CFP last date
20 May 2026
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2026

Submit your paper
Know more
Reseach Article

Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana

by Dennis Redeemer Korda, Obeng Owusu-Boateng, Eric Ayintareba Akolgo, Nelson Seidu, Kofi Nyame Barnes
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 100
Year of Publication: 2026
Authors: Dennis Redeemer Korda, Obeng Owusu-Boateng, Eric Ayintareba Akolgo, Nelson Seidu, Kofi Nyame Barnes
10.5120/ijcab55e1bd1d15e

Dennis Redeemer Korda, Obeng Owusu-Boateng, Eric Ayintareba Akolgo, Nelson Seidu, Kofi Nyame Barnes . Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana. International Journal of Computer Applications. 187, 100 ( Apr 2026), 32-39. DOI=10.5120/ijcab55e1bd1d15e

@article{ 10.5120/ijcab55e1bd1d15e,
author = { Dennis Redeemer Korda, Obeng Owusu-Boateng, Eric Ayintareba Akolgo, Nelson Seidu, Kofi Nyame Barnes },
title = { Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2026 },
volume = { 187 },
number = { 100 },
month = { Apr },
year = { 2026 },
issn = { 0975-8887 },
pages = { 32-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number100/evaluating-the-effectiveness-of-sim-card-re-registration-as-a-cybersecurity-intervention-evidence-from-ghana/ },
doi = { 10.5120/ijcab55e1bd1d15e },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-04-30T21:45:10.244736+05:30
%A Dennis Redeemer Korda
%A Obeng Owusu-Boateng
%A Eric Ayintareba Akolgo
%A Nelson Seidu
%A Kofi Nyame Barnes
%T Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 100
%P 32-39
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

SIM card re-registration policies have been widely adopted across developing countries as a strategic intervention to combat cybercrime, strengthen national security and enhance digital identity management systems. In Ghana, the policy was implemented as part of broader efforts to curb the rising incidence of mobile money fraud, identity theft, impersonation and the misuse of anonymous communication channels. By linking SIM cards to verified national identity databases, policymakers anticipated improved traceability of users and increased accountability within the telecommunications ecosystem. Despite high levels of compliance and nationwide enforcement, cybercrime incidents continue to persist, raising concerns about the actual effectiveness of the policy in achieving its intended objectives. This study critically evaluates the impact of SIM card re-registration on cybersecurity outcomes in Ghana. Adopting a qualitative analytical approach, the research draws on empirical evidence, policy documents and secondary data sources to examine both the strengths and limitations of the initiative. The findings reveal that while SIM re-registration significantly enhances user identification, supports law enforcement investigations and strengthens regulatory oversight, it does not sufficiently address the complex and evolving nature of cyber threats. Persistent vulnerabilities such as fraudulent registrations, identity theft, insider threats, weak system integration and the growing use of internet-based communication platforms undermine the effectiveness of the policy. Therefore, the study argues that SIM re-registration should not be viewed as a standalone solution but rather as a complementary measure within a broader cybersecurity strategy. To address these gaps, the paper proposes a multi-layered cybersecurity framework that integrates AI-driven threat detection, robust digital identity management systems, secure communication protocols and continuous user awareness programs. This holistic approach is expected to provide a more resilient and adaptive defense against emerging cyber threats in Ghana and similar developing economies.

References
  1. Boateng, O. N., Agyemang, F., & Mensah, J. (2022). A fraud prevention and secure cognitive SIM card registration model. Journal of Information Security and Applications, 67, 103124. https://doi.org/10.1016/j.jisa.2022.103124
  2. Bank of Ghana. (2023). An Overview of Bank of Ghana (BoG) Fraud Report: Key Trends and Insights. GAB Research. https://gab.com.gh/assets/images/docs/Overview%20of%20BoG%20Fraud%20Report_UPDATED%20APRIL%202025.pdf
  3. Cyber Security Authority. (2025). Annual cybersecurity report 2025: Ghana. Accra, Ghana: CSA. https://www.csa.gov.gh
  4. TechLabari. (2025). Ghanaian biometric data collected for SIM registrations was never authenticated. https://techlabari.com/ghanaian-biometric-data-was-collected-for-sim-registrations-the-data-was-never-authenticated
  5. Modern Ghana. (2025). Ghana’s SIM re-registration: Fixing past flaws or not?
  6. The Tracker. (2024). SIM card registration and subscriber data traceability. https://thetracker.media/12067/tech/elementor-12067/
  7. Minta, D. A. (2022). Data security and protection during the national SIM card registration exercise in Ghana (Unpublished doctoral dissertation). University of Cape Coast, Ghana. https://ir.ucc.edu.gh/xmlui/handle/123456789/11321
  8. GhanaWebbers. (2025). The Data-driven truth about Financial scams in Ghana. https://www.ghanawebbers.com/GhanaHomePage/NewsArchive/The-Data-Driven-Truth-about-Financial-Scams-in-Ghana-2029894
  9. GSMA. (2022). Safety, Privacy and Security across the mobile ecosystem. https://www.gsma.com/solutions-and-impact/connectivity-for-good/public-policy/wp-content/uploads/2022/10/Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
  10. Institute of ICT Professionals Ghana (IIPGH). (2017). SIM registration – Fraud prevention mechanism in mobile communication space in Ghana. https://iipgh.org/sim-registration-fraud-prevention-mechanism-mobile-communication-space-ghana/
  11. Apau, R. (2020). Digital forensic investigation and cybersecurity in Ghana. International Journal of Cybersecurity, 3(2), 45–62. https://www.sciencedirect.com/science/article/pii/S2589871X20300619
  12. GSMA. (2016). Mandatory registration of prepaid SIM cards. GSM Association. https://www.gsma.com/publicpolicy/wp-content/uploads/2016/04/GSMA2016_Report_MandatoryRegistrationOfPrepaidSIMCards.pdf
  13. ENACT Africa. (2019). Will mandatory SIM card registration rid Tanzania of cybercrime? https://enactafrica.org/enact-observer/will-mandatory-sim-card-registration-rid-tanzania-of-cybercrime
  14. Privacy International. (2019). SIM card registration: A threat to privacy? https://privacyinternational.org
  15. Cyber Security Authority (CSA). (2023). National cybersecurity awareness report. Accra, Ghana. https://www.csa.gov.gh
  16. Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77–81. https://doi.org/10.1080/1097198X.2019.1603527
  17. Korda, D. R., Dapaah, E. O., & Akolgo, E. A. (2024). The role of AI chatbots in education: A review. AJSE, 20(1).
  18. World Bank. (2020). Cybersecurity capacity review: Ghana. World Bank Group. https://www.worldbank.org
  19. Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). SAGE Publications.
  20. Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27–40. https://doi.org/10.3316/QRJ0902027
  21. Ragin, C. C. (2014). The comparative method: Moving beyond qualitative and quantitative strategies. University of California Press.
  22. Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
  23. Johnston, M. P. (2017). Secondary data analysis: A method of which the time has come. Qualitative and Quantitative Methods in Libraries, 3(3), 619–626.
  24. National Institute of Standards and Technology (NIST). (2020). Zero trust architecture (SP 800-207). https://doi.org/10.6028/NIST.SP.800-207
  25. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. https://doi.org/10.1109/SP.2010.25
  26. Feng, S. (2024). Integrating artificial intelligence in financial services: Enhancements, applications and future directions. Applied and Computational Engineering, 69(1), 19-24.
  27. Jain, A. K., Ross, A., & Prabhakar, S. (2016). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. https://doi.org/10.1109/TCSVT.2003.818349
  28. Green, M., & Smith, M. (2016). The cryptopals crypto challenges. Communications of the ACM, 59(7), 24–26. https://doi.org/10.1145/2948086
  29. Hadnagy, C. (2018). Social engineering: The science of human hacking (2nd ed.). Wiley.
  30. Media Foundation for West Africa. (2021). Internet Freedom Report – Ghana.
  31. Kuzaga, E. B. (2025). An examination of laws and practices surrounding SIM card registration in Tanzania: A strategy to combat mobile phone-related cybercrime. East African Journal of Law and Ethics, 8(1). https://doi.org/10.37284/eajle.8.1.3595
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity Mobile money Cyber Security Authority threats Authentication