Global Multidisciplinary Journal

Open Access Peer Review International
Open Access

Risk-Based Cybersecurity Governance: Integrating Regulatory Theory, Cost-Benefit Analysis, and Adaptive Security Design in Digital Infrastructures

4 Department of Information Systems and Public Policy University of Zurich, Switzerland

Abstract

The rapid expansion of digital infrastructures across public and private sectors has intensified the need for governance models capable of addressing cybersecurity risks in a systematic, economically rational, and ethically defensible manner. While numerous frameworks exist for risk analysis, compliance management, and technical security implementation, fragmentation persists between regulatory theory, cost-benefit analysis, and operational cybersecurity design. This article develops a comprehensive risk-based cybersecurity governance framework that synthesizes principles from risk science, regulatory policy, cost-benefit theory, and contemporary cybersecurity standards. Drawing on scholarship in risk regulation (Wiener, 2010), the discipline of cost-benefit analysis (Sen, 2000), foundational risk science (Aven, 2019; Aven & Thekdi, 2022), and cybersecurity frameworks including NIST CSF 2.0 (NIST, 2024), the study constructs a design-science-informed governance architecture. The framework integrates adaptive risk management, human-factor awareness, privacy-by-design principles, and dynamic compliance mechanisms. It incorporates economic rationality through structured cost-benefit integration, including social discounting and judicial scrutiny considerations (Feldstein, 1964; Morrison, 1998), while extending evaluation beyond narrow monetization toward responsibility-centered governance (Boeken, 2024). Methodologically grounded in design science research (Hevner et al., 2004), the study proposes a policy artifact that operationalizes risk-based cybersecurity across cloud, healthcare, and multi-cloud environments. Findings indicate that purely compliance-driven or technically isolated security models are insufficient; instead, adaptive, context-sensitive, and economically informed governance is necessary to manage spillover risks and advanced persistent threats. The discussion highlights theoretical implications for risk science, regulatory accountability, and digital ethics. The article concludes that sustainable cybersecurity governance requires institutional integration of risk analysis, economic evaluation, and technical security design within a coherent normative framework.

Β 

Keywords

References

πŸ“„ Aven, T. (2019). The Science of Risk Analysis: Foundation and Practice. Routledge & CRC Press.
πŸ“„ Aven, T., & Thekdi, S. (2022). Risk Science: an Introduction. Routledge.
πŸ“„ Boehm, J., Curcio, N., Merrath, P., Shenton, L., & StΓ€hle, T. (2019). The risk-based approach to cybersecurity. McKinsey & Company Risk Practice.
πŸ“„ Boeken, J. (2024). From compliance to security, responsibility beyond law. Computer Law & Security Review, 52, 105926.
πŸ“„ Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada.
πŸ“„ Chauhan, M., & Shiaeles, S. (2023). An analysis of cloud security frameworks, problems and proposed solutions. Network, 3(3), 422-450.
πŸ“„ Feldstein, M. S. (1964). The social time preference discount rate in cost benefit analysis. Economic Journal, 74(294), 360-379.
πŸ“„ Gordon, L. A., & Loeb, M. P. (2020). Integrating cost-benefit analysis into the NIST cybersecurity framework via the Gordon-Loeb model. Journal of Cybersecurity, 6(1), tyaa005.
πŸ“„ Hevner, A., March, S., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75-105.
πŸ“„ Kummarapurugu, C. S. (2022). Enhancing serverless computing security in multi-cloud environments: Integrating policy-as-code, automated compliance, and dynamic access controls. International Journal of Innovative Research in Engineering Multidisciplinary Physical Sciences, 10(2).
πŸ“„ Kwon, J., & Johnson, M. E. (2014). Health-care security strategies for data protection and regulatory compliance. Journal of Management Information Systems, 30(2), 41-66.
πŸ“„ Mailloux, L. O., Span, M., Grimaila, M. R., Young, W. B., & Hodson, D. D. (2018). Examination of security design principles from NIST SP 800-160. IEEE Access, 6, 34996-35007.
πŸ“„ Mbaka, W. B., van Gerwen, S., & Tuma, K. (2024). Human factors in security risk of software systems: A systematic literature review. Journal of Systems and Software.
πŸ“„ Melaku, H. M. (2023). Context-based and adaptive cybersecurity risk management framework. Risks, 11(6), 101.
πŸ“„ Merad, M. (2010). Aide Γ  la dΓ©cision et expertise en gestion des risques. Lavoisier.
πŸ“„ Merad, M., & Trump, B. D. (2020). Expertise under Scrutiny. Springer.
πŸ“„ Morrison, E. R. (1998). Judicial review of discount rates used in regulatory cost-benefit analysis. University of Chicago Law Review, 65(4), 1333-1369.
πŸ“„ National Institute of Standards and Technology (NIST). (2024). NIST Cybersecurity Framework 2.0: Quick Start Guide for Using the CSF tiers (NIST Special Publication 1302). U.S. Department of Commerce.
πŸ“„ Pelletier, J. M. (2018). Longitudinal analysis of information security incident spillover effects. Journal of Management Science and Business Intelligence, 3(2), 15-20.
πŸ“„ Sen, A. (2000). The discipline of cost-benefit analysis. Journal of Legal Studies, 29(S2), 931-952.
πŸ“„ Tatam, M., Shanmugam, B., Azam, S., & Kannoorpatti, K. (2021). A review of threat modelling approaches for APT-style attacks. Heliyon, 7(1).
πŸ“„ Wiener, J. B. (2010). Risk regulation and governance institutions. In Risk and Regulatory Policy: Improving the Governance of Risk. OECD.
πŸ“„ Nayeem, M. (2025). Strategic Cybersecurity Governance: A Risk-Based Policy Framework for IT Protection and Compliance. In Proceedings of the International Conference on Artificial Intelligence and Cybersecurity (ICAIC 2025), 19-29.

How to Cite

Dr. Adrian John. (2025). Risk-Based Cybersecurity Governance: Integrating Regulatory Theory, Cost-Benefit Analysis, and Adaptive Security Design in Digital Infrastructures. Global Multidisciplinary Journal, 4(12), 134-139. https://www.grpublishing.org/journals/index.php/gmj/article/view/339

Most read articles by the same author(s)

<< < 8 9 10 11 12 13 14 15 > >> 

Similar Articles

1-10 of 116

You may also start an advanced similarity search for this article.