You are on page 1of 65

EXPLORING THE PROS AND CONS OF SIM CARD REGISTRATION:

BALANCING SECURITY AND PRIVACY IN THE DIGITAL AGE

A Thesis
Presented to the faculty
Of School of Education, Arts and Sciences
University of Saint Louis
Tuguegarao City

In Partial Fulfillment
of the Requirements
for the Degree
Research in Political Science 2

BILAG, JOCELLE L.
VERDADERO, DENVER M.
WINGNGA, DEA T.

BACHELOR OF ARTS IN POLITICAL SCIENCE WITH LEGAL STUDIES

MAY 2023
APPROVAL SHEET

In partial fulfillment of the requirements for the degree Bachelor of Arts in Political Science with
Legal Studies, this study entitled: “EXPLORING THE PROS AND CONS OF SIM CARD
REGISTRATION: BALANCING SECURITY AND PRIVACY IN THE DIGITAL AGE” has been
prepared and submitted by JOCELLE L. BILAG, DENVER M. VERDADERO, AND DEA T.
WINGNGA, thus hereby presented for approval.

DARIN JAN C. TINDOWEN, Ph.D.


Research Adviser and Data Analyst

KRISTINE MAE R. AUAYANG, LPT


Language Editor

Approved by the Committee on Oral Examination with a grade of ____

JENNIFER C. BANGI, MARS


Chairman

CHRISTIAN BOSCH S. TAYLAN HERBERT S. CORPUZ, Ed.D.


Member Member

Accepted and approved in partial fulfillment of the requirements for the Bachelor of Arts
in Political Science with Legal Studies.

HERBERT S. CORPUZ, Ed.D


Dean, School of Education, Arts, and Science

Administrative Performance of the Sangguniang Kabataan | ii


DEDICATION

The accomplishment of this research paper is sincerely dedicated to our family and
friends who never leave us, always check on us during the research process as well as for
pushing us whenever we feel demotivated;

To Dr. Darin Jan Tindowen, our research adviser, for his unwavering guidance and
immense commitment to teaching us;

To our research panel, who were the key people in the realization of this study;

To the end-users of SIM Cards for their utmost participation;

To Clement, Emil, and DK, for being our inspiration just by being cute and being our
happy pills.

It is because of you that we and this paper succeeded.

The Researchers

Administrative Performance of the Sangguniang Kabataan | iii


ACKNOWLEDGEMENT

We would like to acknowledge and express our sincerest gratitude to our family, who
never failed to understand us and provided us with moral and financial demands despite their
doubts and accusing and squinting eyes concerning the cost of doing this research. Your
prayer for us sustained us this far.

To our patient research adviser and considerate panelists for their constant direction
and suggestions that carried us all through the tedious stages of authoring this paper.
Without your assistance and insightful remarks, we could not finish this paper.

Our warmest gratefulness to our Circular No. 4456738291 Family who are always
ready to lend their helping hands without any hesitations and without expecting anything in
return.

We would also like to express our deepest appreciation to our friends for supporting us
during the research process and to BAPOS-3 Family, who, despite having the research
papers they needed to attend to, still made time for us and provided us the encouragement
we needed to finish this paper.

Our heartfelt acknowledgment and gratitude to everyone who helped us by contributing


the data we needed for our study; without you, this research article would not have been
possible.

We would also like to thank our Lord for His unwavering guidance and for equipping us
with persistence, wisdom, and strength that enabled us to get through all the difficulties daily.

Without these acknowledged people, finishing this paper would undeniably be


impossible.

The Researchers

Administrative Performance of the Sangguniang Kabataan | iv


TABLE OF CONTENTS

Title Page
Title Page ............................................ i
Approval Sheet ............................................ ii
Dedication ............................................ iii
Acknowledgment ............................................ iv
Table of Contents ............................................ v

ABSTRACT ............................................ 1
INTRODUCTION ............................................ 1
Research Questions ........................................ 3
Hypothesis ........................................ 3
Significance of the Study ........................................ 3
Conceptual Framework ........................................ 3
Literature Review ........................................ 4
Research Paradigm ........................................ 8
METHODS ........................................
Research Design ........................................ 9
Locale of the Study ........................................ 9
Respondents of the Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Research Instruments ........................................ 9
Data Gathering Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Data Analysis ........................................ 10

RESULTS AND DISCUSSIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11


CONCLUSION ......................................... 17
RECOMMENDATIONS ......................................... 18
APPENDICES .........................................
Appendix A – Literature Matrix ................. 22
Appendix B – Questionnaire ................. 44
Appendix C – Interview Questions ................. 49
Appendix D – Adviser’s Acceptance Form ................. 51
Appendix E – Letter to the Vice President for Academics . . . . . . . . . . . . . . . . . 52
Appendix F – Letter to SK Council Chairperson ................. 53
Appendix G – Letter of Endorsement ................. 59
Appendix H – Data Analysis Certificate ................. 60
Appendix I – Certification of Plagiarism Check ................. 61
Appendix J – Certification of Language Editing ................. 62
Appendix K – Minutes of Thesis Defense ................. 63
Appendix L – Progress Report ................. 67
Appendix M – Photo Documentation ................. 68
Appendix N – Curriculum Vitae ................. 69

Administrative Performance of the Sangguniang Kabataan | v


ABSTRACT

The proliferation of SMS scams harassing individuals through SIM Cards became
alarming in the Philippines, and an effective solution must be implemented, hence, the
Republic Act 11934 or the SIM Card Registration Act. This qualitative study explores the pros
and cons of the SIM Card registration Act from users’ perceptions. This study utilized a basic
qualitative design. Fifty-seven informants who either registered their SIM Cards or those who
do not yet registered took part in the study. The finding revealed two major themes exploring
the pros and cons of the SIM Card Registration Act. The first major theme, which is the
“Reasons for not registering,” has five sub-themes to wit: (1) Mandate Compliance; (2) Avoid
Deactivation for continued use; (3) Safeguard the users from scams and fraud; (4)
Identification and Legal Purposes; and (5) Trust in the Law. The second major theme, which is
the “Reasons for not registering,” has five sub-themes to wit: (1) Privacy Concerns; (2)
Insufficient comprehension of the said law; (3) Lack of Knowledge; (4) Unavailability of Valid
ID; and (5) Uncertainty in Benefits. The result generated that the law's enactment has negative
and positive implications. As such, the SIM Card Registration Act establishes a crucial link
between the reasons for the acceptance or rejection of the users and the SIM Card
Registration Act. The recommendation focused on developing campaign planning that may
push for a more in-depth and comprehensive evaluation of the said legislation.

Keywords: SIM Card Registration Act, Perceptions, Pros and Cons, Privacy and Security

INTRODUCTION

Over the past few decades, the Philippines has steadily caught up to other nations
regarding providing the country access to telecommunication, including the Internet. The
formation of the nation's first telecommunications company in 1928 marked the beginning of this
progression. On March 29, 1994, the nation created its first-ever internet connection. Such a
turning point paved the way for development and provided Filipinos access to the Internet's
limitless information (Salac, 2016). There are almost 119 million subscriptions from a total
population of 101 million in the country. The result was quite evident as the Philippines was
trademarked as the Text Capital of the world with over 83 million mobile phone subscribers,
making it a refuge for fraudulent SMS messages in which scammers have turned to a variety of
inventive and harmful techniques advancing to address their victims by their first names effort to
confuse more people (Mercado, 2022). 

In emerging nations, modern telecoms systems are primarily mobile rather than fixed
lines. The argument is that mobile systems may be deployed more quickly and cheaply than
permanent lines. It has been evaluated that a mobile network values 50 percent less per
connection than fixed lines and can be rolled out appreciably quickly (Waverman et al., 2014). 

However, Congress has to take action to stop the inappropriate and illegitimate use of
SIM cards since the spread of tailored spam texts or messages tormenting and inciting people
via their mobile phones has become a serious problem. (Dy, 2022). It is a cause for alarm when
occurrences such as the recent wave of text messages promoting fraudulent employment occur,
especially when it invades people's privacy. The National Telecommunications Commission,
which is responsible for managing the affairs of the nation's radio communications,
telecommunications, and broadcast, including cable television (CATV) facilities and services,
has repeatedly advised cell phone users to completely disregard messages that offer jobs,
prizes, and other similar things and has urged them to report such incidents to the authority. 

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 1
These issues regarding the use of Sim Cards have driven telecommunication companies to take
action to minimize such escalations. Philippine telecommunications provider Globe Telecom Inc.
said it has blocked nearly 71 million spam messages and deactivated 5,670 mobile-phone
numbers this year amid public complaints about dodgy job offers they receive on their gadgets
(Yap, 2021). 

The effective method the Philippine government is considering is the execution of 
Republic Act No. 11934, also known as Subscriber Identity Module (SIM) Registration Act,
which has been circulating around for months now until its official signing to become law on Oct.
10, 2022, has come into actuality to protect the privacy of many Filipinos from being at risk to
intrusion from unscrupulous people who are using false personal data and narrative to either
deceive or defraud individuals (Congress, 2022). In a statement, Abalos Jr. (2002), stated that
the newly-implemented law is a welcome development in fostering "accountability at all levels"
in lessening the communication through SMS would also reduce the criminal acts committed
nationwide. In addition, the new law would enable the Philippine National Police and other law
enforcement agencies to rapidly respond to complaints and cases involving mobile scams as
they will easily track offenders and resolve misconduct involving telecommunication devices
(Caliwan, 2022). 

This entire article on Sim card registration subjects Telecommunication companies to a


serious and significant responsibility. They are obligated to adopt and implement the directives
on mobile consumers through SIM card registration to safeguard their citizens and protect
consumers’ use of communications networks and services (Helkom, 2011)). According to the
provision of the mentioned law, public telecommunication entities (PTEs) require SIM Card
Registration prior to the sale and activation of a subscription. It further states that the end-users,
with either postpaid or prepaid subscriptions, shall be required to register their SIM with the
public telecommunications entities, or PTEs, which are engaged in the business of providing
telecommunications services, as a prerequisite to activating the SIM card. All SIM subscribers
who have not yet registered their SIM cards are given an extension of 120 days before the 180
days that were initially given. (Dy, 2022). However, the law also states that if a sim card holder
doesn’t register, the PTE can automatically deactivate or retire the SIM card number. The SIM
card owner shall be responsible for reporting its loss or any change in the given information
after registering. (O’Grady, 2022).

On another note, this controversial Sim Card registration act generated a myriad of
issues ranging from its risk and threats to its effectiveness regarding its objectives and purposes
down to its convenience to the users. One of the debated issues being discoursed relating to
the executed law is its risk concerning data and information, which is also seen as a
constitutional violation of the right to privacy. The possibility of surveillance by required SIM card
registration is the most concerning problem. Investigative journalists, whistleblowers, witnesses,
members of marginalized groups, and those who have experienced prejudice and persecution,
whether state-sponsored or not, are among those who face substantial risks. Privacy
International stated in its State of Privacy report that Zimbabwe's SIM card registration law
effectively eliminated the possibility of inconspicuous communication, facilitated location tracing,
and considerably streamlined communications monitoring and interposing. (Privacy
International. The State of Privacy 2014).

 Furthermore, Varandi (2014) states that in some areas, registration made some crimes
more prevalent and even aided in the development of underground markets. Pakistan's situation
is noteworthy. Authorities in charge of law enforcement allegedly found SIM cards used in a
terrorist assault in 2014. The cards were subsequently linked to unknowing people. without a

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 2
connection to the incident. In the Philippines, the local telecommunications industry has
maintained a unified front on this matter. The local telecommunications industry in the
Philippines has remained united on this issue. The two monstrosities that effectively make up
the whole business, Philippine Long Distance Telephone Co. (PLDT) and Globe Telecom,
collaborated with other PCTO members in 2013 to present a position paper against a mandated
SIM card registration system. The coalition has repeatedly stressed the measure's inefficiency
as a countermeasure to crime as well as its detrimental impact on limiting one's right to
communication in this age of the Internet. (Rappler, 2013). Another topic worth mentioning is the
Sim Card registration Act’s convenience to consumers. This issue received negative feedback
not just from the end-users but also from the telecommunication regulators, as the whole
process of registering a sim card is considered impractical, and its subscriptions would
inevitably entail significant costs. Conferring from the study of Okonji (2015), it was established
that telcos still encountered several difficulties when registering a sim card owner. He said that
logistical considerations for the registration procedure should also be taken into account.

Demanding for SIM card registration will inevitably lead to rising application applications
for government-issued identity since a sizable section of the population, especially
underprivileged groups, lacks any currently valid identification documents. Then there is the
government's and telecoms' physical capacity to process registration, including equipment
availability. Similar issues have been raised in other studies, and it has been stated that such
registration burdens subscribers because prepaid rates must rise to fund the expense of the
registration system. Further, it would be difficult for the fifteen regional offices of the National
Telecommunications Commission (NTC) to handle over 100 million mobile subscriptions (Cruz,
2016). It is not expected nor anticipated that sim card registrants will reach 100% or more than
168M SIM Cards sold in the country (DICT, 2023). Statistics also showed that 49.3%, or 82.8
million, of the 168M active SIM cards in the Philippines had been recorded as of April 23, 2023,
three days before the registration period's purported end of four months or one hundred twenty
days (120). The Department of Information and Communications Technology (DICT) revealed
that the Philippine government had extended the deadline for SIM card registration by 90 days
following the registration deadline (BusinessWorld, 2023).

Thus, this paper argues that this Sim Card Registration Act inculcated under Republic
Act No. 11934, despite being a lawyer, is still relatively contentious due to its burdens and risks
on the sides of telecommunication companies and the end-users. As technology develops and
advances, some people will use it for immoral and harmful purposes, even if it should be used
to bring people together. However, this SIM Registration Act allows for the right resolution of
such wrongdoings as well as the establishment of a platform that will serve as a deterrent to
future illegal usage or exploitation.

Research Objective

The present study will be conducted to explore the factors that affect the registration
and non-registration of _____.

Significance of the Study

This study aimed to provide information and knowledge concerning the impact of
extensive mandatory sim card registration in the Philippines, specifically to SIM Card Users, and
its inclined challenges to Telecommunication Companies. Further, this study will be an avenue
to better understand the various factors that will be affected, such as the right to privacy, free

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 3
expression, and information. The results of this study will be employed to generate new
strategies for future adversities and to improve the effectiveness of the Statute.

Conceptual Framework

The study focused on Republic Act 11934, which requires the registration of a
Subscriber Identity Module that regulates all end-users to register their SIMs with Public
Telecommunication Entities (PTEs) as a pre-requisite of the activation. The study will look into
the process of registering SIM Cards specifically on the aspects of document needed, which
refers to the presentation of valid government-issues identification cards or other similar
documents with photos that will verify the end-user's identity. In addition, violations with its
sanctions or penalties shall also be considered, wherein non-compliance with the provisions
set forth by the law would constitute fines, imprisonment, and offenses. 

Literature Review

Growth of SIM Card Implementation policy

In the current global condition, approximately 52.7% of the 4.6 billion mobile phone
users use mobile phones to browse online, and while these handheld devices can
constructively foster and influence a variety of different development initiatives, crimes that use
these machines have grown to be a huge disturbance for different nations worldwide. These
cybercrimes, which are on rising frequency, include hacking, harassment, identity theft, and
stalking (Kshetri, 2015). Due to these contributing factors, various States expressed their
intentions to develop a system that would counter these illegal acts through mobile phone
messages, hence, the implementation of SIM Card Registration Acts.

Numerous countries, particularly Bangladesh, have developed monitoring schemes


such as surveillance to avert these crimes. However, frequently though, the public only hears
about how this policy is projected to help law enforcement in their efforts to apprehend
terrorists and criminals or, at the very least, deter prank calls and spam messages (Jacob,
2018). Additionally, users in Nigeria have voiced complaints regarding SIM registration, in this
case, because agents charged them for it ostensibly illegally, making it difficult for MNOs to
stop the practice (Adaramola, 2013). Although SIM registration data has been utilized in
particular criminal cases, several investigators and law enforcement authorities believe that
registration fraud is widespread enough to call into question the validity of utilizing any of the
data in an investigation (Smillie, 2012). Furthermore, Uganda saw a drop in its customer base
since it is customary for individuals to use many SIM cards in order to save money on in-
network calls. Still, it may be cumbersome to register multiple SIM cards with various
operators. The dominant logic is responsibilization, where citizens are responsible for
achieving government objectives. Moreover, common bad coping mechanisms like having
several SIM cards are demonized (Kulabako, 2012; Nigeria Communications Week, 2013).

The tedious and bothersome process of registering SIM Cards as well as the several
surrounding doubts regarding its effectivity, were the roots of these contributing causes of
dissatisfaction. Here, customers are frequently forced to spend time visiting registration
centers to obtain identification and submit their personal information due to onerous
registration procedures. Customers may be reluctant to register several SIMs with various
network providers, which might influence the custom of switching SIMs to take advantage of
reduced in-network rates (Mason, 2010). Some customers' locations are unreachable, which
might strain the registration agents financially. Many rural residents of developing nations lack

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 4
identification credentials, including passports, licenses, employee identity cards, and national
identity cards, which might cause issues during registration (Hemeson, 2012). There are
further grounds to question whether SIM registration is a reliable method of accurately
apprehending African criminals. The regulations imply that SIM cards may only be used by
one person, yet shared usage is prevalent on the continent to overcome physical limitations
(Burrell, 2010). Apart from that, several concerns about internet security and privacy related to
this SIM Card implementation were raised. An ethnographic study at ten repair markets in
Dhaka, Bangladesh, was used to explore how people consider privacy in repair and how it
relates to wider social and economic values. The ethnographic work demonstrates various
ways an individual's personal data may be compromised during the repair. They discuss the
difficulties and chances for further study to improve the repair environment in underdeveloped
nations (Ahmed, 2016). Therefore, because of these negative sentiments, it was suggested
that accurate statistics of cell phone users, the number of SIM cards used by a single person,
proper and correct documentation of the SIM card subscription, identification of the SIM card
subscriber and dealer, and simple but secure information transactions during SIM card
purchasing (Hasan et al., 2014).

On the other hand,  the people of Uganda who are found to be knowledgeable about
sim-card registration showed a positive attitude toward it. However, much still needs to be
done to address the growing burdens or challenges affecting the policy, some of which include
bureaucracy and an increase in the number of crimes involving sim cards (Ssebakumba,
2018). Studies also revealed that over 80% of survey participants rate a highly compatible
platform with the SIM unlocked. For almost 70% of consumers, initial payment savings are
more valuable than one-year monthly payment reductions. Additionally, limitations imposed by
ongoing agreements for cell carriers and devices cut the median customer benefit of SIM
unlocking with compatible platforms by 35% (Nakamura, 2010). On top of that, the
corroborations and oppositions to PDI's depictions of Mindanao are closely related to readers'
widely diverse experiences, positionalities, and subjectivities. These highlight a topological
conception of place in which audiences have an active agency in replicating and rewriting
geographic information and imaginations and are so embedded in geopolitical power circuits
(Yuan, 2014).

As the community appears to have a poor impression of the objectives of the entire
registration effort, SIM card registration among mobile communications users has yet to
achieve a fair height of general acceptance (Oyediran et al., 2019).

Advantages and Challenges of Sim Card Registration

There is a developing yet important body of literature on SIM card registration in the
context of other countries. For instance, Donavan and Martin (2012) outlined the advantages
and disadvantages of the SIM card registration process. They revealed that a few of the
advantages include revenue generation for telecommunications companies and governments
and the capacity of law enforcement organizations to address crimes committed using mobile
phones. The capacity to trace lost or stolen mobile phones and the ability of law enforcement
to monitor crimes committed with mobile devices are advantages associated with mandatory
SIM card registration (Jentzsch, 2012; Donavan & Martin, 2014). The registration of SIM cards
has been viewed as a motivator for mobile commerce (m-commerce). Users of registered
mobile technologies can use m-commerce services such as mobile ticketing, mobile banking,
mobile money transfer, mobile ATM, and mobile marketing and advertising (Abu Tair, & Abu-
Shanab, 2014). It was pointed out that SIM card registration seeks to safeguard individuals
and aid law enforcement officials in addressing crimes involving communication devices. In

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 5
regard to SIM card registration, there are additional concerns about consumer privacy and
protection. The exercise could have an impact on how quickly a nation's telecommunications
industry expands (Hemeson, 2012). 

On the contrary, researchers have revealed that SIM card registration might affect user
subscriptions as a result of disconnections, a lack of client identification, and privacy issues.
However, the research also emphasized the advantages of SIM card registration for law
enforcement organizations in tackling issues such as aiding the fight against fraud and crime
(Jentzsch, 2012). Loss of revenue to the telecom companies is another possible issue.
According to the study's findings, legal frameworks are necessary for adopting SIM card
registration (Sumbwanyambe & Nel, 2013). Into the bargain, SIM registration as a surveillance
can possibly unwittingly lessen the anonymity that pre-paid airtime originally provided.
Although it has been emphasized that the evidence for such assertions is still uncertain, these
identity rules may provide a modest security advantage. The SIM registration complicates
these technologies' much-praised emancipatory and developmental effects, which is more
significant for the current debate (Donovan et al., 2014).

Consequently, all SIM cards Registration Exercises have resulted in a short decline in
the number of mobile customers in several nations (Southwood, 2011). A move toward
creating access hurdles, particularly for the poor and vulnerable communities, is represented
by SIM registration. According to Millicom International Cellular's Head of Regulatory Affairs
for Africa, For those who are most economically challenged, these criteria create significant
"access" challenges (Kamara, 2013). Even if it is by definition neither troublesome nor illegal
to grant access to a smartphone user's personal data, current smartphone operating systems
do not offer an acceptable level of protection for the user's personal data. However, several
suggestions might significantly ameliorate the issue and allay consumers' worries about their
privacy (Tsavli, 2015).

Today's users use their mobile smart devices for everything from online payments to
banking. Hackers have a very profitable target as people depend increasingly on their mobile
devices as digital wallets. Mobile device owners such as cell phone owners should anticipate a
noticeable rise in malicious software on applications connected to the financial sector, such as
mobile banking (Arabo, 2012).  Despite the alarming threats of mobile smart devices,
subscribers choose to reclaim their old SIM cards rather than purchase new ones to reconnect
with their friends and loved ones and to stop thieves who have stolen or grabbed their phones
from utilizing the lines to conduct crimes and accuse them (Chinwokwu, 2014).

Infraction of the law to Right of Privacy

The right to privacy is an inviolable human right that cannot be diminished, nor can it
be subsumed under any government law or policy. Under Section 3. P. (1) of the Bill of Rights
of the Philippine Constitution, “The privacy of communication and correspondence shall be
inviolable except upon lawful order of the court, or when public safety or order requires
otherwise, as prescribed by law.” While the SIM Card Registration Act would be used to
combat online scams, it might also be used to compromise the Data Privacy of Individuals
(Lalu, 2022). The SIM Card Registration Act enables minors to register their SIM Cards, but
only with the express written approval of their parents or guardians, which must be submitted
with the registration form, a valid picture ID, and a photo of both the child and the parent or
guardian. But minors frequently lack the necessary papers, which prompted one Rwandan
observer to claim that "minors who own phones without their parents' or guardians' consent
will effectively be disconnected" (Kanyesigye, 2013).

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 6
It was known that the mandated SIM card registration policy might be changed
voluntarily to solve local issues with mobile technology or coercively to comply with
international accords.  However, the transfer of Malawi's required SIM Card registration was
hampered by insufficient identity cards for mobile device users and hindered the legal
framework in place. When implementing the required SIM card registration policy, considering
different sectors would be essential (Mazoka, 2015). The local and contextual norms around
ownership, identification, and security issues further made the biometric registration scheme
difficult. Significant dissatisfaction with the biometric SIM registration procedure was reported
through an online survey. Our participants indicated concern about being used for commercial
gain, politically exploited, or having their privacy invaded (Ahmed, 2017). 

According to the ITE Law, the Criminal Code Law, and the Population Administration
Law, registering smartphone SIM cards unlawfully carries criminal responsibility penalties for
using someone else's Personal Identity Number and Family Identity Number. Therefore, it was
emphasized and determined that using a Personal Identity Number or Family Identity Number
for electronic transactions without the owner's consent is a crime. (Aziz, 2022). The findings of
the privacy-enhancing study show a general lack of understanding of privacy concerns and
less care for privacy in India than in research of a similar nature carried out in the United
States (Danezis, 2010).

METHODS

Research Design

A qualitative type of research was utilized employing basic qualitative research by


Merriam and Tisdell (2016) to explore the perceived risks and benefits of the SIM Card
registration law.

Locale of the Study

The study was conducted in Tuguegarao City and the City of Ilagan, Cagayan Valley.

Informants of the Study

The informants of the study were the 57 individuals selected using a convenience
sampling technique, targeting residents in the City of Tuguegarao and the City of Ilagan.

Research Instruments

This study utilized the following instruments:

a. Online Survey

The research instrument is an online survey consisting of a yes/no question and open-
ended questions through Google Forms format. A question is made pertaining to the kind of
SIM they own and if they have or haven’t registered yet. Als, an open-ended questionnaire was
used to interview the respondents regarding the perceived role of the SIM Card Registration
Act.

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 7
b. Focus Group Discussion

The researchers utilized a focus group discussion to gather our informants' unbiased
responses.

Data Gathering Procedure

The researchers collected the data by sending survey questions in a G-Form format in
different online platforms to the target respondents who had recently stayed at boardings,
apartments, and their houses in Tuguegarao City. Correspondingly, a focus group discussion
and face-to-face interviews were made to respondents available to talk with the researchers
regarding the study. Furthermore, the researchers supported the participants to ensure a clear
understanding of the study's objectives. Additionally, strict protocols were implemented,
particularly when engaging in direct and in-person interactions with the respondents. 

Data Analysis

The researchers utilized thematic analysis of Clark and Braun (2003) to analyze the
data in order to identify common themes and patterns of meaning that come up frequently.
Also, it was used by the researchers to know if there are similarities or differences in the
perception of SIM Card Users. The researchers were able to generate different themes through
the answers of the respondents. 

RESULTS AND DISCUSSIONS

Reasons For Registering Sim Cards

1. Mandate Compliance

Many informants registered their SIM cards because they were mandated by the
government or required by the law. This often refers to the process of collecting and verifying
personal information from individuals purchasing or using SIM cards for mobile devices. These
responses indicate that individuals registered their SIM cards primarily because the
government mandated it. They complied with the requirement to avoid potential
consequences, such as SIM card deactivation or legal issues. They acknowledged the
necessity of adhering to the law and ensuring their SIM cards were registered within the given
deadline. Responses are as follows:

RO1, RO2, RO3, RO4, RO10, RO15, RO20, RO23, RO25: Yes, Because it's
mandated. They said that if you do not register your sim, you will not be able to use it.

RO17, RO36, RO39, RO43: Yes, Because of the sim card registration deadline, I don’t
want it to be blocked.

RO53: Yes, Automatic registration for postpaid users.

When authorities are regarded as legitimate, they can inspire people to obey the law.
This is the evident reason why SIM Card Users registered their SIMs as it is required mainly

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 8
by the law. It is passed in order to ensure that all users will comply with registering.  Supported
by Tyler & Jackson (2013), legitimacy plays a vital role in social regulation to make people
obey the country's policies. Inevitably, people are compelled to register their SIM Cards for
protection and security from fraudulent people who commit cyber-crimes through SMS. While
the law provides certainty of its benefits to the people as well as the law enforcement
authorities. The registered users feared that their SIM Card would be deactivated and that they
would not be able to contact their close relatives, which is necessary today. In order to remain
connected with them and to avoid the consequences, the users are compelled to register their
SIM Cards. 

The procedural justice model of public compliance with the law gives a better
framework for articulating the motivations behind people's willingness to obey the law. It helps
sustain and strengthen the ability of the higher authority to motivate the citizens to regulate
themselves. This supports the idea why 75.5 million people have already registered their SIM
Cards as of April 20, 2023 (NTC, 2023).

2. Avoid Deactivation for continued use

People registered to ensure they could still use their SIM cards and maintain mobile
services. Individuals feared their SIM cards would be deactivated if they did not register.
People registered to prevent their SIM cards from expiring or being blocked. Some of the
answers and verbalizations are as follows:

RO5, RO8, RO9: Yes, so that I can still use my Sim card.

RO11, RO27, RO42, RO44, RO45: Yes, I complied because they might deactivate my
sim if I don’t register. I might light the accounts that my number is connected with due
to deactivation.

Overall, these responses highlight various reasons individuals register their SIM cards.
The motivations range from wanting to continue using the SIM card and comply with
regulations to fear of deactivation or losing important communications and connections.
Registering SIM cards serves as a means to maintain uninterrupted access to communication
services and avoid potential inconveniences or disruptions.

Regulators sometimes impose strict registration deadlines. This implies that all current
users must register their SIM cards within a certain time frame, and all new customers must
also be verified. Active, unregistered SIM cards are turned off once the deadline has passed.
(Jentzsch, 2012). The registration process is about the user giving their name, proof of
identity, and some details to a cell phone company. Mobile network operators will deactivate
SIM cards of consumers who have not registered on time, or the regulator shall fine them for
continued use of unregistered SIM cards. When problems or troubles have been introduced in
other countries, deadlines have been extended, but nonetheless, SIM cards have been
deactivated after the final deadline (Watson, 2020). Thus, after which all unregistered SIMs
would become non-functional (Haque et al., 2017). 

Counting active SIM cards is no longer possible since a single wealthy customer with
one telephone number can have different SIM cards: a mobile handset, a lap‐top computer, a
car, and a personal digital assistant. SIM cards are inexpensive and widely available; many
phone users own multiple lines. More importantly, phone ownership is highly non-random and
rarely observed among the poor. They may also select different networks for voice and data

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 9
services, becoming, in effect, two customers. Registering SIM cards avoid deactivation and
continuous usage of devices requiring a SIM (Drillon, 2012).

3. Safeguards the users from scams and fraud

Some registered their SIM cards for safety purposes, to protect themselves from
scams, fraud, or unauthorized use of their personal information. SIM card registration was
seen as a means to combat fraud, safeguard national security, and contribute to a more
secure communication ecosystem. Registering SIM cards helped limit the chances of scams
and crimes committed through mobile phones. Responses are as follows:

RO7, RO21, RO30: Yes, For safety use.

RO13, RO16, RO29, RO32, RO34, RO38: Yes, Because it is a mandate of the law. If it
was not mandatory, I would not register it because I am scared of possible data leaks
that would result in my name, number, and ID being used by scammers or fraudsters to
scam someone.

RO19, RO21, RO52: Yes, because it's a must and extra protection in social media.

RO49: Yes, I can’t risk losing my contacts to prevent an unknown scam caller.

Overall, these responses highlight the importance of registering SIM cards for safety
and protection. Participants emphasized the added security, accountability, and reduced risk
of unauthorized use that come with registering. They recognize that while there may be
concerns about data privacy and leaks, complying with registration regulations helps combat
scams, fraud, and other malicious activities, making mobile communication safer and more
secure.

Hemeson (2012) notes that registering SIM cards aims at protecting citizens and
supporting law enforcement agents in the area of cybercrimes related to communication
devices. It shall aim at promoting responsibility for the use of SIM and providing law
enforcement agencies with means to deal with crimes linked to its use. It also imposes
penalties for misuse of registration and allows law enforcement access to data on the users
when investigating any crime relating to the use of a phone. (PNA, 2023). Sumbwanyambe &
Nel, 2013, provided that SIM card registrations may help combat the crimes that occur through
SMS or any other form of illegal activity regarding a SIM card. In the past, such registration
has not yet been carried out, and a number of governments have started to require it due to
increasing crime and fraud schemes involving cell phones. As I have pointed out, combating
crime and preventing fraud is a key reason for the measure. (Jentzsch, 2022). 

In order to ensure security, there is a growing body of literature that recognizes the
importance of SIM cards. According to Jacques (2018), SIM cards are instrumental in tracking
subscribers' location and communications by means of the offline metadata generated on
mobile phones: call detail record, visitor location register & passive monitoring system, thus,
reducing the number of crimes due to its implication.  As the SIM registration exercise aims to
reduce mobile phone-related crimes such as prank calls, cybercrime, kidnapping, mobile
money fraud, and general security matters, it safeguards people from different types of
offenses such as scams and frauds. While SIM card registration contributes to safety and

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 10
security, it is important to note that it is just one component of a broader security framework
(Boateng et al., 2022).

4. Identification and Legal Purposes

Registering provided identification and legal compliance, especially for banking


transactions and linking phone numbers to important accounts. During SIM card registration,
the transaction and identification process involves several steps to verify the identity of the
individual purchasing or using the SIM card. Registering aims to prevent fraudulent activities
and ensure that the legitimate owner is using the SIM card. Responses are as follows:

RO14, RO18, RO28: Yes, Considered the registration to have an identification and for
legal purposes

RO31: Yes, Because of the benefits. I want to secure all my transactions and adhere to
the country's policy.

RO41: Yes, I am considering registering, as my phone number is linked to my bank


accounts for online banking purposes. Once my number is deactivated due to not
registering the SIM, I won't be able to do bank transactions.

These responses demonstrate a range of reasons for registering SIM cards.


Participants recognize the mandatory nature of registration, the need for proper identification,
the desire to maintain access to long-held numbers and essential information, compliance with
legal requirements, and the benefits of registration, such as enhanced security for
transactions. By registering their SIM cards, individuals ensure the continued usability of their
numbers and uphold legal obligations while safeguarding their personal information and digital
activities.

The government’s new directive is to make SIM Card Registration a new identification
of SIM Card users, especially for transactions and linking phone numbers to important
accounts. The Identification would regulate people’s interaction through SMS with the State
and other institutions (Martin & Taylor, 2021).  Further, it would allow a new identification
that enables the authorities to track those who will commit fraud. Therefore, SIM Card
registration is beneficial to the subscriber as well as to the authorities who are the agents of
the law, as it is essential during transactions to prevent fraudulent activities (di Castri, 2013)

5. Trust in the Law

Despite concerns about privacy, some individuals trusted the law and registered their
SIM cards. Trusting the law on SIM card registration means having confidence in the legal
framework and regulations established by the government or regulatory authorities regarding
the registration process. It involves believing that the laws are designed to protect individuals,
enhance security, and prevent misuse of mobile services. Responses and some of the
verbalizations are as follows:

RO22: Yes, Well, basically because I have to save my number first from forfeiture and
second from the SMS scams that the law seeks to eliminate or address. What held me
back a bit during the registration process is the possibility that my privacy would be
endangered. Who knows if they are already able to track my personal
communications? Nevertheless, I still trusted the law and registered in the end.

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 11
RO32: Yes, It contributes to a more secure and reliable communication ecosystem.
More so, Sim card registration assists law enforcement agencies in investigations
related to criminal activities, terrorism, and other illegal practices. It enables authorities
to trace and identify individuals who may be involved in illicit activities using mobile
services. Registering your sim card lets you link your personal information and the SIM
card. This linkage adds a layer of security and helps protect your identity and mobile
services from unauthorized use or theft. If your sim card is lost or stolen, you can report
it to your operator, and they can block the sim card to prevent misuse.

RO51: Yes, I considered registering for a belief that it is essential to curb cybercriminal
activities. I believe compliance with the law will help the government prevent such
crimes, creating a safer space for us as mobile users.

These responses highlight the delicate balance between privacy and security concerns
regarding SIM card registration. Participants recognize the benefits of registration, such as
preventing forfeiture, protecting against scams, assisting law enforcement, and curbing
cybercrime. However, there are also concerns about potential privacy risks and the tracking of
personal communications. Trusting in the law and its intended purpose, participants register
their SIM cards, understanding that compliance with the regulations aims to create a safer and
more secure mobile communication ecosystem.

The advantages of mandatory SIM Card Registration, including the ability to track lost
or stolen phones and track crimes, encouraged citizens to register their SIM Cards (Jentzsch,
2012; Donavan & Martin, 2014). Undeniably, it is one of the main reasons that pushed users to
support SIM Card Registration. The respondents believe it would contribute to more secure
and reliable communication via SMS.  Further, the registration aims at safeguarding the
citizens to deal with crimes associated with communication devices. It provides a safe space
for the citizens to be reliant on the laws regulating this country so that they may be protected
from cyber crimes committed through SMS (Hemeson, 2012) 

Reasons For Not Registering Sim Cards

1. Privacy Concerns

Privacy issues and the potential endangerment of personal communications held back
some individuals from registering their SIM cards. Privacy issues can arise in SIM card
registration due to the collection and handling of personal information. Responses are as
follows:

RO6. R26, No, I am concerned for my privacy.

RO24: No, IT experts articulated that “RA 11934 could intrude on users' privacy and
might not be effective in discouraging scams and crimes via text messages or phones”,
contradictory to the statement of Bongbong Marcos, “It shall be treated as absolutely
confidential unless access to this information has been granted with the subscriber’s
written consent.” 

These responses highlight the significant privacy concerns and criticisms surrounding
SIM card registration. Participants express their apprehensions about sharing personal

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 12
information and the potential risks associated with data privacy. The contradiction between
claims of confidentiality and skepticism about the effectiveness of registration further adds to
the doubts surrounding the process.

Governments and telecommunication authorities must address these privacy concerns


and criticisms when implementing SIM card registration policies. Transparency, clear data
protection guidelines, and robust security measures can help alleviate fears and build trust
among users. Striking the right balance between privacy protection and security objectives is
essential to ensure that SIM card registration processes are effective, respectful of privacy
rights, and capable of addressing the intended goals without unduly infringing on individuals'
privacy.

Individuals in this category raised concerns about privacy and potential infringement on
their data. They hesitated to register their SIM cards because they feared their information
being leaked or misused. They questioned the effectiveness of the law in protecting their
privacy rights and were cautious about sharing their personal communications. One of the
negative notions of SIM Card Registration is that people were confused and doubtful of it
because they feared it would invade their privacy rights (Haque et al., 2017). This could
negatively impact the telecommunications company as users fear their data would be leaked
despite being protected from fraudsters.

Issues concerning consumer privacy and protection related to SIM Card Registration
would affect the growth of the telecommunication market of a country as it would limit the
users because of their hesitations to register (Donavan & Martin, 2014). Further, a journalist
from Uganda claims that disconnection of SIM Cards when not registered violates
“fundamental human rights like freedom of expression, right to privacy and access to
information.” (Anite, 2013; Agaba, 2012; HRNJU, 2013).

2. Insufficient comprehension of the said law

Inadequate information about cybersecurity, privacy, and the law's correlation to civil
rights or liberty made some hesitant to register. Insufficient knowledge about the law on SIM
card registration refers to a lack of understanding or awareness regarding the specific legal
requirements, obligations, and implications associated with the registration process.
Responses are as follows:

RO40, RO47, RO50, RO55: I haven’t registered yet because I feel hesitant due to a
lack of knowledge regarding it. I feel like there are a lot of steps and procedures to
take.

These responses highlight various reasons for not registering SIM cards, ranging from
a lack of knowledge or understanding about the registration requirement to procedural hurdles
and perceived complexities. Factors such as awareness, convenience, and perceived effort
required can influence individuals' decisions regarding SIM card registration.

The challenge imposed by the SIM Card Registration law is that it faces limitations
where the users lack sufficient knowledge of the implications of the SIM Card Registration law
(Ahmed, 2017). It discourages the users from registering their SIM Card because they have no
idea about the SIM Card Registration law, resulting in neglect of the registration required by
the law.  

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 13
Some users would prefer not to register their SIM Cards instead of allowing the State
to penetrate their data. This indicates that users with little understanding about the SIM Card
registration disregard mandatory registration despite its consequences (Ettelt, Mays & Nolte,
2012). Further, the advent of SIM Card Registration needs to introduce terms incorporated into
it, such as cybersecurity, privacy, and the law’s correlation to civil rights or liberty, making it
difficult for some users to understand the real essence of this law.

3. Lack of Knowledge

Some individuals stated that they had not registered because they were unaware of the
entire law or did not receive guidance from their children. Lack of knowledge on SIM card
registration refers to a situation where individuals may not know the requirements, procedures,
or implications of registering a SIM card. This lack of knowledge can lead to confusion, non-
compliance, or potential misuse of mobile services. Verbalization is as follows:

RO35: No, Hindi ko pa alam yung buong batas. Ayaw din ako turuan ng mga anak ko
paano magregister kaya hindi pa ako nagreregister. (I don’t know the whole law. My
children also don’t want to teach me how to register that is why I haven’t registered
yet.)

It is important to foster a supportive environment where individuals can seek


assistance completing the registration. Providing guidance and support through customer
service channels, online resources, or community initiatives can help overcome barriers such
as a lack of tech-savviness or the unavailability of help from family members. Empowering
individuals with the necessary knowledge and assistance can encourage greater participation
in SIM card registration, promoting compliance with the law.

Individuals in this theme expressed hesitation or lack of registration due to inadequate


information or understanding about the law and the registration process. Some mentioned not
being aware of the law's details, while others indicated a lack of guidance from their children or
a lack of valid identification documents as barriers to registration. Many older people require
assistance with routine activities, especially in computer applications. Numerous barriers
hinder adults from embracing technology, including their digital literacy skills. Hence, they
need their children to assist them in registering their SIM Cards (Xie, 2020). This is one of the
reasons why some users do not register their SIM Cards. 

4. Unavailability of Valid ID

Individuals without valid IDs were unable to register their SIM cards.

RO37, RO55: No, Don’t have valid IDs yet.

These responses highlight how the lack of a valid ID can hinder SIM card registration.
Valid identification documents are typically required to verify the identity of individuals and
comply with legal and regulatory requirements. Individuals may face difficulties completing the
registration process without a valid ID, as they cannot meet the necessary identification and
verification criteria.

In such cases, telecommunication companies and regulatory authorities need to


explore alternative methods or provisions for individuals who do not possess valid IDs. This
may include accepting other forms of identification or implementing processes that

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 14
accommodate individuals obtaining a valid ID. By addressing this barrier, more individuals can
access SIM card registration and the associated benefits of legal compliance and enhanced
security.

As supported by Jentzsch (2012), sim Card registration greatly impacts customer’s


subscriptions because some users do not possess valid identification, which is the main
requirement for the former. This has been one of the challenges faced by the SIM Card
Registration Act, as those who do not have a valid ID may not be able to register, leading to
disconnections of their cellphones. 

Aside from the valid identification, some of the consumers are located in inaccessible
areas, especially in the IP rural areas do not possess identification documents such as
passports, drivers license, national identity cards, or employee identity cards which may create
problems during the registration process (Hemeson, 2012; Ahmed, 2017). This is a burden,
especially if the Philippine Identification System (PhilSys), commonly known as National ID, is
not yet delivered to the respective houses of the users.  

5. Uncertainty in Benefits

Some individuals registered their SIM cards late or solely for compliance purposes,
expressing doubts about the claimed benefits of registration. Lack of belief in the benefits of
SIM card registration refers to a situation where individuals may not recognize or understand
the advantages of registering their SIM cards. This lack of belief can result in hesitancy or
reluctance to undergo the registration process. A response is as follows:

RO56: Yes, I registered late because I don't believe in its benefits. I just complied to
avoid inactivation.
       
This response highlights an interesting perspective where individuals may comply with
SIM card registration requirements despite not fully believing in the stated benefits. It reflects a
sense of obligation driven by the potential consequences of non-compliance rather than a
genuine conviction in the advantages or effectiveness of the registration process.

It is important to address such skepticism and enhance public understanding of the


purpose and benefits of SIM card registration. By providing clear information and evidence on
how registration contributes to security, privacy protection, and reducing fraudulent activities,
individuals may better appreciate the registration process's importance and potential
advantages. Communicating the value of compliance beyond mere avoidance of penalties or
deactivation can help foster greater trust and engagement among users.

Although SIM Card Registration is quite successful, it does not deny that some
individuals registered for compliance. This is so because, even after the registration, there are
still doubts about its effectiveness in combating the increasing crime involving SMS. Some
users are not convinced enough about its inclined benefits but still register it because of its
perceived consequences (The Guardian, 2015).

Questions arising include its effectiveness and its mechanisms to be utilized by


national security and the fear of citizens of misuse of personal data. Accepting citizens with the
SIM Card Registration does not imply that they are fully confident with its mandate and
directives. Also, it is interesting to note that the SIM Card Registration. For example, in
September 2010, there was a wide circulation of a hoax text message in Tanzania warning

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 15
people that they would die if they received calls whose numbers were in the red. The message
raised fear and panic among most Tanzanians. Some people challenged the registration of
SIM cards, which aimed at enhancing security from misuse of mobile phones. There were also
defamatory and hateful text messages circulated to millions of Tanzanians in the political
campaign for the last October 31, 2010, general elections, attacking presidential candidates
for Chama cha Demokrasia na Maendeleo (CHADEMA) and the Civic United Front (CUF), two
opposition parties (Guardian, 2013).

CONCLUSION

The passage of this SIM Card Registration Act enunciates both negative and positive
implications for end-users who have registered their SIM cards and those who do not yet
register. These reasons were categorized to gain a comprehensive understanding of the
factors at play between those registered and those who haven’t registered yet. The Sim Card
Registration Act is essential to the reasons for the users' acceptance of the SIM Card
Registration Act. The result showed that the main reason for the user’s registration is
compliance with the said SIM Card Registration Act. Most of the responses were drawn from
the fact that it is a requirement implemented by the State throughout the country, hence
enabling them to register their SIM Cards. The legitimacy of the State has forced the people to
comply with the policies of the State, thereby making it a requirement despite being a
necessity to fulfill. While those who are yet to register, most of the respondents have
inadequate information about the said law, which discourages them from registering their SIM
Cards. Subscribers prefer not to register their SIM Cards than to learn what the law could offer
and to risk their SIM Cards. Also, by actively promoting awareness, providing clear guidelines,
and offering support, the lack of knowledge on SIM card registration can be addressed,
leading to increased compliance and better utilization of mobile services while maintaining
security and regulatory objectives. Understanding this context, the SIM Card users as citizens
of this country would most likely comply because it is required, not because it would be
significant for them.

RECOMMENDATIONS

1. The Congress may use the study to urge SIM Card Users to be more outspoken about
their perspectives on the SIM Card Registration Act to effectively develop a system of
campaign planning that may push for a more in-depth and comprehensive evaluation of
the said legislation. They may utilize the study's findings to create a framework for
monitoring how the registration is being conducted moving forward.
2. The National Telecommunications Commission may improve and organize the
monitoring of SIM Card Registration for those who do not have a valid ID or a
touchscreen phone, which are necessary tools for SIM Card Registration.

3. The Political Science students of USL should further study the implications of SIM Card
Registration and understand how it is facilitated in the Indigenous Communities as they
lack the essential requirement for registration.

4. Future Researchers may use this study to broaden their research by examining the
grounds of the users for their registration. 

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 16
REFERENCES

Adaramola, Z. (2013).NCC must keep telecoms operatives on their toes. Daily Trust. May 15,
12-14. Retrieved from
https://www.researchgate.net/publication/290838724_Subscribers'_Perception_of_
SIM_Card_Retrieval_Implications_on_Criminality_and_Behaviour_in_Calabar_Muni
cipality_Cross_River_State

Ahmed, S. I., Guha, S., Rifat, M. R., Shezan, F. H., & Dell, N. (2016). Privacy in repair: An
analysis of the privacy challenges surrounding broken digital artifacts in
bangladesh. In Proceedings of the Eighth International Conference on Information
and Communication Technologies and Development (pp. 1-
10).doi:10.1145/2909609.2909661 

Ahmed, S. I., Haque, M. R., Guha, S., Rifat, M. R., & Dell, N. (2017). Privacy, security, and
surveillance in the Global South: A study of biometric mobile SIM registration in
Bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in
Computing Systems (pp. 906-918). Retrieved from
http://ww.nixdell.com/papers/paper4089.pdf

Al-Fayoumi, M. A., & Shilbayeh, N. F. (2014). Cloning sim cards usability reduction in mobile
networks. Journal of network and systems management, 22(2), 259-279.
DOI:10.1007/s10922-013-9299-8

Ameen, A. O., Akanni, O. A., Alimi, O. M., & Haliru, S. (2016). Design and development of a
unified subscribers’ SIM registration platform using top-down approach. Information
Technologist (The), 13(2), 91-96. Retrieved from
https://www.ajol.info/index.php/ict/article/view/150816

Analyses Mason. (2010). Final report for CRASA: Regulatory impact assessment study on
SADC Home and Away roaming. Retrieved from
http://www.wto.org/english/tratop_e/serv_e/sym_march12_e/doc_safrica_crasa.pdf

Arabo, A., Brown, I., & El-Moussa, F. (2012). Privacy in the age of mobility and smart devices in
smart homes. In 2012 International Conference on Privacy, Security, Risk and Trust
and 2012 International Confernece on Social Computing (pp. 819-826). IEEE.
Retrieved from https://ieeexplore.ieee.org/abstract/document/6406331

Aziz, U. K., & Hidayat, N. A. (2022). Criminal Liability Of Misuse Personal Identity Number For
Cellphone Cards Registration Illegally. Mulawarman Law Review, 17-30. Retrieved
from https://e-journal.fh.unmul.ac.id/index.php/mulrev/article/view

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 17
Burrell, J. (2010). Evaluating Shared Access: social equality and the circulation of mobile
phones in rural Uganda. Journal of computer-mediated communication, 15(2), 230-
250. doi:10.1111/j.1083-6101.2010.01518.x

Danezis, George; Martin, David (2010). [Lecture Notes in Computer Science] Privacy
Enhancing Technologies Volume 3856 || Privacy in India: Attitudes and
Awareness., 10.1007/11767831(Chapter 16), 243–258. doi:10.1007/11767831_16 

de Reuver, M., & Ondrus, J. (2017). When technological superiority is not enough: The struggle
to impose the SIM card as the NFC Secure Element for mobile payment platforms.
Telecommunications Policy, 41(4), 253-262.  doi:10.1016/j.telpol.2017.01.004

DICT. (2023). 96% percent of SIM cards already registered. Retrieved from

Donovan, K. and Martin, A. (2014). The Rise of African SIM Registration: The Emerging
Dynamics of Regulatory Change. First Monday 19, 1-2 (February). Available at:
http://firstmonday.org/ojs/index.php/fm/article/view/4351/3820.

Dy. (2022). Key points on the new SIM Registration Act. Retrieved from
https://www.manilatimes.net/2022/10/27/business/top-business/key-points-on-the-
new-sim-registration-act/1863832

Hasan, N., Ahmed, M. R., Islam, R., & Majadi, N. (2014). Mobile Phone SIM Card: A Security
Concern in the Perspective of Bangladesh. In 16th Int'l Conf. Computer and
Information Technology. Retrieved from
https://sci-hub.wf/10.1109/iccitechn.2014.6997302

Hemeson, C. J. (2012). Directive on consumer data for SIM card registration in the
telecommunications sector: An African perspective. Retrieved from
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1982033

Izuogu. (2010). Data Protection and Other Implications in the Ongoing SIM Card Registration
Process. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.1597665 

Jentzsch, N. (2012). Implications of mandatory registration of mobile phone users in Africa.


Telecommunications Policy, 36(8), 608-620. Retrieved from
https://www.econstor.eu/bitstream/10419/61393/1/722249748.pdf

Kshetri, N. (2015). Cybercrime and cybersecurity issues in the BRICS economies. Journal of
Global Information Technology Management, 18(4), 245-249. Retrieved from
https://core.ac.uk/download/pdf/345085151.pdf

Makoza, F. (2015). An exploratory study on policy transfer for SIM card registration in Malawi.
International Journal of Technology Diffusion (IJTD), 6(1), 33-45. Retrieved from
https://www.researchgate.net/publication/343151338_An_Exploratory_Study_on_P
olicy_Transfer_for_SIM_Card_Registration_in_Malawi

Makoza, F. (2019). Learning From Abroad on SIM Card Registration Policy: The Case of
Malawi. In Handbook of Research on Technology Integration in the Global World
(pp. 389-406). IGI Global. Retrieved from

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 18
https://www.igi-global.com/chapter/learning-from-abroad-on-sim-card-registration-
policy/208807

Maruthi, R., & Jayakumari, C. (2014). SMS based bus tracking system using open source
technologies. International Journal of Computer Applications, 86(9). Retrieved from
https://citeseerx.ist.psu.edu/document?
repid=rep1&type=pdf&doi=d67041b7465247c68802a19979eb0458d187df77&fbclid
=IwAR2u93PTsX6UHNndKBdPbZfGzmhF0BLFFHKMwttMIjPw2277eCptTS9THVY

Mercado. (2022). Smishing: ‘Personalized’ text scams in the Philippines by Neil Mercado
https://newsinfo.inquirer.net/1660190/watch-smishing-personalized-text-scams-in-
the-philippines

Michael, E. C., Chinwokwu, E. C., & Arop, S. K. (2014). Subscribers’ perception of SIM card
retrieval: Implications on criminality and behaviour in Calabar Municipality, Cross
River State. Mediterranean Journal of Social Sciences, 5(10), 620. Retrieved from
https://www.mcser.org/journal/index.php/mjss/article/view/2933

Mulliner, C. (2010, October). Privacy leaks in mobile phone internet access. In 2010 14th
International Conference on Intelligence in Next Generation Networks (pp. 1-6).
IEEE. Retrieved from
http://mulliner.org/collin/academic/publications/mobile_web_privacy_icin10_mulliner
.pdf

Nakamura, A. (2010). Estimating switching costs involved in changing mobile phone carriers in
Japan: Evaluation of lock-in factors related to Japan’s SIM card locks.
Telecommunications Policy, 34(11), 736-746. 

Oyediran, O., Omoshule, A., Misra, S., Maskeliūnas, R., & Damaševičius, R. (2019). Attitude of
mobile telecommunication subscribers towards sim card registration in Lagos State,
Southwestern Nigeria. International Journal of System Assurance Engineering and
Management, 10(4), 783-791. doi:10.1007/s13198-019-00809-6

Rappler. (2013). PLDT, Globe oppose SIM registration. Retrieved from


https://www.rappler.com/business/industries/41972-pldt-globe-oppose-sim-
registration/

Salac, R. A., & Kim, Y. S. (2016). A study on the internet connectivity in the Philippines. Asia
Pacific Journal of Business Review, 1(1), 67-88. Retrieved from
https://koreascience.kr/article/JAKO201627037745764.pdf

Ssebakumba, F. (2018). Knowledge, attitude and practice on Sim-Card registration among the
people in Uganda. Retrieved from http://196.43.133.120/handle/20.500.12281/4445

Tair, H. Y. A., & Abu-Shanab, E. A. (2014). Mobile government services: Challenges and
opportunities. International Journal of Technology Diffusion (IJTD), 5(1), 17-25.
DOI:10.4018/ijtd.2014010102

Tsavli, M., Efraimidis, P. S., Katos, V., & Mitrou, L. (2015). Reengineering the user: privacy
concerns about personal data on smartphones. Information & Computer Security.

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 19
Retrieved from http://eprints.bournemouth.ac.uk/24543/7/Reengineering%20the
%20user.pdf

Waverman, L., Meschi, M., and Fuss, M., (2014). “The impact of telecoms on economic growth
in Developing Countries. Retrieved from https://www.assignmentpoint.com/wp-
content/uploads/2012/04/L_Waverman_Telecoms_Growth_in_Dev_Countries.pdf

White, Tonya; Blok, Elisabet; Calhoun, Vince D. (2020). Data sharing and privacy issues in
neuroimaging research: Opportunities, obstacles, challenges, and monsters under
the bed. Human Brain Mapping, (), hbm.25120–. doi:10.1002/hbm.25120 

Woon, Chih Yuan (2014). Popular Geopolitics, Audiences and Identities: Reading the ‘War on
Terror’ in the Philippines. Geopolitics, 19(3), 656–683.
doi:10.1080/14650045.2014.907277 

Yap. (2021). Millions of spam messages blocked in Philippines as scams surge. Retrieved from
https://ph.news.yahoo.com/millions-of-spam-messages-blocked-in-philippines-as-
scams-surge-005658569.html?
guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAA
M0-
Em7InW_O4RVlwJGEMCWz3uh2Im7di1AHfAG71FHjwR1tWZ9jJqlVqD6vLMpvhN7
ao7t8RcrSkeOD8zgSfWggmuxBbdxhEUbIBT7Hn9VvFxOfc9beFYW0lPVVMeDI50_
6IFxJR0DaJk9Zdb6xR_5RvIvk31lsWnGQ0_gWLm7N&guccounter=2

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 20
APPENDICES
Appendix A
Literature Matrix

Delineating
factors/
Bibliography Objective Methods Major findings
variables
Ahmed, S. I., The goal of Repair; privacy; The researchers Findings from this
Guha, S., this study is to developing conducted ethnographic work
Rifat, M. R., improve the country; ICTD; ethnographic conducted at 10
Shezan, F. H., practices DEV; research to repair markets in
& Dell, N. surrounding Bangladesh. understand the Dhaka, Bangladesh,
(2016, June). the repair of practice of show a variety of
Privacy in digital artifacts repairing mobile ways in which the
repair: An in developing phones from the privacy of an
analysis of the countries. point of view of individual’s personal
privacy Specifically, in repairer data may be

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 21
challenges this paper they communities.  compromised during
surrounding examine the the repair process.
broken digital privacy They also examine
artifacts in challenges people’s perceptions
bangladesh. In associated around privacy in
Proceedings of with the repair and its
the Eighth process of connections with
International repairing broader social and
Conference on digital artifacts, cultural values.
Information which usually Finally, we discuss
and requires that the challenges and
Communicatio the owner of a opportunities for
n broken artifact future research to
Technologies hand over the strengthen the repair
and technology to ecosystem in
Development a repairer.  developing
(pp. 1- countries. Taken
10).doi:10.114 together, our
5/2909609.290 findings contribute to
9661  the growing
discourse around
post-use cycles of
technology in ICTD
and HCI.
Ahmed, S. I., The main Privacy; The researchers Our ethnography
Haque, M. R., contribution of security; used qualitative has demonstrated
Guha, S., this paper is to surveillance; method, wherein how the local and
Rifat, M. R., & describe HCI4D; ICTD; they asked situated values and
Dell, N. (2017, findings from a Bangladesh. open-ended practices around
May). Privacy, three-month questions to the ownership, identity,
security, and long participants. exploitation, and
surveillance in ethnographic security and safety
the Global study and concerns challenged
South: A study online survey the biometric
of biometric that show the registration program.
mobile SIM tensions, Furthermore, our
registration in complexities, online survey
Bangladesh. In and challenges revealed substantial
Proceedings of surrounding dissatisfaction with
the 2017 CHI the biometric the biometric SIM
Conference on SIM registration process.
Human registration Our participants
Factors in program in expressed their fear
Computing Bangladesh.  of political
Systems (pp. exploitation,
906-918). commercial use, and
Retrieved from invasion into their
privacy
http://
ww.nixdell.com
/papers/

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 22
paper4089.pdf

Al-Fayoumi, M. This paper Cloned An analytical Analytical results of


A., & seeks to subscriber model is the expected period
Shilbayeh, N. increase the identity module developed to for using a cloned
F. (2014). security of Authentication investigate the SIM card have been
Cloning sim communication Periodic area effects of a obtained. This
cards usability by avoiding location update location area research studied
reduction in fraud of cloned (PLAU) Normal update and how the outgoing
mobile mobile phones location area outgoing calls call rate and
networks. by proposing a update (NLAU) issued by residence time for a
Journal of solution to Universal Mobile genuine mobiles mobile station in LA
network and speed up the Telecommunicat on the use of affects the period of
systems detection of ions Systems illegal mobiles. mobile network
management, cloning SIM (UMTS) Mobility An analytical services use by
22(2), 259- cards management model to cloned SIM cards.
279. investigate the The results show
DOI:10.1007/s effect of that when the
10922-013- outgoing call outgoing call rate is
9299-8 arrival rates, increased, use of the
and location periodic location
area residence update is
time on the significantly affected
detected illegal by E[tr]. However,
user has been the effect of variance
presented.  m LA residence time
is insignificant on
E[tr] when the
incoming call rate is
high. In contrast, the
effect of variance m
LA residence time is
significant on E[tr]
when the incoming
call rate is small.
Ameen, A. O., This work, the Multiple SIMs, The work The new system
Akanni, O. A., “design and SIM registration, employs top- surpasses the
Alimi, O. M., & development status down design existing one as it is
Haliru, S. of a verification, approach using able to register all
(2016). Design centralized, NCC, HTML, PHP, SIM cards of the four
and unified Subscribers. JAVASCRIPT, (4) major
development subscribers‟ CSS, and telecommunication
of a unified SIM MySQL as operators in Nigeria
subscribers’ registration development and verify if a SIM
SIM platform” tools. had already been
registration therefore registered thus
platform using seeks to bringing stability,
top-down address these flexibility, and single
approach. loopholes. platform for all.
Information
Technologist

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 23
(The), 13(2),
91-96.
Retrieved from
https://www.aj
ol.info/index.ph
p/ict/article/vie
w/150816
Analyses The purpose of Architecture of This document Prices for SADC-
Mason, 2010. this study is to roaming,  draws on a total wide roaming at
Final report for examine the Structure of of 32 interviews wholesale level
CRASA: status of roaming, Cost of with operators, appear to be in
Regulatory roaming in the roaming, Price regulators and many cases above
impact Southern of roaming, policy makers the cost of providing
assessment African Market forces,  from within the the service. Retail
study on Development SADC region, margins vary
SADC Home Community as well as our significantly between
and Away (SADC) internal views operators and also
roaming. region, and to and analysis of appear in some
Retrieved from propose a this topic cases to be above
http://www.wto tangible cost. These
.org/english/tra programme of problems are
top_e/serv_e/s action to compounded by a
ym_march12_ reduce the lack of transparency
e/doc_safrica_ high cost of and consumer
crasa.pdf roaming in the awareness of prices
SADC region, at the retail level,
to be which have affected
considered by consumer choice
the Ministers. and competition.
Moreover, policy
makers have little
access to data on
roaming costs,
service volumes and
revenues on which
to make policy
judgements. There
is a lack of adequate
and appropriate
infrastructure in the
region – many
operators only offer
prepaid roaming to a
limited number of
destinations in
SADC, which is a
significant barrier to
consumer adoption.
SADC markets are
at different stages of
their development, in

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 24
regards to the
degree of market
liberalisation and
market competition,
which has a direct
bearing on costs.
Accordingly, there is
no one-size-fits-all
regulatory approach
for SADC at this
stage. 
Arabo, A., This paper Privacy, The researched The paper provides
Brown, I., & El- identifies the connected employed an inside into the
Moussa, F. implications home, profiling, quantitative privacy implications
(2012, and challenges smart device research on the amounts of
September). of privacy to security, smart wherein they data generated by
Privacy in the smart devices home, user identify the users of smart
age of mobility in smart control implications and devices in smart
and smart homes.  challenges of homes. In the near
devices in privacy  to smart future, mobile smart
smart homes. devices in smart device users can
In 2012 homes.  expect to see a
International striking increase in
Conference on malware and notable
Privacy, advancements in
Security, Risk malware-related
and Trust and attacks, particularly
2012 on the Android
International platform as the user
Confernece on base grow
Social exponentially.
Computing Today’s users utilize
(pp. 819-826). their mobile smart
IEEE. devices for
Retrieved from everything from
https://ieeexplo banking to online
re.ieee.org/abs payments. As users
tract/document become more
/6406331 dependent on their
mobile devices as
digital wallets, this
creates a very
lucrative target for
hackers. Mobile
smart device users
can expect to see a
significant malware
increase on finance
related applications,
such as mobile
banking.

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 25
Aziz, U. K., & The purposes Cellphone Card; This research The results of this
Hidayat, N. A. of this Criminal uses normative research found
(2022). research are: Liability; legal research, criminal liability
Criminal (1) to analyze Personal ID while methods sanctions for misuse
Liability Of the criminal use Statute of someone else’s
Misuse liability of Approach and Personal Identity
Personal misusing other Conceptual Number and Family
Identity numbers for Approach.  Identity Number for
Number For cellphone registering cellphone
Cellphone cards SIM Cards illegally
Cards registration based on the ITE
Registration illegally is an Law, the Criminal
Illegally. act of crime in Code Law, and the
Mulawarman Indonesia and Population
Law Review, to analyze and Administration Law. 
17-30. compare the This study
Retrieved from laws and highlighted and
https://e- regulations concluded that using
journal.fh.unm concerning a Personal Identity
ul.ac.id/index.p misuse other Number/ Family
hp/mulrev/artic people's Identity Number
le/view/790 numer without permission
of the person who
has it for electronic
transactions is
included as a
criminal act. 
Burrell, J. This article shared access, The data include Users relate newly
(2010). examines inequality, observations available
Evaluating forms of Africa, Uganda, and in-depth technologies to an
Shared shared access ethnography, interviews and existing social order
Access: social to technology mobile phones, an ethnographic and may manipulate
equality and where some communalism, approach to access to
the circulation privileges of culture, gender. data collection technologies
of mobile ownership are and analysis accordingly to
phones in rural retained was employed. preserve, enhance
Uganda. The data used or challenge that
Journal of in this analysis order. Through this
computer- was collected in process users play a
mediated rural Uganda role in determining
communicatio over the course the way benefits of
n, 15(2), 230- of two trips one the new technology
250. from November are distributed to
doi:10.1111/j.1 to December others. The full
083- 2007 and the range of possible
6101.2010.015 second from benefits a phone
18.x July to August user could realize
2008 for a total could be dampened
of 9 weeks of by constraints
intensive placed on access
fieldwork. even though access

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 26
was not wholly
denied. When users
were made to place
phone calls in the
presence of the
owner, they were
denied privacy in
their
communications.
Certain roles
typically mapped to
demographic
categories and it
frequently appeared
to be women who
disproportionately
held roles that
entailed lesser
determinative control
over the device
Danezis, This is an The focus of this The study The results
George; exploratory survey is on included a demonstrate an
Martin, David study to gain members of the survey, mental overall lack of
(2010). an initial Indian high tech model awareness of
[Lecture Notes understanding workforce and interviews, and privacy issues and
in Computer of attitudes students who a review of web less concern about
Science] about privacy might someday site privacy privacy in India than
Privacy among the be employed by policies, all has been found in
Enhancing Indian high the outsourcing conducted similar studies
Technologies tech industry. Our during the conducted in the
Volume 3856 workforce. We sample included summer of United States. 
|| Privacy in carried out a undergraduate 2004. 
India: Attitudes
written survey students,
and and one-on- graduate
Awareness. , one interviews students, and
10.1007/11767 to assess the professors from
831(Chapter level of top Indian
16), 243–258. awareness technical
doi:10.1007/11 about privacy- universities, as
767831_16  related issues well as
and concern professionals. 
about privacy
among a
sample of
educated
people in
India. 
de Reuver, M., This paper Mobile The researchers Beyond just being a
& Ondrus, J. unveils factors payment,  used a technical issue, the
(2017). When that influence Ecosystems, qualitative kind SE choice can
technological stakeholder Multi-sided of research.  To shape the entire

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 27
superiority is preferences for platforms, structure the mobile payment
not enough: the SE Secure element, analysis, we use ecosystem. Based
The struggle to location.  Digital platforms a multi-level on an architectural
impose the framework choice, some actors
SIM card as based on could be empowered
the NFC concepts while others could
Secure borrowed from lose their strategic
Element for multi-sided position in the
mobile platform theory. market. Studying the
payment Using interviews SE preferences of
platforms. with payment providers
Telecommunic stakeholders, allows to better
ations Policy, we elicit themes estimate how a
41(4), 253- and preferences mobile payment
262.  for each level of market could evolve
doi:10.1016/j.t the framework in the future. 
elpol.2017.01. (provider, While none of the
004 technology, and current solutions
user). outperforms the
others on all these
factors, the SIM-
centric architecture
is not a clear winner.
Our analysis shows
that in multisided
platform markets like
mobile payment,
besides
technological
superiority,
anticipated network
effects,
dependencies and
trust in platform
providers play major
roles.
Donovan, K. Viewing SIM GSM To begin filling SIM registration
and Martin, A. registration Association, this lacuna, this represents a form of
2014. The through a lens MobileActive, paper collects communications
Rise of African that combines World Bank, the results of surveillance that
SIM surveillance African research reduces the
Registration: studies and Development conducted in anonymity once
The Emerging information & Bank Group, 2012–2013. afforded — perhaps
Dynamics of communication United National, Building on the unintentionally — by
Regulatory technologies Development previous work of prepaid airtime.
Change. First for Programme, Jentzsch (2012), These identification
Monday 19, 1- development, OECD in October 2012 mandates may bring
2 (February). it examines Secretariat, the we completed modest security
Available at: elements of Media Institute an exhaustive benefits, although as
http://firstmond resistance of Southern survey of the noted, the evidence
ay.org/ojs/inde across a range Africa, and status of SIM for such claims

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 28
x.php/fm/articl of actors, as Research ICT registration remains
e/view/4351/38 well as other Africa.  requirements in inconclusive. More
20. emerging African importantly for the
effects like countries. This present discussion,
access was however, is that SIM
barriers, subsequently registration
linkages to revisited and complicates the
financialization updated in much–lauded
, and Africa’s August 2013. developmental and
budding During this emancipatory
mobile work, we also influences of these
surveillance extensively technologies. Of
society. reviewed the course, this
public record on pessimistic view
SIM registration, ignores the
primarily relying resistance dynamics
on media and that were the focus
civil society of this article
reports. 
Hasan, N., In this paper Authentication, The researchers The results of this
Ahmed, M. R., we have cloud proposed a system are proper
Islam, R., & proposed a computing, model that documentation of
Majadi, N. cloud based central provides a the SIM card
(2014). Mobile SIM card database, PIN process of SIM subscription,
Phone SIM registration code, SIM. card identification of the
Card: A process which registration. SIM card subscriber
Security can be There will be a and dealer, accurate
Concern in the implemented central database statistics of the cell
Perspective of by the use of a containing phone users,
Bangladesh. In central information for number of SIM card
16th Int'l Conf. database all the citizens of used by a single
Computer and the country. The person,
Information profile of each uncomplicated but
Technology. citizen will secured information
Retrieved from create during transaction during
https://sci- birth registration SIM card
hub.wf/10.110 time, so each purchasing. Our
9/iccitechn.201 citizen will have proposed system is
4.6997302 a profile with a hassle free for both
unique ID the customer and
number (like the the dealer. Our
national ID card target is to enlist all
number for the the subscribers
citizen in through this online
Bangladesh) in registration process
that database.  that reflects the
exact number of
subscribers. At the
same time it will
ensure the proper
documentation of

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 29
necessary
information needed
to identify each and
every subscriber.
So, 100%
recuperation of
taxes by the tax
authority of
government will be
ensured.
Hemeson, C. This work Directive, Data Since the The present
J. (2012). examines the Protection, SIM directive is emphasis on SIM
Directive on intent behind Card executed card registration for
consumer data the adoption of Registration, through the mobile telephony is
for SIM card the Subscriber Consumer Data, mechanism of undeserved
registration in Identification National registering new particularly with
the Module (SIM) Security, and existing converging
telecommunica Card Telecommunicat consumers who technology
tions sector: Registration ions, Mobile are required to developments and
An African Directive by technology, provide their other types of
perspective. several African Africa personal data. telecommunications
Retrieved from nations; its Basically, the devices accessible
https://papers. implications data consists of within the sector.
ssrn.com/sol3/ within the their full name, Apparently, were
papers.cfm? telecommunica mobile phone income and revenue
abstract_id=19 tions sector number, date of of
82033 towards its aim birth, gender, telecommunications
of protecting address or proof operators and
consumers of address regulatory
and enhancing (including postal authorities are
state security. and or physical seriously affected,
address), the commissions
identification and earnings directly
document as or indirectly derived
proof of identity, by
and biometrics telecommunications
(finger prints operators from
and picture). In consumers-
Kenya however, individuals and
there is a businesses are
requirement for acutely slashed.
an adult to Currently, it is
accompany a obvious that the
minor with the implementation of
adult registering the directive in most
as owner and African countries
minor as now affect the
consumer of the exponential growth
SIM card. On of the mobile phone
attaining the age market in those
of 18, the minor economies.

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 30
will be at liberty
to change the
registration
details of their
SIM card by
submitting
copies of their
identification
document with
their respective
telecommunicati
ons network and
services
provider.In
Nigeria and
Liberia were the
Biometric
applies, a proxy
is permitted. It is
allowed in the
case of a
corporate body
or other juristic
person with the
Biometric and
other Personal
Information
obtained from
an authorised
representative
of the corporate
body or other
juristic person.
Nevertheless,
the name and
address of the
juristic person
and, where
applicable, the
registration
number of the
juristic person
has to be
maintained.
Izuogu. (2010). This directive Data protection, This directive Even as the SIM
Data coming from Nigerian Law, coming from the card registration
Protection and the NCC was reference NCC process is currently
Other borne out of identification was borne out of ongoing, it still
Implications in the need to number the need to presents some level
the Ongoing have a have a credible of data protection
SIM Card credible database of SIM issues that needs to

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 31
Registration database of card holders in be addressed. As
Process. SIM card Nigeria that will national
SSRN holders in be governments are
Electronic Nigeria that used to identify becoming more
Journal. will be used to (for possible aware of the
https://doi.org/ identify (for prosecution) importance of a
10.2139/ssrn.1 possible criminal actors good data protection
597665  prosecution) who perpetrate framework, Nigeria
criminal actors criminal must consciously
who perpetrate activities strive to ensure that
criminal through the use the personal data (in
activities of mobile whatever form) of
through the phones by the Nigerian person
use of mobile exploiting the is safeguarded. No
phones by anonymity of an doubt, it goes
exploiting the unregistered without saying that
anonymity of SIM Card. the common
an Nigerian person
unregistered values his privacy
SIM Card. and should not be
exposed to
situations where his
personal data is
arbitrarily processed
or accessed, the
glaring realities of
the lack of the
appropriate
legislative solutions
put in place to
address data
protection issues is
already been
manifested in an IT
savvy Nigerian
society.
Jentzsch, N. This article Telecommunicat The researchers The results show
(2012). analyzes ion, used that the introduction
Implications of mobile phone Government quantitative to of mandatory
mandatory user policy, know the data registration
registration of registration in Consumer from different depresses growth in
mobile phone Sub-Saharan protection, countries.  mobile penetration.
users in Africa. Africa. Privacy There is a noticeable
Telecommunic trend of mandatory
ations Policy, registration of users
36(8), 608- of prepaid SIM cards
620. Retrieved in SubSaharan
from Africa. More than 30
https://www.ec countries have
onstor.eu/bitstr started or are
eam/10419/61 planning to register

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 32
393/1/7222497 users of prepaid SIM
48.pdf cards. One
immediate e§ect of
registration is that
the number of active
cellular subscriptions
drops due to
disconnections.
Moreover,
penetration growth,
measured as year-
to-year changes in
levels of mobile
cellular subscriptions
per 100 inhabitants
are depressed due
to increased
paperwork.
Customer
identiÖcation can
become, in
particular, a
constraint in
countries with an
insu¢ cient
identiÖcation
infrastructure, if no
alternative methods
for identification are
allowed. 
Kshetri, N. This editorial BRICS A kind of Various elements of
(2015). provides a Economies | approach which formal institutions
Cybercrime comparison of Cybercrime | describes such as orientation
and BRICS Cybersecurity | cybercrime and toward democratic
cybersecurity economies’ PRISM Internet cybersecurity power structures
issues in the approaches to Surveillance issues and and the nature of
BRICS cybersecurity. Program compare these relationship with the
economies. economies to West are tightly
Journal of each other. A linked to the
Global comparison of approaches to
Information cybercrimes in cybersecurity. For
Technology these instance, compared
Management, economies and to Brazil, India, and
18(4), 245- their South Africa, China
249. Retrieved approaches to and Russia have
from cybersecurity shown stronger
https://core.ac. could thus disagreements with
uk/download/p provide an the West in issues
df/345085151. interesting related to
pdf opportunity to cybersecurity.
explore Cybercrime and

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 33
contexts, cybersecurity issues
mechanisms, in the BRICS
and processes economies are
associated with representative of the
the situations that exist
cybersecurity in many other
frameworks in emerging and
economies with developing
diverse political, countries. As in
cultural, and BRICS economies,
economic there is an
backgrounds.  enormous gap
between laws in the
book and
enforcement
capability in most
emerging and
developing
countries. 
Waverman, L., This study Less developed The researchers The results find that
Meschi, M., aims to find countries, Rich performed a mobile telephony
and Fuss, M., the growth countries, Hausman test. has a positive and
(2014). “The dividend developing Having tested significant impact on
impact of because the countries, for endogeneity, economic growth,
telecoms on spread of developed we then divided and this impact may
economic telecommunica countries the sample into be twice as large in
growth in tions reduces four income developing countries
Developing costs of quartiles compared to
Countries” interaction, according to developed countries.
expands their level of Further, The growth
https:// market GDP per capita dividend of
www.assignme boundaries, in 1980. They increasing mobile
ntpoint.com/ and classified phone penetration in
wp-content/ enormously countries as developing countries
uploads/ expands “low income” (or is therefore
2012/04/ information potentially fast- substantial. All else
L_Waverman_ flows. Modern growth) if they equal, the
Telecoms_Gro revolutions in were in quartiles Philippines (a
wth_in_Dev_C management 1, 2 or 3, while penetration rate of
ountries.pdf such as ‘just- quartile 4 27 percent in 2003)
in-time’ countries were might enjoy annual
production rely classified as average per capita
completely on “high income.” income growth of as
efficient much as 1 percent
ubiquitous higher than
communication Indonesia (a
s networks penetration rate of
8.7 percent in 2003)
owing solely to the
greater diffusion of
mobile telephones,

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 34
were this gap in
mobile penetration
to be sustained for
some time. 
Makoza, F. This study Policy Transfer, The  study  used The findings showed
(2015). An investigated SIM card a qualitative  that the mandatory
exploratory the means registration, approach  to  SIM card registration
study on policy through  which Mobile phone analyse how  policy may be
transfer for SIM  card users, SIM  card  transferred through:
SIM card registration  Developing registration (a) voluntary transfer
registration in policy  may be countries, policies  may  to address local
Malawi. transferred in  Malawi be transferred in challenges related to
International countries a country mobile technologies 
Journal of without the without the (b)  coercive 
Technology policy. policy. transfer  in 
Diffusion Secondary data  response  to  meet 
(IJTD), 6(1), comprising international 
33-45. policy agreements. 
Retrieved from documents and However,  lack  of
https://www.re legislations were national
searchgate.net used in the identification
/publication/34 study. Reports documents for
3151338_An_ from regional mobile phone users
Exploratory_St organisations and delays in
udy_on_Policy and  media  implementing legal
_Transfer_for_ reports  were  framework affected
SIM_Card_Re also  used  to  the transfer of the
gistration_in_ enrich  the  mandatory SIM Card
Malawi data.  The  registration in
documents  Malawi. It will be
were  obtained  necessary to
from consider of social,
Government economic and
offices and political factors when
others were adopting the
obtained from mandatory SIM card
the websites of registration policy.
the regional
organisations.
Makoza, F. This chapter Mobile Phones, The study used The findings showed
(2019). presents an Mobile a qualitative that the SIM card
Learning From analysis of commerce, research registration policy
Abroad on SIM policy transfer Policy, Data approach and was transferred
Card in the context Protection, secondary data through coercive
Registration of a SMS, SIM Card, including transfer to meet
Policy: The developing Know Your government security standards
Case of country.  Customer reports and and international
Malawi. In (KYC), Policy media reports. conventions, and
Handbook of Transfer, SMS voluntary transfer to
Research on Spamming, SIM address local social
Technology Card challenges related to

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 35
Integration in Registration the use of mobile
the Global technologies.
World (pp. Despite initiating the
389-406). IGI SIM card registration
Global. process on several
Retrieved from occasions, the
https://www.igi implementation
-global.com/ch process was met
apter/learning- with constraints
from-abroad- related to social,
on-sim-card- economic, and
registration- political factors that
policy/208807 affected the policy
transfer process.
Maruthi, R., & The objective Bus tracker, It uses the There is no standard
Jayakumari, C. of this work is GPS receiver, satellite application for
(2014). SMS to develop a WAMP server, technology and vehicle tracking. The
based bus system that SMS Enabler  advanced applications are
tracking manages and computer written to suit the
system using controls the modeling to needs of the
open source transport using track vehicles scenario which
technologies. a tracking on their routes. exists. In this paper,
International device to know The system is a SMS based
Journal of the scheduled implemented customized
Computer vehicle and the using a WAMP application to track
Applications, current server and an the buses using
86(9). location of the application to open source
Retrieved from vehicle via track the bus is technologies has
https://citeseer SMS using a written in PHP been discussed. The
x.ist.psu.edu/d GPS tracking with MYSQL as Whole system is
ocument? device. a database for built on top of the
repid=rep1&ty storing the existing
pe=pdf&doi=d necessary infrastructure and it
67041b746524 details. does not require any
7c68802a1997 additional
9eb0458d187d infrastructure for
f77&fbclid=IwA communication link.
R2u93PTsX6U This system will be
HNndKBdPbZf useful for all the
GzmhF0BLFF passengers to board
HKMwttMIjPw the bus by knowing
2277eCptTS9 the location of the
THVY bus through SMS.
Michael, E. C., The general Network, The study Findings further
Chinwokwu, E. objective of the Retrieval, purposively revealed that
C., & Arop, S. study was to Subscriber elicited data via subscribers prefer to
K. (2014). examine the Identification questionnaire retrieve their
Subscribers’ subscriber Module, theft, and in-depth previous SIMs than
perception of perception of crime and interview from buying new ones; so
SIM card the factors Vauables. 387 MTN, as to reconnect with
retrieval: responsible for Globacom, their friends and

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 36
Implications on SIM card Airtel, and loved ones and to
criminality and retrieval and Etiselat network prevent criminals
behaviour in its implication subscribers and who have stolen or
Calabar on criminality staff of telecom snatched their
Municipality, and behaviour. companies. phones from using
Cross River Descriptive the lines to commit
State. statistics was crime and implicate
Mediterranean employed to them. It was also
Journal of analyze discovered that
Social quantitative data Female more than
Sciences, generated via male subscribers are
5(10), 620. questionnaire more likely to have
Retrieved from and qualitative their SIMs retrieved
https://www.m data was because they are
cser.org/journa subjected to more victims of
l/index.php/mjs content stolen Phone/SIM
s/article/view/2 analysis. and damaged SIMs. 
933
Mulliner, C. In this paper Web Security, Researchers The privacy leak is
(2010, we present a Mobile Phone used related to the HTTP
October). study on Internet, quantitative proxies operated by
Privacy leaks privacy leaks Privacy, Data research. They the mobile phone
in mobile of mobile Collection logged a large network operators.
phone internet phone web amount of The proxies inject
access. In access. individual mobile additional headers
2010 14th phone numbers. into HTTP
International They used the connections and
Conference on international thus cause the
Intelligence in country code privacy leak. The
Next number prefix to leaked data can be
Generation identify the acquired by anybody
Networks (pp. country an who runs a website
1-6). IEEE. individual phone that gets visited from
Retrieved from number is a mobile phone. The
http://mulliner. registered at.  main abuse of this
org/collin/acad The logging information leak is
emic/publicatio itself was done user tracking. In
ns/mobile_web in two parts. some countries one
_privacy_icin1 First they added can do a reverse
0_mulliner.pdf a rewrite rule to lookup of phone
the configuration numbers. This
of their Apache4 means for those
web server. The countries one can
rewrite rule take a mobile phone
redirected all number and actually
request that determine the name
requested an (first and last) and
image file to a maybe even the
script. The script address of the
logged all HTTP visitors of his
headers send by website.

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 37
the client and
returned the
request image.
they acquired
pre-paid SIM
cards from all
mobile
operators in
Germany in
order to do
some minimal
testing as they
did not want to
purely rely on
external data. 
Nakamura, A. This paper Switching cost, This paper The empirical
(2010). analyzes Vertically employs a web- analysis in this study
Estimating carriers’ other integrated based conjoint- reveals the
switching costs marketing market, Discrete type following: over 80%
involved in strategies to choice model, questionnaire to of survey
changing lock in Mobile phone  examine respondents
mobile phone consumers.  empirically user evaluate a highly
carriers in preference for a compatible platform
Japan: hypothetical with the SIM
Evaluation of Subscriber unlocked.
lock-in factors Identity Module Approximately 70%
related to (SIM) unlock of consumers find
Japan’s SIM situation in that the value of
card locks. Japan’s mobile discounts on initial
Telecommunic phone market payments exceeds
ations Policy, the discounts on
34(11), 736- one-year monthly
746.  payments. In
addition, conditions
set by continuing
agreements for
mobile carriers and
mobile handsets
reduce consumer
benefit by 35% at
the median in the
case of SIM
unlocking with
compatible
platforms.
Oyediran, O., This study Attitude, Mobile The study SIM card registration
Omoshule, A., investigated telecommunicati acquired a among mobile
Misra, S., the attitude of on subscribers, quantitative kind telecommunication
Maskeliūnas, mobile Theory of of approach. subscribers is yet to
R., & telecommunica reasoned Random attain a reasonable
Damaševičius, tion action, Theory sampling height of broad

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 38
R. (2019). subscribers of planned method was acceptability as the
Attitude of towards SIM behaviour, SIM used to select population seems to
mobile card card 300 mobile have a poor
telecommunica registration in phone perception of the
tion Lagos subscribers. In intents of the whole
subscribers Metropolis, total, 290 registration exercise.
towards sim Nigeria responses were The findings of this
card collected and study give better
registration in were found insight into some of
Lagos State, usable. Data the issues
Southwestern analysis was influencing sim card
Nigeria. performed using registration by
International statistical providing empirical
Journal of methods, and data on the attitude
System Spearman’s of mobile
Assurance correlation telecommunication
Engineering analysis was subscribers in Lagos
and used to test metropolis, Nigeria.
Management, relationship
10(4), 783- between the
791. variables of
doi:10.1007/s1 interest
3198-019-
00809-6
Salac, R. A., & The purpose of Internet The researchers Through a
Kim, Y. S. this study is to Connectivity, used comparison of the
(2016). A evaluate the Internet Speed, quantitative current global ICT
study on the cause of the Broadband research. Using situation with the
internet slow Internet Internet Access, articles and current situation in
connectivity in connection in Internet research of the Philippines, this
the the Philippines Bandwidth, international paper shows that the
Philippines. and the high Internet organizations country’s Internet
Asia Pacific cost that end- Penetration, and content infrastructure lags
Journal of users pay for it Domestic from official behind among those
Business Peering, Mobile websites of the of contemporary
Review, 1(1), Penetration, Philippine developing countries
67-88. Internet Service government, this in Asia, particularly
Retrieved from Provider (ISP), paper has in terms of Internet
https://koreasci Internet carefully connectivity.
ence.kr/article/ Exchange examined the Findings show that
JAKO2016270 Points (IXP) slow Internet the lack of
37745764.pdf connectivity and competition in the
the high cost Internet connectivity
that the end- market, among other
users pay for it reasons, is at the
root of the dilemma
of slow and costly
Internet connection.
Assessing the
accomplishments of
the Republic of

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 39
Korea and other
broadband-leading
countries has
provided practical
insights and
recommendations
that can promote
competitiveness. 
Ssebakumba, The study Sim Card The researchers The findings
F. (2018). sought to Registration, employed a revealed that most
Knowledge, ascertain the attitude, quantitative type people in Uganda
attitude and extent to which perception.  of research. The are knowledgeable
practice on people are study used a of sim-card
Sim-Card knowledgeable respondent challenges.
registration about the sample of 100 However, they show
among the challenges of people who a positive attitude
people in the policy, their have registered towards sim-card
Uganda. attitude their sim-cards registration,
Retrieved from towards the and are living in therefore, a lot has
http://196.43.1 policy and their Kampala who to be done about the
33.120/handle/ level of were used as increasing burdens
20.500.12281/ practice. units of enquiry. or challenges
4445 The analysis affecting the policy
was done using among which
STATA where include bureaucracy
univariate and and increase in the
bivariate number sim-card
analysis was related crimes to
done.  sufficiently achieve
the objectives of this
policy.
Tair, H. Y. A., In this paper E-government, They used M-government is a
& Abu- the authors M-government, quantitative and value added service
Shanab, E. A. addressed the M-services, qualitative and a
(2014). Mobile challenges and Mobile research to complementary
government opportunities technology, know the component to e-
services: of m- Service delivery number of government that
Challenges governments mobile users facilitates the
and in terms of and mobiles services delivery to
opportunities. mobile connecting rural areas and for
International services (m- people to the emergency
Journal of services). internet. They notifications. This
Technology used kinds of review concluded
Diffusion services such as that a dispute exists
(IJTD), 5(1), traditional in the literature on
17-25. DOI: services, e- the relationship
10.4018/ijtd.20 service, m- between m-
14010102 service, and u- government and e-
service.  government. M-
government’s key
attribute is mobility,

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 40
where citizens can
access services
anywhere and
anytime. The
mobility of m-
government opened
doors for diverse
benefits and
applications. 
Tsavli, M., This paper Personal data, The proposed The results of this
Efraimidis, P. aims to privacy approach was work indicate that,
S., Katos, V., discuss the concerns, evaluated even though
& Mitrou, L. privacy and smartphone through an providing access to
(2015). security data taxonomy, examination of personal data of
Reengineering concerns that user awareness, the Android’s smartphone users is
the user: have risen security issues permission by definition neither
privacy from the model, although problematic nor
concerns permissions issues arise in unlawful, today’s
about personal model in the other operating smartphone
data on Android systems. Our operating systems
smartphones. operating future intention do not provide an
Information & system, along is to conduct a adequate level of
Computer with two user study to protection for the
Security. shortcomings measure the user’s personal data.
Retrieved from of the user’s However, there are
http://eprints.b permissions’ awareness and several ideas that
ournemouth.ac model that concepts can significantly
.uk/24543/7/R have not been surrounding improve the situation
eengineering adequately privacy and mitigate privacy
%20the addressed. concerns in concerns of users of
%20user.pdf order to smart devices.
empirically
investigate the
above
mentioned
suggestions.
The impact of
the applications’
evolutionary
increment of
permission
requests from
both the user’s
and the
developer’s
point of view, is
studied, and
finally, a series
of remedies
against the
erosion of users’

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 41
privacy, is
proposed. 
White, Tonya;   data ownership,  
Blok, Elisabet; data sharing,
Calhoun, ENIGMA,
Vince D. general data
(2020). Data protection
sharing and regulation,
privacy issues HIPAA
in
neuroimaging
research:
Opportunities,
obstacles,
challenges,
and monsters
under the bed.
Human Brain
Mapping, (),
hbm.25120–.
doi:10.1002/hb
m.25120 
Woon, Chih This study Audiences; The researchers The results show the
Yuan (2014). aims to Media Identity used qualitative corroborations as
Popular understand the methodology to well as resistances
Geopolitics, complex cast insights into to PDI’s portrayals of
Audiences and interactions how audiences’ Mindanao are
Identities: between experiences of intricately linked to
Reading the popular media ‘reading’ the PDI readers’ vastly
‘War on Terror’ and its have produced different
in the audiences can meanings, experiences,
Philippines. prove useful in affects and positionalities and
Geopolitics, casting imaginings subjectivities. These
19(3), 656– insights into related to in turn foreground a
683. the everyday, Mindanao. topological
doi:10.1080/14 geopolitical understanding of
650045.2014.9 ‘playing out’ of space whereby
07277  issues of audiences have the
terrorism, active agency in
violence and (re)producing and
peace in the reworking
Philippines geopolitical
context and knowledges and
beyond.  geographical
imaginaries, and are
hence imbricated in
circuits of
geopolitical power.

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 42
Appendix B
Survey Question

1. Have you registered your SIM Card yet? If yes, why did you consider registering? If no,
what’s holding you back from registering?

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 43
Appendix C
Responses

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 44
Appendix D
Adviser’s Acceptance Form
UNIVERSITY RESEARCH Document FM-URD-
AND DEVELOPMENT No. 020
CENTER Revision No. 00
Effectivity November
RESEARCH ADVISER’S Date 3, 2020
ACCEPTANCE FORM
Page No. 45 of 1
September 3, 2022

󠄂I hereby accept the proponent/s:

1. Bilag, Jocelle L.
2. Verdadero, Denver M.
3. Wingnga, Dea M.

as research advisee/s for the study,

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The
Digital Age
(Title of Study)

for the School Year 2022-2023.

I promise to abide by my duties and responsibilities and ascertain that my advisees finish their
research output on schedule and according to the rules set by the University Research and
Development Center.

Conforme:

Dr. Darin Jan C. Tindowen, Ph.D


Name and Signature of Instructor/Professor

󠄂I cannot accept the above thesis/research advisership due to the following reasons:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________
____________________________________________________________________________
_________________

___________________________________

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 45
Name and Signature of Instructor/Professor

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 46
Appendix E
Letter to Vice President for Academics

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 47
Appendix F
Letter of Endorsement

Date: May 30, 2023

Dr. Darin Jan C. Tindowen, Ph.D.


Data Analyst

Dear Sir:

After thoroughly reviewing the manuscripts of the Research Proponents and their transcripts,
I respectfully endorse the same to your office for evaluation.

It is our understanding that whatever revisions are necessary to be integrated will be referred
to the evaluating panel for their approval, and after which, will be complied with by the
research proponents, and that a certification for defense can only be issued when the data
are in place.

DARIN JAN C. TINDOWEN, Ph.D


Name and Signature of Head CSILKER

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 48
Appendix G
Data Analysis Certification

Research Proponents: Bilag, Jocelle L.


Verdadero, Denver M.
Wingnga, Dea T.

Program: Bachelor of Arts in Political Science with Legal Studies

Research Title: Exploring The Pros and Cons of Sim Card Registration:
Balancing Security and Privacy in The Digital Age

This is to certify that the quantitative analysis was done at the University Research
and Development Center of University of Saint Louis and by a duly accredited
quantitative data analyst.

DARIN JAN C. TINDOWEN, Ph.D. 05/31/23


Name and Signature of Data Analyst Date

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 49
Appendix H
Certification of Plagiarism Check

This is to certify that the research paper entitled:

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in
The Digital Age Research Title

Bilag, Jocelle L.
Verdadero, Denver M.
Wingnga, Dea T.
Proponents

Has undergone the initial plagiarism check with an originality score/grade of 12%

This signifies that the proponents may proceed to the final defense and that the official
plagiarism clearance will be issued as soon as the integration of final suggestions by the
panel is complied with.

DARIN JAN C. TINDOWEN, Ph.D 05/30/23


Name and Signature of the Evaluator Date

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 50
Appendix I
Certification of Language Editing

Research Proponents: Bilag, Jocelle L.


Verdadero, Denver M.
Wingnga, Dea T.

Program: Bachelor of Arts in Political Science with Legal Studies

Research Title: Exploring The Pros and Cons of Sim Card Registration:
Balancing Security and Privacy in The Digital Age

This is to certify that I have thoroughly edited the final draft of the Research of the
students listed above in terms of grammar and organization, and compliance with the
APA format and style.

NATALIE KATE C. RAMIREZ 05/31/23


Name and Signature of Language Editor Date

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 51
Appendix J
Minutes Of Thesis Proposal Defense

December 13, 2022, 3:00 P.M., Defense Room

Researcher : Bilag, Jocelle L.


Verdadero, Denver M.
Wingnga, Dea T.

Dissertation Title : The Role of SIM Card Registration Act in combatting Cybercrimes
committed through SMS

Adviser : Dr. Darin Jan C. Tindowen

Members of Technical Panel


Ma’am Jennifer Bangi
Sir Christian Bosch Taylan
Ma’am Cyreane Faith Narag

Proceedings
Presentation of the Research proposal by the Proponent
Review and Critiquing of the Paper

Comments and Suggestions


Section/Page Suggestions/Recommendations
Title Variables: SK and performance

Working title
Administrative performance of the Sangguniang Kabataan
Introduction
Research 1.
What are the profile of the respondents according to:
Questions a.
Leadership background
b.
Political affiliation
c.
Leadership style
2.
What are the list of implemented and unimplemented
programs?
3. What are the duties and responsibilities of the SK as
prescribed in the LGC of 1991?
Significance of the It will change all significance based on the new study directions
study
Research It will change based on the new research question
Hypothesis
Review of Related - Framework will change
Literature - Lay the background
- Remove the issues and problems
RRL recommendation: Status of performance over the years
Research Paradigm
Methods Mixed method
- Qualitative (experiences of constituents)

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 52
Section/Page Suggestions/Recommendations
- Quantitative (survey on perception of performance)
- Document analysis (analyze the document they submitted
and compare to their duties)
Respondents SK – self-evaluation on performance
Constituents – perception on performance
Research - survey questionnaire
Instruments - interview
- document analysis
Data Analysis
Questionnaires Only one questionnaire will be used to survey both the SK and
constituents

Possible question: what is the resolution they have promulgated?


- (Include also the numbers promulgated)
- (Add time frame) (term-based)
References

Prepared by: Attested by:

____________________________ _____________________
Jedidiah Clement B. Sta. Monica Darin Jan Tindowen
Secretary Research Adviser

General comments
 what is in Ilagan, Isabela that is so special as to constitute research?
 why do you like to look into the performance of the KP?
 Why do you want to look into the performance when your paper talks about its abolition?
 What do you want to conduct this study?
 Focus on administrative performance of Kabataang Pambarangay on administering
youth community

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 53
Minutes Of Thesis Final Defense

May 18, 2023, 2:00 P.M., Defense Room

Researcher : Bilag, Jocelle L.


Verdadero, Denver M.
Wingnga, Dea T.

Thesis Title : The Role of SIM Card Registration Act in combatting Cybercrimes
committed through SMS

Adviser : Dr. Darin Jan C. Tindowen

Members of Technical Panel


Ma’am Jennifer Bangi
Sir Christian Bosch Taylan
Dean Herbert
Proceedings
Presentation of the Research proposal by the Proponent
Review and Critiquing of the Paper

Comments and Suggestions


Section/Page Suggestions/Recommendations
Working Title The Pros and Cons of SIM Card Registration Act
Introduction Why there is need to extend the registration?
Data from DICT how many registered during the deadline
Results and  Check if there are those who do not want to register.
Discussion  To have an output as a campaign plan for maximum sim card
registrants
 NTC
 DICT
 Lawyer
 Police
 Telcos
 Have you already registered your sim? If yes why? If No why?
 Pros and Cons of the Sim Card Registration Act
 Determine why are they registering or what are the reasons
why are they not registering
 Remove cybercrimes in the paper
 No longer a major variable
 No need for re-defense
 Focus group, one on one, or online
 50 minimum respondents
 No more profiles
 What are the causes of non-registration?

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 54
Prepared by: Attested by:

____________________________ _____________________
Jan Michael Vince M. Oñate Darin Jan Tindowen
Secretary Research Adviser

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 55
Appendix K
Progress Report

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 56
Appendix L
Photo Documentation

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 57
Appendix M
Curriculum Vitae

Name: Jocelle L. Bilag


Date of Birth: September 17, 2002
Place of Birth: Tuguegarao City, Cagayan
Current Address: Tuguegarao City, Cagayan

Educational Background

College: Bachelor of Arts in Political Science with Legal Studies


University of Saint Louis Tuguegarao
Mabini St., Ugac Sur, Tuguegarao City, Cagayan
2020-Present

Senior High School: Science Technology Engineering and Mathematics Strand


International School of Asia and the Pacific
Alimannao Hills, Peñablanca, Cagayan
S.Y. 2018-2020

Junior High School: International School of Asia and the Pacific


Alimannao Hills, Peñablanca, Cagayan
S.Y. 2014-2018

Elementary: Holy Trinity Montessori School


Bagay Sur, Tuguegarao City
S.Y. 2008-2014

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 58
Name: Denver M. Verdadero
Date of Birth: December 03, 2002
Place of Birth: Roxas, Isabela
Current Address: Purok 5, Bimonton, Mallig, Isabela

Educational Background

College: Bachelor of Arts in Political Science with Legal Studies


University of Saint Louis Tuguegarao
Mabini St., Ugac Sur, Tuguegarao City, Cagayan
2020-Present

Senior High School: Science, Technology, Engineering and Mathematics (Non-Health)


University of Saint Louis Tuguegarao
Arellano St., Ugac Sur, Tuguegarao City, Cagayan
S.Y. 2018-2020

Junior High School: Mallig Plains Colleges


Casili, Mallig, Isabela
S.Y. 2014-2018

Elementary: Bimonton Integrated School


Bimonton, Mallig, Isabela
S.Y. 2008-2014

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 59
Name: Dea Tongdo Wingnga
Date of Birth: June 9, 2001
Place of Birth: Liglig, Lubuagan
Current Address: Purok 2, Cudal, Tabuk City, Kalinga

Educational Background

College: Bachelor of Arts in Political Science with Legal Studies


University of Saint Louis Tuguegarao
Mabini St., Ugac Sur, Tuguegarao City, Cagayan
2020-Present

Senior High School: Humanities and Social Science Strand


Kalinga State University– Main Campus
Purok 6, Bulanao, Tabuk City, Kalinga

Junior High School: Cudal National High Scool


Purok 3, Cudal, Tabuk City, Kalinga
S.Y. 2014-2018

Elementary: Cudal Central School


Purok 3, Cudal, Tabuk City, Kalinga
S.Y. 2008-2014

Exploring The Pros and Cons of Sim Card Registration: Balancing Security and Privacy in The Digital Age | 60

You might also like