Research Article

Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana

by  Dennis Redeemer Korda, Obeng Owusu-Boateng, Eric Ayintareba Akolgo, Nelson Seidu, Kofi Nyame Barnes
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 100
Published: April 2026
Authors: Dennis Redeemer Korda, Obeng Owusu-Boateng, Eric Ayintareba Akolgo, Nelson Seidu, Kofi Nyame Barnes
10.5120/ijcab55e1bd1d15e
PDF

Dennis Redeemer Korda, Obeng Owusu-Boateng, Eric Ayintareba Akolgo, Nelson Seidu, Kofi Nyame Barnes . Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana. International Journal of Computer Applications. 187, 100 (April 2026), 32-39. DOI=10.5120/ijcab55e1bd1d15e

                        @article{ 10.5120/ijcab55e1bd1d15e,
                        author  = { Dennis Redeemer Korda,Obeng Owusu-Boateng,Eric Ayintareba Akolgo,Nelson Seidu,Kofi Nyame Barnes },
                        title   = { Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana },
                        journal = { International Journal of Computer Applications },
                        year    = { 2026 },
                        volume  = { 187 },
                        number  = { 100 },
                        pages   = { 32-39 },
                        doi     = { 10.5120/ijcab55e1bd1d15e },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2026
                        %A Dennis Redeemer Korda
                        %A Obeng Owusu-Boateng
                        %A Eric Ayintareba Akolgo
                        %A Nelson Seidu
                        %A Kofi Nyame Barnes
                        %T Evaluating the Effectiveness of SIM Card Re-Registration as a Cybersecurity Intervention: Evidence from Ghana%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 100
                        %P 32-39
                        %R 10.5120/ijcab55e1bd1d15e
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

SIM card re-registration policies have been widely adopted across developing countries as a strategic intervention to combat cybercrime, strengthen national security and enhance digital identity management systems. In Ghana, the policy was implemented as part of broader efforts to curb the rising incidence of mobile money fraud, identity theft, impersonation and the misuse of anonymous communication channels. By linking SIM cards to verified national identity databases, policymakers anticipated improved traceability of users and increased accountability within the telecommunications ecosystem. Despite high levels of compliance and nationwide enforcement, cybercrime incidents continue to persist, raising concerns about the actual effectiveness of the policy in achieving its intended objectives. This study critically evaluates the impact of SIM card re-registration on cybersecurity outcomes in Ghana. Adopting a qualitative analytical approach, the research draws on empirical evidence, policy documents and secondary data sources to examine both the strengths and limitations of the initiative. The findings reveal that while SIM re-registration significantly enhances user identification, supports law enforcement investigations and strengthens regulatory oversight, it does not sufficiently address the complex and evolving nature of cyber threats. Persistent vulnerabilities such as fraudulent registrations, identity theft, insider threats, weak system integration and the growing use of internet-based communication platforms undermine the effectiveness of the policy. Therefore, the study argues that SIM re-registration should not be viewed as a standalone solution but rather as a complementary measure within a broader cybersecurity strategy. To address these gaps, the paper proposes a multi-layered cybersecurity framework that integrates AI-driven threat detection, robust digital identity management systems, secure communication protocols and continuous user awareness programs. This holistic approach is expected to provide a more resilient and adaptive defense against emerging cyber threats in Ghana and similar developing economies.

References
  • Boateng, O. N., Agyemang, F., & Mensah, J. (2022). A fraud prevention and secure cognitive SIM card registration model. Journal of Information Security and Applications, 67, 103124. https://doi.org/10.1016/j.jisa.2022.103124
  • Bank of Ghana. (2023). An Overview of Bank of Ghana (BoG) Fraud Report: Key Trends and Insights. GAB Research. https://gab.com.gh/assets/images/docs/Overview%20of%20BoG%20Fraud%20Report_UPDATED%20APRIL%202025.pdf
  • Cyber Security Authority. (2025). Annual cybersecurity report 2025: Ghana. Accra, Ghana: CSA. https://www.csa.gov.gh
  • TechLabari. (2025). Ghanaian biometric data collected for SIM registrations was never authenticated. https://techlabari.com/ghanaian-biometric-data-was-collected-for-sim-registrations-the-data-was-never-authenticated
  • Modern Ghana. (2025). Ghana’s SIM re-registration: Fixing past flaws or not?
  • The Tracker. (2024). SIM card registration and subscriber data traceability. https://thetracker.media/12067/tech/elementor-12067/
  • Minta, D. A. (2022). Data security and protection during the national SIM card registration exercise in Ghana (Unpublished doctoral dissertation). University of Cape Coast, Ghana. https://ir.ucc.edu.gh/xmlui/handle/123456789/11321
  • GhanaWebbers. (2025). The Data-driven truth about Financial scams in Ghana. https://www.ghanawebbers.com/GhanaHomePage/NewsArchive/The-Data-Driven-Truth-about-Financial-Scams-in-Ghana-2029894
  • GSMA. (2022). Safety, Privacy and Security across the mobile ecosystem. https://www.gsma.com/solutions-and-impact/connectivity-for-good/public-policy/wp-content/uploads/2022/10/Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
  • Institute of ICT Professionals Ghana (IIPGH). (2017). SIM registration – Fraud prevention mechanism in mobile communication space in Ghana. https://iipgh.org/sim-registration-fraud-prevention-mechanism-mobile-communication-space-ghana/
  • Apau, R. (2020). Digital forensic investigation and cybersecurity in Ghana. International Journal of Cybersecurity, 3(2), 45–62. https://www.sciencedirect.com/science/article/pii/S2589871X20300619
  • GSMA. (2016). Mandatory registration of prepaid SIM cards. GSM Association. https://www.gsma.com/publicpolicy/wp-content/uploads/2016/04/GSMA2016_Report_MandatoryRegistrationOfPrepaidSIMCards.pdf
  • ENACT Africa. (2019). Will mandatory SIM card registration rid Tanzania of cybercrime? https://enactafrica.org/enact-observer/will-mandatory-sim-card-registration-rid-tanzania-of-cybercrime
  • Privacy International. (2019). SIM card registration: A threat to privacy? https://privacyinternational.org
  • Cyber Security Authority (CSA). (2023). National cybersecurity awareness report. Accra, Ghana. https://www.csa.gov.gh
  • Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77–81. https://doi.org/10.1080/1097198X.2019.1603527
  • Korda, D. R., Dapaah, E. O., & Akolgo, E. A. (2024). The role of AI chatbots in education: A review. AJSE, 20(1).
  • World Bank. (2020). Cybersecurity capacity review: Ghana. World Bank Group. https://www.worldbank.org
  • Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). SAGE Publications.
  • Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27–40. https://doi.org/10.3316/QRJ0902027
  • Ragin, C. C. (2014). The comparative method: Moving beyond qualitative and quantitative strategies. University of California Press.
  • Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
  • Johnston, M. P. (2017). Secondary data analysis: A method of which the time has come. Qualitative and Quantitative Methods in Libraries, 3(3), 619–626.
  • National Institute of Standards and Technology (NIST). (2020). Zero trust architecture (SP 800-207). https://doi.org/10.6028/NIST.SP.800-207
  • Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. https://doi.org/10.1109/SP.2010.25
  • Feng, S. (2024). Integrating artificial intelligence in financial services: Enhancements, applications and future directions. Applied and Computational Engineering, 69(1), 19-24.
  • Jain, A. K., Ross, A., & Prabhakar, S. (2016). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. https://doi.org/10.1109/TCSVT.2003.818349
  • Green, M., & Smith, M. (2016). The cryptopals crypto challenges. Communications of the ACM, 59(7), 24–26. https://doi.org/10.1145/2948086
  • Hadnagy, C. (2018). Social engineering: The science of human hacking (2nd ed.). Wiley.
  • Media Foundation for West Africa. (2021). Internet Freedom Report – Ghana.
  • Kuzaga, E. B. (2025). An examination of laws and practices surrounding SIM card registration in Tanzania: A strategy to combat mobile phone-related cybercrime. East African Journal of Law and Ethics, 8(1). https://doi.org/10.37284/eajle.8.1.3595
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cybersecurity Mobile money Cyber Security Authority threats Authentication

Powered by PhDFocusTM