mission, your business will become a movement.” A successful business can create change that affects neighborhoods, cities, even the world.

The last chapter using the SOAR analysis already explored the strengths and opportunities that are there for embarking on this project, and a final motivating need to go ahead, is that AO Inc. has as part of its vision, the moral obligation to contribute to creating enabling societies, around the world.

Paper Written by: Ade Oyinloye


Suzanne Wells. (July 2018). The Beginnings of eBay. The Balance Small Business.

Saul McLeod, (2008). Social Identity Theory.

Weinreich, Peter (1988) [1986]. “14: The operationalization of identity theory in racial and

ethnic relations”. In Rex, John; Mason, David. Theories of Race and Ethnic Relations. Comparative Ethnic and Race Relations. Cambridge: Cambridge University Press.pp. 299ff. ISBN 9780521369398. Retrieved 2018-08-30.

(DR), F. (n.d.). D2.2: Set of use cases and scenarios. Retrieved from

Wong, A. (2014, April 04). Driver’s Licenses Contain Too Much Personal Info to Use at a Bar.

  1. David Garson, Public Information Technology and E-governance: Managing the

Virtual State (Sudbury, MA: Jones & Bartlett Publishers, 2006), 171.

Okumagba (Nov. 2014) Vanguard. Access to credit and Nigeria’s economic development.

Roszbach, K. F. (2004). Bank Lending Policy, Credit Scoring and the Survival of

Loans. SSRN Electronic Journal. doi:10.2139/ssrn.488522

What Types of Background Checks are There? (n.d.). Retrieved from

Why It’s Important To Conduct Background Checks and How To Do It Legally. (2011, September 23). (Michael Klazema, Dec 2018). Are Background Checks Legal?

Vanguard. (2015, March 11). Importance of Bank Verification Number. Retrieved from

Vanguard. (2018, May 01). CBN captures 31m Nigerians in Bank Verification Number

Project. Retrieved from

Odumade, (January, 2018). Road Safety And Driver’s License. (n.d.). Retrieved from

Kingsley Nwezeh. (March, 2010). ID Card – FG Targets 100 Million Citizens, This Day (Lagos),

March 28, 2010

Okechukwu Nnodim (April, 2018). We can’t produce national identity card for everyone –

NIMC. Retrieved from

Only 350 Nigerians responsible for 80% of N5.4 trillion debt – AMCON. (2018, June 28).

Good Hotel: Doing Good, Doing Well?

Good Hotel was taken over by a San Francisco based Hotel Management Company owned by Joie de Vivre in 2008 and was rebranded, modeled after the triple bottom line framework that focuses on Social, Environmental and Financial. A concept that is adopted, in evaluating performance from a broader perspective to create greater business value. Good Hotel became known “as the first to be branded as a “hotel with a conscience” – encompassing a positive attitude, environmental sensitivity and philanthropy” (Pierce and Robinson, 2013).


The Vision and Mission behind the Good Hotel concept

The mission and vision statements behind the Good Hotel concept are as follows: –


Good Hotel as a hotel is focused on enriching the quality of life for its host communities, with a positive approach that inspires the “good in us all” ideology being the most eco-friendly hotel.

Part of its mission statement states – “As we practice philanthropy and believe in doing good for the planet, we are committed to operating in an economically, socially and environmentally responsible manner while balancing the interest of diverse stakeholders, promoting sustainable lifestyle and differentiating our guests personal experience”.

Good Hotel endeavors to make a difference in the lives of its guests and associates through a shared passion for life, work and personalized experiences


Good Hotel, being customer focused, endeavor to be a leader in hospitality industry that intends to exceed customer’s expectation, have passionate employees and owners while striving to be a responsible steward of the environment and sustainable development of society.


Reflect on the pros and cons of the alternatives Pam Janusz is considering for her recommendation to the new ownership of Good Hotel.

“During 2007-2009 economic downturns, occupancy levels dropped because of declines in the demand for lodging accommodation. As a result, it led to declining in both revenue and profits, and dramatically led to decreasing in net income. Hotel management team were able to reduce operating expenses in response to declining levels of occupancy and revenue” (Pierce and Robinson, 2013).

Pam Janusz ran a SWOT analysis on the business and was considering recommending to the new Good Hotel management between continuation and expansion of the business or suspending the current business model that Good Hotel is currently using for its management style. Continuing the concept would mean not to introduce new variables in the hotel’s operations, as the staff are trained and happier, the guests were giving positive reviews more often, and the financial gains have surpassed the goals.

According to the considerations to continue, Good Hotel had good customer service. · High customer satisfaction and loyalty. · Unique hotel design to attract customer · Caters to a wide variety of customer’s needs and wants. · High employee commitment and satisfaction. · Employees are well trained and aware of the hotel’s safety and green program · Strong Online customer review

Another argument to continue with the business model is, San Francisco tourism were mostly influenced by Caucasian. “As of 75 % of Caucasian, 62% were green consumers. Responding to green consumers, Good Hotel can get consumers to think of the products as their needs and wants” (Pierce and Robinson, 2013). Also, the consumers can feel that by staying in such eco-friendly hotel like Good Hotel, they are doing their part to make life more sustainable. Also, Good Hotel can focus on Caucasian as targeted customers.

However, there were cons in continuing the business model. “During the period 2008 – 2010, the industry experienced the longest downturn which was expected to drop occupancy level about 55%―the worst since the Great Depression” (Pierce and Robinson, 2013). Continuing the business model would mean Good Hotel will be susceptible to a high level of uncertainty in the ever-changing business atmosphere, and this could change and hurt the business. In addition, Good Hotel was considered as not aggressive enough in marketing, rely heavily on internet booking, with a potential for staff turnover after the change in management. The new management could also disband current concept and identity of Good Hotel entirely.


The impact of ‘sustainability’ on businesses in general and the U.S. lodging industry in particular. Is it high, medium, or low? Analyze and explain the reasons.

As of October 2009, the U.S. lodging suffered from chronic overcapacity with about 4.8 million rooms―approximately one room per 64 U.S. residents. This has since been improved on.

First, the threat for a potential new entrant is considered weak in this lodging industries. If there are new entrants to the lodging industries, there are some hurdles that they must overcome. “The barriers to new entrant are due to the high capital investments that are required to start and operate a hotel. They also need many efforts to differentiate themselves from those who are already existing, recognized by customers and accomplish customers” (Pierce and Robinson, 2013). Due to these factors, the threat of new entrants is weak for the lodging industry.

Hotel business has the advantage of controlling suppliers in their hands. As business is being hospitality and tourism industry, there are many suppliers that are able to supply hotels with the essentials needed to operate the business. For example, hotel face low switching if they want to change the suppliers such as the suppliers of hotel’s furniture and fixtures, and the suppliers of food and beverages.

Furthermore, In lodging and hotel industry, buyers have a strong bargaining power. First, the cost of switching to a competing hotel is low. In addition, the buyers’ power is strong because the buyers demand for using hotel rooms have decreased while there are greater number of rooms are offered. Another thing that makes the buyers’ power strong is that hotels rely on unpredictable travelers.

On the flip, the threat of substitutes in the lodging industry seem to be strong. This is because there are always good substitutes that are available to be used by consumers. “For instance, there are always the availability of cheaper priced lodging places. If substitutes offer consumer comparable features that they would receive at hotel, consumers are more likely to change. Also, the switching costs to use the substitutes are very low for buyers” (Pierce and Robinson, 2013).

In addition, continuing the business model without a variation of change also meant that in the lodging industry, hotels are open to rivalry among competitors. This force seems to be strong because the customers’ switching cost is low. They can change their mind to stay at a different hotel at any time. “Due to economic downturn, hotels began to notice a declining RevPAR rate. The RevPAR rate offers a convenient way for a company to see how well the fill its rooms as well as how much they are able to charge for using them” (Pierce and Robinson, 2013).

Based on analysis using SWOT on the lodging industry, I believe the impact on sustainability of businesses in the lodging industry is medium and very sustainable.


If you were the new the new owner, would your team discontinue, continue or expand the Good Hotel concept? Why?

If I were the new owner, I would recommend that Good Hotel should continue and expand by maintaining and further developing the hotel concept, and also adhere to the strategic formula recommendation. The strategic formula include

  • Create different activities and services to please the customers and make them feel that it is worth choosing Good Hotel.
  • Good Hotel should focus on developing their green programs and their energy-saving activities in order to reach LEED certification
  • Create a membership system that allows customers to accumulate points in exchange for special gifts, services, or a discount.
  • Use effective marketing as a tool to alternate solution to increase occupancy rate within a targeted budgeting.
  • Advance and update the hotel’s website to attract more customers because most customers plan their trip using internet.
  • Employ other low-cost method of marketing


Adebola Oyinloye

California Miramar University


Strategic Management: Planning for Domestic & Global Competition. 13th ed.

by John Pearce & Richard Robinson. McGraw-Hill Irwin. 2013

ISBN:  978-0078029295

Paige Baltzan M: Information Systems. 3rd ed. McGraw-Hill 2015

ISBN:  978-0073376912

Schroeder, R. G., & Goldstein, S. M. (2018). Operations management in the supply chain: Decisions and cases. New York: McGraw-Hill Education.

Operational strategy and business strategy. (n.d.). Retrieved from


Time On Site

Time On Site


We often delude ourselves into believing we have control over the use of our mobile technologies


What you do not realize is, behind the screen, there are over a thousand Engineers and Developers whose jobs is to keep you addicted to that screen


It’s called Time On Site


Time On Site is the currency with which the performance of web and application Platforms – mobile app, app, websites etc are being rated on. It measures how long a visitor stays on the user interface of the site, which further translates into how successful that site interests and involves you, and every other user.


Web platforms don’t just want you to cursorily browse through their sites, they want you to spend a great amount of your time resources, not just once, but repeatedly.


So, think YouTube, Facebook, Google, Instagram, Snapchat & Twitter.


These Tech companies most likely have a Chief Psychology Officer or some social scientists, whose job is to tell Engineers and Developers how to build persuasive algorithms into these platforms. Persuasive algorithms that can alter your habit and behavior.


The more you stay glued to a site, the more successful the platform provider is expected to be, in terms of campaign and site visitation to the site. Web analytics calculate this ToS almost accurately.


Web analytics do not calculate the period you have a page open but dozed off on your seat. Neither does it consider the time you are downloading a movie file or reading a site content


Time on Site record all requests and engagement on the site.


You think you’re in control?

Someone somewhere is making a decision that will affect your life.


You think you can get rid of your habits?

There are people more intelligent behind the screen whose job is to keep you persuaded and distracted


Have you noticed on your Facebook mobile app, that when you click the back button to exit the app – believing you’re done gossiping on family & friends’ pictures and timeline stories – the app doesn’t close, but instead scrolls up to display timelines of other friends you may have missed?


Have you noticed that when you’re done watching an episode on Netflix, the next episode shows in a small box and a timer starts to count down – persuading you to stay on watching?

Or a new related movie is suggested, based on your movie choice?


Think about how YouTube automatically plays the next music video – trying to persuade you to stay on the app.


Think about all the notifications from Twitter, Netflix and Snapchat, you wake up to see on your mobile device, in the morning.


These social platforms wake you up in the morning, to divide your daily time resource into time slots, each taking a block of your time, away.


Don’t you just love it when these Platforms do exactly what you desire or do things on your behalf that you didn’t even think of?

Yup! Those are deliberate designs and persuasive algorithms built into our technologies

#TimeOnSite is all #Hammjustsaying

The Characteristics of an Agile MIS Infrastructure – Adebola Oyinloye

Agile MIS Infrastructure is the combination of an organization’s hardware, software and telecommunication equipment, all working together as a system to support the goals of that organization. The system must be scalable such that, if an organization demand for resources grow by a percentage, the existing infrastructure must be able to handle the percentage growth without having any adverse effect on the functionality of the company’s operation.

The following are characteristics of an Agile MIS Infrastructure that can ensure a system meet and perform under any unexpected or unplanned changes

  1. Accessibility – The operation of the system must be easily accessible at any time without restriction by all users of the system, according to their authorization or access level.
  2. Availability – In today’s world where Ebusiness mean the operation of a system must be 24/7/365, availability means the period within which the system must be operational. When the system is unavailable, then it cannot be used. A system that is tagged High Availability, like the type used by Internet Service Providers, mean the system is continuously operational at all times
  3. Maintainability – The system must be flexible enough to meet all types of company changes and business changes, without a complete system failure. For example, some businesses fail to plan for global customers. Soon as the first order comes from a global customer, it may cause a business process issue. Systems must be built with flexibility to meet business change.
  4. Portability – This is the ability of an application to operate on any device or software platforms. These days, applications are built to run on any device like PC, mobile phones and tablets. They are also able to run on operating systems like Windows, Mac or Linux.
  5. Reliability – This is the ability for a system to function accurately and provide reliable information to the users.
  6. Scalability – This describes how well a system can scale up or adapt to growing demands. If a company grows fast, it may find it difficult to function properly if it has to rely on limited resources from an existing system. For example, a SOHO router built for 50 users will have operational difficulty, and may eventually break down, if users on the network increases to 100.
  7. Usability – This describes the user friendliness of a system. The system must be easy to use while also being efficient. Windows Operating Systems are always perceived to be more user friendly than Apple Mac’s IOS




  1. Paige Baiztan. (2016). Business Driven Information Systems: Fifth Edition. New York NY. 10121 McGraw-Hill Education

HOW NETFLIX DISRUPTED THE VIDEO INDUSTRY Through Organizational Development (Research Paper)


This paper is a research on how Netflix went through organizational development from a DVD post-to-mail rental business back in 1997 to an online video streaming platform, during a period when Blockbuster was the biggest DVD rental business and very little people in America had access to DVD players. The research also explores the role Netflix played in changing the entire video streaming industry. This study utilized various articles and opinion piece from select experts within the industry and video streaming users of various platforms other than Netflix.

Today, Netflix is a foremost Worldwide Online Streaming, Video and TV Production business.

According to Statista, video streaming online is one of the most widely used internet activities in the world. As at 2015, internet video viewers surpassed 200 million in the United States where most users viewed funny videos, movie trailers and music videos. And with the inclusion of mobile devices like smartphones and tablets, video streaming over the internet is set to consume about 1.46 million TB per month with mobile device users reaching 137 million in 2019, in the United States alone.

“More than a few video-on-demand companies have made their name in the area of paid streaming content, with Netflix being the most widely known example” having a 37 percent of peak period downstream traffic. Netflix made revenue of $5.5 billion, in 2014. (Statista, 2016)

Netflix Inc, is an entertainment company which was founded 1997 in California by Reed Hastings and Marc Randolph. It began by shipping DVD via US mail to customers who will watch it and mail the disc back. However, Netflix had two major challenges that it faced as a startup that would operate in an already established industry.

First, only 2% of the United States household had DVD players in their homes and secondly, there was Blockbuster, a provider of VHS home movie and video games that run video rental shops across the US, which was the “undeniable video rental leader, having over 2,800 stores in the US (Phillips, Ferdman 2013) and eventually 8,000 worldwide with about 60,000 employees”.

This research explores the external environmental pressure for change at Netflix which with a handful startup of 30 employees, was able to take on a big organization such as Blockbuster. It will also explain the following key organizational development process that made Netflix a success: The difference between Netflix organizational model and its other competitors – The organizational strategy used at Netflix for its development, how the use of technology revolution was responsible for Netflix success and how Netflix present structure with its disruptive innovation is sustaining change within the organization.


Netflix Organizational Structure and Strategy

October 19 1985, the founder of Blockbuster, David Cook opened the first store in Dallas, Texas. Cook had a creative background experience in the management of large databases, so after opening a few stores, he built a $6 million warehouse that could serve as a logistic center to many stores in one day. Then he came up with a strategy that allows him to customize each store according to the neighborhood in which the store is opened, stocking up the store with movies that fit the demographic profile of people who live in that neighborhood. Using this organizational model, at its prime in 2004, Blockbuster opened about 8,000 store nationwide. This business strategy included having customers to pay a large flat fee of about $65 to offer unlimited movie rentals for the lifetime of the membership. Blockbuster would charge customer, a first day rental of $2.99 for new released movies and $1.99 for older movies. A late fee charge of 99 cents per day for up to 10 days was also applied, capping fees at $10 (Laura 2010). “In 2000, Blockbuster had collected an approximately $800 million in late, representing 16% of its revenue”, AP published in 2010. Blockbuster business model and strategy was so successful that it started acquiring many other businesses to expand.

The most defining moment for Blockbuster was however when customer Reed Hasting was charged $40 on late fee for the return of a VHS movie, Apollo 13, in 1997 (Harress, 2013). Hasting, out of anger on the high cost of fee, started up Netflix. In view of the Blockbuster organizational model, Netflix understood it could not immediately match the capacity of Blockbuster multi stores structure, so it remodeled the Blockbuster’s organizational structure. The concept of Netflix started in the early days of DVD where only about 2% of the US households had DVD players. But Netflix saw that if the market grew to about 20% of the households, it will become a successful company.

The key to its strategy was that few movie stores had DVD for rent. So, Netflix leveraged on the light weight of the discs by shipping DVDs directly to people’s home at an affordable rate – VHS was heavy. People did not have to leave their homes to rent and watch videos. This also saved Netflix the huge capital cost of setting up video stores across the US. Netflix also offered DVD rental for $4, plus $2 shipping for a seven-day period and it did away with late fee policy. Multiple options were offered the customers. Disc could be kept longer for additional fee, new movies on DVD copies were sold at 30% discount and customers could decide to buy the copy, at a favorable cost, if they did not want to return the DVD copy. In addition to these, Netflix was one of the first few companies to rent DVD by mail.


Netflix Technology Innovation to sustain Development and Change

First, the pricing model. Hastings was a tech entrepreneur with a Masters in Computer Science from the Stanford University. Within two years after startup, Hastings leveraged on technology innovations at the time, the internet, to create a pricing model of – using the service for as long as you want, for a fixed monthly fee. Customers could now also browse a large collections of movie titles online and receive in their mailboxes. In addition, because of the low-cost production of the DVD and the compactness, Netflix could eventually do away with the late payment policy.

Netflix also tapped on another technology trend – streaming. Broadband internet and WiFi service was on the rise. Portable mobile devices were getting cheaper and widely in use. By 2007, Netflix launched a service to stream video contents directly to user’s portable devices and home TVs. Netflix bet heavily on the use of technology to drive its business that it kept on spending to entice customers to its website, on the assumption that it would become more profitable after the brand has established itself better. Netflix used technology to develop an extensive custom-made video-recommendation system based on customer’s reviews. This made it easier for customers to pick a very good movie without having to, first, view it. In 2003, Netflix crossed the 1 million subscriber mark, opening additional 5 shipping centers. By 2005, it was shipping 1 million DVDs by mail every day with over 35,000 titles to choose from its web services.

Sustaining Development through Vision and Internal Change Drivers

Netflix Vision and Mission statement states that “Our core strategy is to grow our streaming subscription business domestically and globally. We are continuously improving the customer experience, with a focus on expanding our content, enhancing our user interface and extending our streaming services to even more interconnected devices”. This was a clear vision statement from the CEO, Reed Hastings for the future of Netflix

Netflix continued to innovate and sustain its development. It started to develop its own content called Netflix Originals. These were contents that are distributed exclusively on their services. A success story of the use of technology to create content is “House of Cards”.

House of Cards is a show that was created from data-driven programming. Netflix with 27 million subscribers in the US and 33 million worldwide, collected data – like when you pause, rewind, fast forward, reviews, ratings; from its customers to create a bespoke show. With this strategy, Netflix was able to connect more with its customers and further increase customer’s satisfaction. Many industry experts believe Netflix has affected the way audience watch TV content. Neil Hunt, Netflix CPO, believes that Netflix strategy has created a model on how television will be viewed in 2025, that is, watching shows and TV content at their own pace. People will no longer be forced into a 30 or 60-minute slot once a week.

In conclusion, Netflix was able to remodel Blockbuster’s organizational structure by taking advantage of the many flaws from its big size and multi stores model, using disruptive technology innovations and continuous technology improvement to sustain its development and self-changing strategy by linking selection to objectives and measuring progress, as it grows. Blockbuster, on the other side, failed to adapt and change.

Finally, Netflix understood that making timely modifications in the light of experience will normally be more effective than attempting not to deviate from plan (Palmer, Dunford and Buchanan (2016). Netflix did a lot of fine-tuning as it expands its business, “building the plane as it flies”. By 2011, Netflix had become an American success story for an organization with well-paid, well-managed employees and happy customers. It had overtaken a big competitor using technology, or as Harvard Business Review called it “big bang disruption.” Netflix shares hit $299 a share in 2011 from a 2003 $22 per share, becoming the first platform one will think of, when it comes to Online Video Streaming.


Oyinloye Adebola

California Miramar University




Pouge, David. (January 25, 2007). “A Stream of Movies, Sort of Free”. The New York Times

Stellar, Brian. (October 21, 2013). “Netflix hits Milestone and Raises Its Sights”. The New York Times.

BBC News. (December 2013). “Blockbuster to close more stores as 427 more jobs to go”.

Wired. (May 2014). “What Television will look like in 2025, according to Netflix”. .

Staistics Portal. (January 2016). “Statistics and Facts about online video usage”.

Laura Heller (Mar 3rd, 2010). “Late fees are back at Blockbuster; goodluck with that”. AOL Finance

Associated Press (September 2010). “Blockbuster tries to rewrite script in bankruptcy”

Paul Holland (June 2015). “The netflix startup story”. Venture Beat.

Palmer, I., Dunford, R., Buchanan, D.A. (2016). “Managing Organizational Change”: A Multiple Perspectives Approach. New York NY. McGraw-Hill Education

David Carr (Feburary 2013). “Giving Viewers What They Want”. NY Times.


Your Phone Photo shot better than iPhone 7?

If you live in a larger city, chances are you’ve seen the ‘Shot on iPhone’ billboards that have been dotted around for a few years now.The award-winning campaign has long been an impressive way to highlight the quality of images that can be captured on Apple’s phones, with the photos showcasing various different subject matters…

via Can photos from your phone look like they were ‘Shot on iPhone 7’? — TechRadar – All the latest technology news

Top 5 Best Online Communication Tools in 2017

With the rise of the internet, computers and mobile technology, so much has changed in the business world over the decades. And of course, it’s critical to implement the right devices and applications into your everyday operations, not just to boost productivity, but to keep up with – or stay ahead of – the competition.If…

via Top 5 best online collaboration and communication tools in 2017 — TechRadar – All the latest technology news

WhatsApp enables two-step verification

Looking for a little more security in your digital life? If you’re a WhatsApp user, you’re in luck.The messaging service has just turned on two-step verification for all its billion-plus users. Once you activate the optional feature, anytime you (or anyone else) tries to verify your phone number, a six-digit passcode created by yourself must…

via WhatsApp enables two-step verification for added security — TechRadar – All the latest technology news