Home Program
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 15, 2026
Pages: 56 - 56
Abstract
Computer Sciences Editor: Darjana Sredić
See full issue

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Metrics and citations
Abstract views: 6
PDF Downloads: 3
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 01.04.2026. >> Accepted: 01.04.2026. >> Published: 29.05.2026. Abstract Computer Sciences Editor: Darjana Sredić

REGULATORY FRAGMENTATION AND CYBER RISK MANAGEMENT IN BOSNIA AND HERZEGOVINA: BETWEEN FORMAL HARMONIZATION AND OPERATIONAL RESILIENCE

By
Muhamed Ćosić ,
Muhamed Ćosić
Contact Muhamed Ćosić

Faculty of Computer Technologies, University of Business Engineering and Management , Banja Luka , Bosnia and Herzegovina

Edin Alić
Edin Alić

Faculty of information technology, Univerzitet Vitez , Travnik , Bosnia and Herzegovina

Abstract

The relationship between formal regulatory harmonization and actual cyber resilience in Bosnia and Herzegovina is examined within the context of the contemporary regulatory model of the European Union. Through the GDPR and NIS2, the EU has established a cyber risk management system based on risk assessment, incident reporting obligations, supervision, and managerial accountability. This framework is further developed through sectoral and horizontal acts such as DORA, the CER Directive, the Cybersecurity Act, and the Cyber Resilience Act. In 2025, Bosnia and Herzegovina adopted a new Law on Personal Data Protection, marking a significant step toward alignment with European standards and the normative modernization of the domestic regulatory framework. However, normative modernization alone does not guarantee a higher level of cyber resilience. The complex constitutional structure, fragmentation of competences, the absence of a unified cybersecurity framework, and uneven institutional capacities create an implementation gap between prescribed obligations and their actual enforcement. The analysis shows that resilience depends on effective coordination, professionally and technically capable supervision, operational CERT/CSIRT capacities, a standardized incident reporting system, and the clear integration of cyber risk into organizational governance structures. Without institutional strengthening, functional inter-institutional cooperation, and consistent enforcement of regulations, harmonization remains largely formal, while actual cyber resilience remains limited, partial, and unevenly developed.

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.