Skip to main content
PLOS One logoLink to PLOS One
. 2023 Feb 6;18(2):e0281314. doi: 10.1371/journal.pone.0281314

Information sharing and deferral option in cybersecurity investment

Chuanxi Cai 1,*, Liurong Zhao 2
Editor: Olivier Bos3
PMCID: PMC9901811  PMID: 36745656

Abstract

This study investigates the effect of information sharing and deferral option on a firm’s information security investment strategies by considering strategic interactions between a firm and an attacker. We find that 1) information sharing decreases a firm’s security investment rate. 2) If a deferral decision is possible, the firm will decrease its immediate investment, and avoid non-investment. 3) After information sharing, the probability of a firm’s deferral decision increases for low-benefit information (SL) but decreases for high-benefit information (SH). 4) When information sharing accuracy is low, a firm only defers decisions in a fraction of SL; when information sharing accuracy is high, the firm defers its decisions in all SL and a fraction of SH. 5) Information sharing can improve the effect of deferral decision when accuracy is low but weaken it when accuracy is high. These results contradict the literature, wherein information sharing reduces a firm’s uncertainty on cybersecurity investment and decreases deferment options associated with investment.

1. Introduction

Corporations worldwide are currently making critical investments in various cybersecurity-related activities. Hence, security investments in information systems have become critical in information security economics. Hausken [1] believes substantial security investment is needed to deter most perpetrators. Gao and Zhong [2] analysed information security investment strategies under both targeted and mass attacks by considering strategic interactions between two competitive firms and a hacker. Qian et al. [3] determined a new game of information sharing and security investment between two allied firms. Considering information security insurance, Qian et al. [4] determined an information security investment game between two firms with complementary information assets. Shao et al. [5] analysed the impact of reputational concerns on information security managers’ investment decisions. Li Xiaotong [6] provided a solution for the information security investment decisions of complementary enterprises under the characteristics of multi-enterprise and non-cooperative enterprises. Li Xiaotong [7] conducted an evolutionary game-theoretical analysis of enterprise information security investments based on an information-sharing platform. Li and Xue [8] conducted an economic analysis of information security investment decisions for substitutable enterprises.

The potential benefits (payoffs) of security investments largely involve potential cost savings, which are riddled with significant uncertainty. Therefore, to obtain more information, firms tend to defer much of their cybersecurity investments unless they are reacting to a major breach [9]. Moreover, when the firms obtain information about the intrusion of an attacker, they can share the information to decrease the cost of their defence. Bian et al. [10] indicated that investors are prone to imitate their neighbours’ activities through a comprehensive analysis of the risk dominance degree of certain investment behaviour. Overall, before making cybersecurity investments, firms tend obtain more accurate information through information sharing or decrease uncertainty by deferring decisions.

Deferral (postponing one decision to a later date) is a recent occurrence in cybersecurity investment; however considerable research has been made in psychology [11,12] and management [13,14] literature. White et al. [11] suggested that choice deferrals can arise from absolute evaluations or relative comparisons. Larasati and Yeh [13] demonstrated that a more attractive choice always decreases choice deferral. Berens and Funke [15] determined how situational and personal factors influence two different forms of decision avoidance: 1) deferring choice to a later point in time (decision deferral) and 2) refusing both alternatives (option refusal). Deferral can lead to better decisions by enabling a search for additional information or better alternatives. However, this can be risky because a cybersecurity breach could occur during the deferral process. In this study, the deferral option is one of the firm’s strategies before making cybersecurity investments. Hence, the firm has three strategies for cybersecurity investment: immediate investment, no investment, and decision-making after deferral. If the firm cannot make decision between investment and no investment, it can select the deferral option. That is, the firm can make no decision for some time and decide whether to invest after obtaining more information by deferring. Previous research on deferral has mainly focused on factors affecting the deferral decision-making of firms but this article focus on the effect of deferral option on a firm’s expected benefits.

Moreover, information sharing has a certain history in cybersecurity investment [3,1623], which can help firms obtain more useful information about the attacker and firm. However, information sharing is also associated with the free-rider problem, risk of information leakage and information errors [24]. Therefore, incentives for information sharing are harder to furnish. Information sharing between firms is a deterrent to an attack, which could change the choice of the attacker [23]. Hausken [25] analysed a firm’s proactive and retroactive defence against hackers with information sharing in four-period games. Hausken [25] only considered information sharing between hackers and not information sharing between firms. Gordon et al. [26] demonstrated how information sharing could encourage firms to proactively (and not reactively) approach cybersecurity investments. Assuming that information obtained through information sharing is accurate, Gordon et al. [26] believe that a firm’s information sharing decreases the value of its deferment option associated with the investment. In Gordon et al. [26], a firm’s cost saving from information security investment by hiring a cybersecurity consulting firm—according to a Chief Security Officer (CSO)—would be either $40000 (low-saving) or $200000 (high-saving) a month, and with an identical probability (50%). However, practically, the probabilities cannot be equal as they are affected by the attacker’s decision. Additionally, Gordon et al. [26] assumed that the accuracy of the information-sharing signal was fixed and equal between low-saving and high-saving signals. Hence, Chief Financial Officer (CFO) has no choice but to invest in the CSO’s high-saving signal or defer their decision in the CSO’s low-saving signal. However, in practice, the CSO’s strategy is affected by mood, hunger, stress, sleep deprivation, risk preference, etc., and accuracy is neither equal nor fixed. Additionally, the CFO can close investments without deferring.

Motivated by Gordon et al. [26] in information security investment, we construct a model between a firm and attacker, and analyse the effect of a firm’s information sharing and deferral option on a firm’s expected benefits. Our model reflects the probability of the firm’s cost saving, accuracy of the information-sharing signal, and the CFO’s different decision. For example, regardless of whether an attacker chooses to intrude, the CSO can obtain a high-saving signal or a low-saving signal. Regardless of the type of the signal the CFO receives from the CSO, the CFO has three strategies: immediate investment, no investment, and decision-making after deferral. Similar to the proactive and retroactive defences in Hausken [25], a firm’s defence is proactive if it invests immediately and retroactive if it invests later after a deferral. Unlike the analysis of the interplay between the information sharing of hackers and the defence strategies of firms in Hausken [25], this study examines the effect of information sharing and deferral option on a firm’s expected benefits. Moreover, for convenience, we assume that information accuracy after information sharing is only affected by the CSO’s risk preference. Hence, we did not consider the CSO’s mood, hunger, stress, sleep deprivation, and other elements. An interesting result in this study is that information sharing can improve the effect of deferral decision on a firm’s expected benefits when accuracy of information is low, but it weakens the effect when information sharing accuracy is high. This interesting result contradicts Gordon et al. [26] wherein information sharing decreases the value of the deferment option associated with investment.

The remainder of this paper is organized as follows. Section 2 establishes a game model of the interaction between a firm and attacker. The model describes both the firm’s deferral option and information sharing. Section 3 derives the equilibrium strategies and the primary results of the model. Section 4 derives the results on the value of the deferral option and information sharing under the default and optimal conditions respectively, and then presents the simulation and analysis of the results. Finally, Section 5 concludes the study.

2. Model

2.1. Model description

This study assumes that a firm has joined an industry-specific information-sharing group. No charges are incurred for joining this information-sharing group, providing that the firm is willing to share cybersecurity-related information with the group’s members (i.e., free-riders are excluded from this group) [26]. Based on the agreement, all firms report detailed information to the group’s members on their actual cybersecurity breaches and the steps taken to prevent and respond to cybersecurity breaches. Hence, the study constructs a game model between a firm and an attacker; however, the firm can enjoy information sharing. In this study, information sharing occurs between the members of the industry-specific information-sharing group. Additionally, the analysis in this study concerns information sharing between firms, not information sharing between attackers. The firm now has three strategies: immediate investment, no investment, and decision-making after deferral. An attacker only has two strategies: intrusion and no intrusion. In this study, the deferral option constitutes the firm’s security investment strategy, not the strategy of the firm’s information sharing. That is, firm’s security investment can be deferred, firm’s information sharing cannot be deferred. Table 1 list the notations used in our subsequent discussion.

Table 1. List of notations (all the probability is between 0 and 1).

Parameters Explanation
H Benefits to the firm when a firm invests and an attacker intrudes (H>C)
L Benefits to the firm when a firm invests and an attacker does not intrude (L<C)
C Costs of each investment for a firm
μ Benefits to the attacker when an attacker intrudes
β Penalty to the attacker when an attacker intrudes and a firm invests (μ<β)
α Effect of firm’s deferral investment on firm and attack’s expected benefits (0≤α≤1)
P D Probability that CSO obtain SH through firm’s information sharing, given an attacker intrudes
P F Probability that CSO obtain SH through firm’s information sharing, given an attacker doesn’t intrude
S H The signal of firm’s cost saving to be high if a firm invests
S L The signal of firm’s cost saving to be low if a firm invests
Decision variables Explanation
ρ Probability of firm’s investment in the absence of information sharing and deferral option
ψ Probability of attacker’s intrusion in the absence of information sharing and deferral option
ρ in_def Probability of firm’s immediate investment in the presence of deferral option
ρ no_def Probability of firm’s non-investment in the presence of deferral option
ρ de_def Probability of firm’s deferral decision in the presence of deferral option
ψ def Probability of attacker’s intrusion in the presence of deferral option
ρ 1in_sha Probability of firm’s investment, in the presence of information sharing, when the CFO receives SH
ρ 2in_sha Probability of firm’s investment, in the presence of information sharing, when the CFO receives SL
ψ sha Probability of attacker’s intrusion in the presence of information sharing
ρ 1in_sha+def Probability of firm’s immediate investment, in the presence of information sharing and deferral option, when the CFO receives SH
ρ 2in_sha+def Probability of firm’s immediate investment, in the presence of information sharing and deferral option, when the CSO obtains SL
ρ 1de_sha+def Probability of firm’s deferral decision, in the presence of information sharing and deferral option, when the CFO receives SH
ρ 2de_sha+def Probability of firm’s deferral decision, in the presence of information sharing and deferral option, when the CFO receives SL
ψ sha+def Probability of attacker’s intrusion, in the presence of information sharing and deferral option
Functions Explanation
M The firm’s expected benefits
A The attacker’s expected benefits

When an attacker intrudes, the firm can learn more about the attacker if it invests in defense. If a firm invests in defense and the attacker does not intrude, the firm cannot benefit. Hence, the firm benefits if the firm invests and the attacker intrudes. When a firm invests and an attacker intrudes, we assume that the cost of a firm’s investment is C, the benefit of the firm’s investment is H, and the attacker will have a benefit of μ but incur penalty of β. That is, the firm’s net benefits are H-C, and the attacker’s net benefits are μβ when the firm invests and the attacker intrudes. Similarly, a firm’s net benefits are L-C when it invests and the attacker does not intrude. Neither a firm nor an attacker has no benefit when the firm does not invest and the attacker dose not intrude; a firm could sustain damage when it does not invest and the attacker intrudes. However, the damage has no influence on the conclusion, so we assume that the firm’s damage is zero for convenience of calculation. Therefore, whether the attacker intrudes or not, the firm will not benefit if it doesn’t invest in it. Regardless of whether the firm invests, the attacker has no benefit if it does not intrude. We assume that the probability of a firm’s investment is ρ, and the probability of an attacker’s intrusion is ψ.

More accurate information about investment payoffs can be obtained if a firm defers the investment. However a cybersecurity breach could occur during the deferral process. Therefore, we define α as the effect of a firm’s deferral investment on the expected benefits of the firm and attack. Actually, α is different for the firm and attacker; however, the effect of a firm’s deferral investment on the firm and attack’s expected benefits is positive correlation. And the difference of α between the firm and attacker has no influence on out conclusion; hence, we assume that the effect of the firm’s deferral investment on the expected benefits of the firm and attack is equal for the convenience of calculation. Hence, the firm’s net benefits are αHC, and the attacker’s net benefits are μαβ when the firm invests and the attacker intrudes in cybersecurity (0<α<1).

To facilitate calculation, we assume that only two conditions can be found after deferral. That is, a firm always invests if the attacker intrudes, and the firm does not invest if the attacker does not intrude. Actually, a firm can invest, never invest, or goes on deferring after deferring; however, gradually speaking, the two conditions take the large part of the three choices as the firm gets more useful information about the attacker than before. The conclusion in this paper keep the same if some new parameters are introduced. Additionally, αHC, μαβ, and α decreased with an increase in deferral time. A firm will not invest if αH<C. If an attack intrudes, it must have benefits when the firm defers decision (μαβ). This is because the firm gets more useful information with the increase of deferral time, but the attacker also gets more useful information. And the firm has been attacked before it invest if it defers the decision.

ρin_def, ρno_def and ρde_def are the firm’s probabilities of investing immediately, avoiding up investing (does not invest), and deferring decisions respectively, in the presence of deferral option only. ψdef is the attacker’s probability of intrusion in the presence of the deferral option only.

Deferral decisions in cybersecurity aim to decrease uncertainty associated with potential payoff from cybersecurity investments. Information sharing can reduce uncertainty to some extend and the value of deferral option [26]. Accuracy of the information acquired from information-sharing is critical in reducing uncertainty. We will discuss the accuracy by introducing a receiver operating characteristic (ROC) curve [27,28] in a practical example [26], wherein the model is similar to the intrusion detection system (IDS) discussed by Cavusoglu et al. [29] and firewall discussed by Cavusoglu and Raghunathan [30].

2.2. Information sharing and ROC curve

In the example [31], 60% of the budget is earmarked for basic cybersecurity activities, and the Chief Security Officer (CSO) is authorized to use these funds. However, the remaining 40% of the cybersecurity budget cannot be spent without approval from the firm’s Chief Financial Officer (CFO). The CSO aims to use the remaining portion of the firm’s cyber security budget to hire a consulting firm to enhance the cyber security operations of its clients. From the CSO’s perspective, hiring a cybersecurity consulting firm now rather than later makes sense, as the CSO bears the ultimate responsibility for actual security breaches. According to advice from the CSO, the CFO can invest immediately (hire a cybersecurity consulting firm), defer their decision, and avoid the investment.

We measure the effectiveness of firms’ information sharing through parameters PD and PF. PD denotes the probability that SCO obtains an SH from information sharing when an attacker intrudes, where SH is the signal of a firm’s cost savings to be high (H) if it invests. Unlike SH, SL signals that a firm’s cost savings is low (L) if it invests. PF is the probability that an SCO obtains an SH from information sharing when an attack does not intrude. Similar to an IDS, we consider a CSO that uses a number score x estimated from the information sharing and a threshold value t in the heart of the CSO to determine whether hiring the cybersecurity consulting firm immediately can help the firm gain high-cost savings. For x >t, the CSO views the attacker as an attacker who intrudes. It follows that PD=tfI(x)dx,PF=tfN(x)dx, where fI(x) and fN(x) are the probability density functions of x for attackers with and without intrusion. Fig 1 illustrates the probability calculation. For a given CSO and information sharing, we capture the relationship between PD and PF as PF = (PD)r, where r captures the CSO’s risk preference. We derived this functional form for the ROC curve as follows:

Fig 1. Probability calculation.

Fig 1

Number score, which is used to distinguish an attacker with and without intrusion, follows an exponential distribution [32]. If the numerical scores for the attacker who intrudes and does not intrude follow exponential distributions with parameters θI and θN, θN>θI, respectively. We then write PD and PF as follows:

PD=tθIe(θIx)dx=eθIt (1)
PF=tθNe(θNx)dx=eθNt (2)

where PD can be expressed as a function of PF, and we write it as PF = (PD)r, where r = θN/θH is greater than one. Similar to Cavusoglu et al. [29] in Fig 2, parameter r captures the CSO’s risk preference and PD>PF. The CSO can obtain two types of signals (SH and SL) from information sharing, and the CFO has two types of investment probability according to the CSO’s signal. Table 1 lists all the decision variables and their implications.

Fig 2. ROC curve.

Fig 2

3. Model analysis

3.1. Information sharing

Lemma 1. Assuming that the firm’s information sharing performs better than the firm’s random determination because PD>PF, the frequency of investment is always higher in the scenario of high-cost saving signal than that of low-cost saving scenario (i.e., ρ1in_defρ2in_def,ρ1in_sha+defρ2in_sha+def). Additionally, the firm may invest in the SL signal scenario only when it completely invests in all SH signal scenarios.

We derive a mixed-strategy Nash equilibrium between a firm and an attacker. We used the following probability computations to derive the equilibrium.

The probabilities of being in the signal of high-cost saving (SH) and low-cost saving (SL) scenarios are given by the following:

P(SH)=ψshaPD+(1ψsha)PF (3)
P(SL)=ψsha(1PD)+(1ψsha)(1PF) (4)

According to Bayes’ rule, the posterior probabilities of the attacker’s intrusion when the firm’s CFO receives a signal of high-cost saving and low-cost saving can be calculated as follows:

η1=P(H|SH)=P(A_investment)P(SH|A_investment)P(SH)=ψshaPDψshaPD+(1ψsha)PF (5)
η2=P(H|SL)=P(A_investment)P(SL|A_investment)P(SL)=ψsha(1PD)ψsha(1PD)+(1ψsha)(1PF) (6)

Fig 3 presents the game model. Our model assumes that both the firm’s CFO and the attacker have perfect information, all of which are available to both. The firm’s expected benefits when receiving a signal of high-cost saving and low-cost saving take the following form:

MH(ρ1insha,ψsha)=η1ρ1insha(HC)+(1η1)ρ1in_sha(LC) (7)
ML(ρ2insha,ψsha)=η2ρ2in_sha(HC)+(1η2)ρ2in_sha(LC) (8)

Fig 3. Game tree with information sharing.

Fig 3

Thus, the firm’s overall expected benefits is as follows:

Msha=M(ρ1insha,ρ2insha,ψsha)=MH(ρ1in_sha,ψsha)P(SH)+ML(ρ2in_sha,ψsha)P(SL) (9)

Similarly, the attacker’s expected benefits when receiving a signal of high-cost saving and low-cost saving take the following form:

AH(ρ1insha,ψsha)=η1[ρ1in_sha(μβ)+(1ρ1in_sha)μ] (10)
AL(ρ2insha,ψsha)=η2[ρ2in_sha(μβ)+(1ρ2in_sha)μ] (11)

Thus, the attacker’s overall expected benefits is as follows:

Asha=A(ρ1insha,ρ2insha,ψsha)=AH(ρ1in_sha,ψsha)P(SH)+AL(ρ2in_sha,ψsha)P(SL) (12)

We assume that a simultaneous game is played between the firm and attacker. The Nash Equilibrium strategies of this game can be solved wherein neither the firm nor the attacker can improve the game’s utility by unilaterally deviating the game’s strategy.

Proposition 1. When a firm and attacker play a simultaneous game, the optimal frequencies of the firm’s investments and the attacker’s intrusion for a given condition in the presence of information sharing as follows:

Proof provided in the Appendix.

IfPDμβ,thenρ1in_sha*=1,ρ2in_sha*=μβPDβ(1PD),ψsha*=(1PF)(CL)(1PD)(HC)+(1PF)(CL).
Ifμβ<PD,thenρ1in_sha*=μβPD,ρ2in_sha*=0,ψsha*=PF(CL)PD(HC)PF(CL).

If the firm’s information sharing is not considered, the CFO will randomly determines whether an attacker intrudes. Thus, the firm’s and attacker’s expected benefits take the following form:

M=M(ρ,ψ)=ψρ(HC)+(1ψ)ρ(LC) (13)
A=A(ρ,ψ)=ψ[ρ(μβ)+(1ρ)μ] (14)

According to Mρ=0 and Aψ=0, we have ψ=CLHL and ρ=μβ. Hence, the Nash Equilibrium between a firm and an attacker in the absence of information sharing is as follows:

Proposition 2. The following mixed strategy profiles constitute the Nash Equilibrium in the given condition in the absence of information sharing.

ρ*=μβ,ψ*=CLHL

To further understand how information sharing affects the strategies of a firm’s CFO and attacker, we compare the probability of the firm’s investment and the attacker’s intrusion in two conditions: in the presence of information sharing and absence of information sharing. We define a firm’s investment rate as the probability of an investment in the consulting firm. The firm’s investment rate is μ/β in the absence of information sharing (Proposition 2). The firm’s investment rate is given by ρ1in_sha*P(SH)+ρ2in_sha*P(SL) in the presence of information sharing, which is equal to the following:

ρin_sha*=μβ(HL)PF(HC)PD(CL)PF,ifμβPD;andρinsha*=(HL)(μ/β)(1PF)(HC)(PDPF)(HL)(1PD)+(CL)(PDPF),ifμβ>PD.

Proposition 3. (1)When the accuracy (PD) of information sharing is low, a firm will invest not only in all SH signal but also in a fraction of SL signal; when the accuracy (PD) of information sharing is high, the firm won’t invest in SL signal and may only invest in a fraction of SH signal.

(2) Information sharing decreases firm’s security investment rate.

When the accuracy (PD) of information-sharing is low, a firm invests in all SH signals because the probability of false positives (PF) is low, and the firm invests in a fraction of SL signal because the probability of false negatives (1−PD) is high. When the accuracy (PD) of information sharing is high, the firm invests in a fraction of SH as the probability of false positives (PF) is high, and the firm gives up investing in SL signal as the probability of false negatives (1−PD) is low.

Information sharing divides the parameter spaces into two regions that help the firm accurately target its investment object. Therefore, to maintain the equilibrium point between the firm and attacker, the firm will decrease its investment rate in the presence of information sharing.

3.2. Deferral decision and information sharing

We assumed LC, μαβ, and αHC in the model description in Chapter II. Additionally, we assume that both the firm’s CFO and the attacker have perfect information. Table 2 list the decisions of the firm and attacker and the relevant benefits when the deferral option is considered. The firm’s and attacker’s expected benefits take the following form:

Mdef=M(ρin_def,ρde_def,ρno_def,ψdef)=ψdef[ρin_def(HC)+ρde_def(αHC)]+(1ψdef)ρin_def(LC) (15)
Adef=A(ρin_def,ρde_def,ρno_def,ψdef)=ψdef[ρin_def(μβ)+ρde_def(μαβ)+ρno_defμ] (16)

where ρin_def+ρde_def+ρno_def=1. The firm’s expected benefits increase in ρde_def according to Eq (15), and Mdefρno_def = 0. Hence, the optimal decision for the firm is ρno_def*=0. Therefore, we have the following:

Mdef=ψdef[ρin_def(HC)+(1ρin_def)(αHC)]+(1ψdef)ρin_def(LC) (17)
Adef=ψdef[ρin_def(μβ)+(1ρin_def)(μαβ)] (18)

Table 2. Firm’s and attacker’s decisions and the relevant benefits when the deferral option is considered.

Decisions and probability Benefits
Attacker Firm Firm Attacker
Intrude (ψdef) Invest Immediately (ρin_def) HC μβ
Defer Decision (ρde_def) αHC μαβ
Not Invest (ρno_def) 0 μ
Not intrude (1-ψdef) Invest Immediately (ρin_def) LC 0
Defer Decision (ρde_def) 0 0
Not Invest (ρno_def) 0 0

When Mdefρin_def=0 and Adefψdef=0, we have the optimal frequencies of the firm’s investment and the attacker’s intrusion, for a given condition with the deferral option.

Proposition 4. (1)The following mixed strategy profiles constitute the Nash Equilibrium in the given condition of a firm’s deferral option.

ρin_def*=μαβ(1α)β,ρde_def*=βμ(1α)β,ρno_def*=0,andφdef*=CL(1α)H+CL

(2) When a firm can defer its decision, the firm will decrease the probability of immediate investment, and avoid non-investment. That is ρin_def*<ρ* and ρno_def*=0.

(3) Probability of a firm’s deferral decision increases in parameter α, that is ρde_def*/α>0.

For a firm to decide between immediate investment and non-investment is difficult; hence, a deferral decision may be a more sensible decision. Compared with non-investment, deferral decision, which decrease uncertainty, can help firms obtain a part of the benefits. Thus, a firm will decrease the probability of immediate investment and avoid non-investment. Essentially, a firm will increase the probability of deferral decision to make a more sensible decision. According to Proposition 4, a firm will avoid non-investment if the firm can defer its decision. Hence, assuming that the firm and attacker are simultaneously playing games, we construct a game tree (Fig 4) when both the firm’s information sharing and deferral option are considered.

Fig 4. Game tree in the presence of information sharing and deferral option.

Fig 4

Similar to the scenario with only the firm’s information sharing, if both the firm’s information sharing and deferral option are considered, the firm’s expected benefits when obtaining a signal of high-cost saving and low-cost saving take the following form:

MH(ρ1in_sha+def,ψsha+def)=η1[ρ1in_sha+def(HC)+(1ρ1in_sha+def)(αHC)]+(1η1)ρ1in_sha+def(LC) (19)
ML(ρ2in_sha+def,ψsha+def)=η2[ρ2in_sha+def(HC)+(1ρ2in_sha+def)(αHC)]+(1η2)ρ2in_sha+def(LC) (20)

Thus, the firm’s overall expected benefits is

Msha+def=M(ρ1insha+def,ρ2insha+def,ψsha+def)=MH(ρ1in_sha+def,ψsha+def)P(SH)+ML(ρ2in_sha+def,ψsha+def)P(SL) (21)

Similarly, if both the firm’s information sharing and deferral option are considered, the attacker’s expected benefits when obtaining a signal of high-cost saving and low-cost saving take the following form:

AH(ρ1in_sha+def,ψsha+def)=η1[ρ1in_sha+def(μβ)+(1ρ1in_sha+def)(μαβ)] (22)
AL(ρ2in_sha+def,ψsha+def)=η2[ρ2in_sha+def(μβ)+(1ρ2in_sha+def)(μαβ)] (23)

Thus, the attacker’s overall expected benefits is as follows:

Asha+def=A(ρ1insha+def,ρ2insha+def,ψsha+def)=AH(ρ1in_sha+def,ψsha+def)P(SH)+AL(ρ2in_sha+def,ψsha+def)P(SL) (24)

Proof is similar to Proposition 1: For a given scenario with a firm’s information sharing and deferral option, we have the optimal frequencies of the firm’s investment and the attacker’s intrusion.

Proposition 5. When a firm and an attacker play a simultaneous game, for a given scenario with both the firm’s information sharing and deferral option, the optimal frequencies of the firm’s investments and the attacker’s intrusion are as follows:

If PDμαβ(1α)β, then

ρ1in_sha+def*=1,ρ2in_sha+def*=μαβPD(1α)β(1PD)(1α)β,ψsha+def*=(1PF)(CL)(1PD)(1α)H+(1PF)(CL);
ρ1de_sha+def*=0,ρ2de_sha+def*=βμ(1PD)(1α)β.

If μαβ(1α)β<PD, then

ρ1in_sha+def*=μαβPD(1α)β,ρ2in_sha+def*=0,ψsha+def*=PF(CL)PD(1α)H+PF(CL);
ρ1de_sha+def*=PD(1α)βμ+αβPD(1α)β,ρ2de_sha+def*=1.

Similar to the case with only the firm’s information sharing, in the scenario with both the firm’s information sharing and deferral option, the firm’s investment and deferral rates are given by ρ1in_sha+def* P(SH)+ρ2in_sha+def* P(SL) and ρ1de_sha+def*P(SH)+ρ2de_sha+def*P(SL) respectively, which are equal to the following:

ρin_sha+def*=1ρde_sha+def*,ρde_sha+def*=βμ(1α)β(1PD)ψsha+def*+(1PF)(1ψsha+def*)1PD if PDμαβ(1α)β; and

ρin_sha+def*=μαβ(1α)βPDψsha+def*+PF(1ψsha+def*)PD,ρde_sha+def*=1ρin_sha+def* if μαβ(1α)β<PD.

Proposition 6. (1) When the accuracy (PD) of firm’s information sharing is low, the firm will invest immediately not only all SH signal, but also a fraction of SL signal. When the accuracy (PD) of firm’s information sharing is high, the firm will avoid investing all SL signal, and in fact, the firm may invest immediately a fraction of SH signal.

(2) After information sharing, the probability of the firm’s deferral decision increases for SL signal, but it decreases for SH signal. Besides, the firm’s overall deferral rate increases after the information sharing.

(3) Attacker decreases its probability of intrusion when the accuracy (PD) of the information sharing is high, but it increases the probability when the accuracy (PD) is low.

Proof is as follow:

When PDμαβ(1α)β,ρde_sha+def*>ρde_def* because of (1PD)ψsha+def*+(1PF)(1ψsha+def*)1PD>1. Besides, ρ2de_sha+def*>ρde_def*>ρ1de_sha+def*=0, and ψsha+def*>φdef*.

When μαβ(1α)β<PD,ρde_sha+def*>ρde_def* because of PDψsha+def*+PF(1ψsha+def*)PD<1ρin_sha+def*<ρin_def*. Besides, ρ1de_sha+def*<ρde_def*<ρ2de_sha+def* = 1, and ψsha+def*<φdef*.

Explanation of (1) is similar to that of Proposition 3; hence, it is omitted here. A firm’s information sharing helps the firm accurately target its investment object. Thus, the firm increases the probability of immediate investment in the SH signal case (firm decreases the probability of its deferral decision) and decreases the probability of immediate investment in the SL signal case (firm increases the probability of its deferral decision). The extent of the change in a firm’s deferral decision in SL signal is higher than in the SH signal, causing overall deferral rate to increase. High deterrence of a firm’s information sharing cause the attacker to decrease its intrusion probability when the accuracy (PD) of a firm’s information sharing is high. This is opposite when the accuracy is low.

4. Value of information sharing and deferral option

4.1. Value of information sharing and deferral option with default CSO

After analysing the effect of a firm’s information sharing and deferral decision on the firm’s and attacker’s decisions in Chapter III, we discuss the effect on a firm’s expected benefits.

Using Proposition 1 and Eq (9), the firm’s expected benefits in the absence of information sharing and deferral decision is M* = 0.

Using Proposition 2 and Eq (13), the firm’s expected benefits in the presence of only the firm’s information sharing is as follows: Msha*=(PDPF)(HC)(CL)(1PD)(HC)+(1PF)(CL), if PDμβ;Msha*=0, if PD>μβ.

Using Proposition 4 and Eq (17), the firm’s expected benefits in the presence of only the firm’s deferral option is Mdef*=(CL)(αHC)(1α)H+(CL).

Using Proposition 5 and Eq (21), the firm’s expected benefits in the presence of the firm’s information sharing and deferral decision is Msha+def*=(CL)[(1PD)αH+(PDPF)H(1PF)C](1PD)(1α)H+(1PF)(CL), if PDμαβ(1α)β;Msha+def*=PF(CL)(αHC)PD(1α)H+PF(CL), if PD>μαβ(1α)β.

Proposition 7. (1) Firm’s information sharing can increase a firm’s expected benefits only when the accuracy is low, and the firm’s expected benefits increases in the accuracy (PD).

(2) Deferral decision can increase a firm’s expected benefits, and the firm’s expected benefits increase in parameter α.

(3) Firm’s information sharing can improve the effect of deferral decision when the accuracy (PD) is low but weaken the effect when the accuracy (PD) is high.

The proof is as follows:

When PDμβ,Msha*PD>0.Mdef*>M*,Mdef*α>0.

When PDμαβ(1α)β,Msha+def*Mdef*=(CL)(1α)H(PDPF)(HL)[(1PD)(1α)H+(1PF)(CL)][(1α)H+CL]>0;

When PD>μαβ(1α)β,Msha+def*Mdef*=(CL)(αHC)(1α)H(PDPF)[PD(1α)H+PF(CL)][(1α)H+CL]<0.

Low accuracy (PD) has a low deterrence to the attacker, causing the attacker’s intrusion probability to become high and stable. Therefore, a firm’s decision in Propositions 1 and 5 can make the firm increase its benefits. A high accuracy (PD) has a high deterrence to the attacker, causing the attacker’s intrusion probability to become low and unstable. Therefore, the firm’s decision in Propositions 1 and 5 cannot increase its benefits.

Deferring cybersecurity investment can cause some cybersecurity breaches. However, it decreases uncertainty, and the firm can make a more sensible decision; hence the firm’s expected benefits increase. With an increase in parameter α, the negative effect of deferral investment on the firm’s benefits decreases; hence, the firm’s expected benefits increase in parameter α. Both the firm’s deferral decision and information sharing aim to decrease the uncertainty associated with the firm’s potential costs.

When the accuracy (PD) of a firm’s information sharing is low, the firm will increase the probability of the deferring decision in Proposition 5. Hence, the firm will decrease the probability of investing in the SL single. Investment in SL singles is inefficient in increasing the firm’s expected benefits; hence, when the accuracy is low, the firm’s information sharing improves the effect of the firm’s deferring decision. When the accuracy (PD) of a firm’s information sharing is high, the firm will decrease the probability of the deferring decision in Proposition 5. Hence, the firm will increase the probability of investing in the SL single. Therefore, when the accuracy is high, the firm’s information sharing weakens the effect of the firm’s decision to defer.

4.2. Value of information sharing and deferral option with optional CSO

Proposition 7 indicates that by choosing PD (or choosing CSO), the CFO can determine how to operate. In the presence of a firm’s information sharing and deferral decision, a comparison of the firm’s benefits in the equilibrium regions demonstrates that the firm realizes high benefits when PD≤(μαβ)/[(1−α)β]. Consequently, the CFO will choose the value of PD to realize PD≤(μαβ)/[(1−α)β]. Next, the firm should decide where to lie in this region. When PD≤(μαβ)/[(1−α)β] writing the benefit as a function of PD and taking the first derivative yields the following:

Msha+def*PD>0. (25)

Proof: (Msha+def*Mdef*)PD>0 and Mdef*PD = 0.

This derivative implies that the CFO should maximize choose the maximum PD when PD≤(μαβ)/[(1−α)β]. Thus, the optimal PD is PD*=(μαβ)/[(1α)β] in this region, with a firm’s deferral option and information sharing. Similarly, a firm in the absence of its deferral option should maximize choose maximum PD when PDμ/β. Hence, if only a firm’s information sharing is considered, PD*=μ/β. A firm’s information sharing has a negative effect on its deferral decision when accuracy (PD) is high; hence, it is omitted here.

To further analyse the effect of a firm’s information sharing and deferral option, we calculated the firm’s expected benefits for information sharing, deferral decision, and both information sharing and deferral decision. These are a number of examples. Let C = 10, H = 20, L = 5, r = 3, μ = 0.8, β = 10. Fig 5 presents the condition of α = 0.6, Fig 6 presents the condition of α = 0.7.

Fig 5. Firm’s expected benefits (α = 0.6).

Fig 5

Fig 6. Firm’s expected benefits (α = 0.7).

Fig 6

Figs 5 and 6 illustrate Proposition 7. Additionally, when accuracy (PD) is low, the firm’s optimal decision combine its information sharing and deferral decision. When accuracy (PD) is between (μαβ)/[(1−α)β] and μ/β, the firm’s optimal decision is only its information sharing. When accuracy (PD) is high enough, which is higher than μ/β, the firm’s optimal decision is only its deferral decision. Accuracy (PD) is related to the risk preference of the CSO, and the probability of an attacker’s breach is related to the time of deferral and accuracy (PD). Thus, a firm should analyses the risk preference of CSO, the accuracy of information sharing, and the time of deferral before making its decisions in cyber security investment.

5. Conclusion

Based on a game framework between a firm and an attacker, we determined the effect of the firm’s information sharing and deferral option on a firm’s expected benefits. We divided the parameter space of the Chief Financial Officer’s decision into different regions by different accuracy of information sharing. Notably, after a firm’s information sharing, the probability of a firm’s deferral decision decreases for a high-benefit signal but increases for a low-benefit signal. Additionally, a firm’s overall deferral rate increases after information sharing. Moreover, a firm’s information sharing can improve the effect of its deferral decision on its expected benefits when the accuracy of information sharing is low, but weakens the effect when the accuracy of information sharing is high.

This article includes a deferral option; however, deferral time is not considered. In fact, the effect of deferral option on a firm’s expected benefits is closely related to deferral time. Deferral time will be an interesting issue for future research. To facilitate calculation, we assume that neither a free-ride nor a cost for a firm’s information sharing. This will be considered in the future, and the relationship between the probability of accuracy and false positives will be an interesting but challenging issue.

Supporting information

S1 Appendix

(DOCX)

Data Availability

All relevant data are within the paper.

Funding Statement

The Science and Technology Innovation Fund (163060171) and the General Program in philosophy and Social Sciences (2022SJYB0124) are all received by Chuanxi Cai. The Science and Technology Innovation Fund (163060171) is supported by Nanjing Forestry University, and the General Program in philosophy and Social Sciences (2022SJYB0124) is supported by Jiang Su Provice. There is no additional external funding received for this study The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

References

  • 1.Hausken K., “Returns to information security investment: Endogenizing the expected loss.” Information Systems Frontiers, vol. 16, no. 2, pp. 329–336, 2014. [Google Scholar]
  • 2.Gao X. and Zhong W. J., “Information security investment for competitive firms with hacker behaviour and security requirements.” Annals of Operations Research, vol. 235, no. 1, pp. 277–300, 2015. a. [Google Scholar]
  • 3.Qian X. et al. , “A new game of information sharing and security investment between two allied firms.” International Journal of Production Research, vol. 56, no. 12, pp. 4069–4086, 2018. [Google Scholar]
  • 4.Qian X. et al., “A game of information security investment considering security insurance and complementary information assets.” International Transactions in Operational Research, vol. 29, no. 3, pp. 1791–1824, 2022. [Google Scholar]
  • 5.Shao X. et al., “Shall we follow? Impact of reputation concern on information security managers’ investment decisions.” Computers & Security, vol. 97, pp. 101961, 2020. [Google Scholar]
  • 6.Li X., “Decision making of optimal investment in information security for complementary enterprises based on game theory.” Technology Analysis & Strategic Management, pp. 1–15, 2020. [Google Scholar]
  • 7.Li X., “An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform.” Managerial and Decision Economics, vol. 43, no. 3, pp.595–606, 2022. [Google Scholar]
  • 8.Li X. and Xue Q., “An economic analysis of information security investment decision making for substitutable enterprises.” Managerial and Decision Economics, vol. 42, no. 5, pp. 1306–1316, 2021. [Google Scholar]
  • 9.Demetz L. and Bachlechner D., “To invest or not to invest? Assessing the economic viability of a policy and security configuration management tool.” The Economics of Information Security and Privacy. Springer, pp. 25–47, 2013. [Google Scholar]
  • 10.Bian Y. T., Xu L., and Li J. S., “Evolving dynamics of trading behaviour based on coordination game in complex networks.” Physica A: Statistical Mechanics and its Applications, vol. 449, 281–290, 2016. [Google Scholar]
  • 11.White C. M., Hoffrage U., and Reisen N., “Choice deferral can arise from absolute evaluations or relative comparisons.” Journal of Experimental Psychology: Applied, vol. 21, no. 2, pp. 140, 2015. doi: 10.1037/xap0000043 [DOI] [PubMed] [Google Scholar]
  • 12.Bhatia S. and Mullett T. L., “The dynamics of deferred decision.” Cognitive psychology, vol. 86, pp. 112–151, 2016. doi: 10.1016/j.cogpsych.2016.02.002 [DOI] [PubMed] [Google Scholar]
  • 13.Larasati A. and Yeh M. Y., “Does more attractive choice always decrease choice deferral? The moderating effect of ideal point.” International Journal of Hospitality Management, vol. 54, pp. 43–51, 2016. [Google Scholar]
  • 14.Lee W. B. and Kim J. H., “The effect of single option on choice deferral: focusing on anticipated regret.” The korean journal of consumer and advertising psychology, vol. 20, no. 3, pp. 319–342, 2019. [Google Scholar]
  • 15.Berens S. and Funke J., “A vignette study of option refusal and decision deferral as two forms of decision avoidance: Situational and personal predictors.” PloS one, vol. 15, no. 10, e0241182, 2020. doi: 10.1371/journal.pone.0241182 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 16.Gal-Or E. and Ghose A., “The economic incentives for sharing security information.” Information Systems Research, vol. 16, no. 2, pp. 186–208, 2005. [Google Scholar]
  • 17.Hausken K., “Information sharing among firms and cyber attacks.” Journal of Accounting and Public Policy, vol. 26, no. 6, pp. 639–688, 2007. [Google Scholar]
  • 18.Liu D., Ji Y., and Mookerjee V., “Knowledge sharing and investment decisions in information security.” Decision Support Systems, vol. 52, no. 1, pp. 95–107, 2011. [Google Scholar]
  • 19.Gao X., Zhong W. J., and Mei S. E., “Security investment and information sharing under an alternative security breach probability function.” Information Systems Frontiers, vol. 17, no. 2, pp. 423–438, 2015. b. [Google Scholar]
  • 20.Hausken K., “A strategic analysis of information sharing among cyber hackers.” JISTEM-Journal of Information Systems and Technology Management, vol. 12, no. 2, pp. 245–270, 2015. [Google Scholar]
  • 21.Hausken K., “Security investment, hacking, and information sharing between firms and between hackers.” Games, vol. 8, no.2, pp. 23, 2017. [Google Scholar]
  • 22.Solak S. and Zhuo Y., “Optimal policies for information sharing in information system security.” European Journal of Operational Research, vol. 284, no. 3, pp. 934–950, 2020. [Google Scholar]
  • 23.Gao X. et al., “Information security investment with budget constraint and security information sharing in resource-sharing environments.” Journal of the Operational Research Society, to be published. doi: 10.1080/01605682.2022.2096506, pp. 1–16, 2022. [DOI] [Google Scholar]
  • 24.Kwak J. K. and Gavirneni S., “Impact of information errors on supply chain performance.” Journal of the Operational Research Society, vol. 66, no.2, pp. 288–298, 2015. [Google Scholar]
  • 25.Hausken K. “Proactivity and retroactivity of firms and information sharing of hackers.” International Game Theory Review, vol. 20, no. 1, 1750027, 2018. [Google Scholar]
  • 26.Gordon L. A., et al., “The impact of information sharing on cyber security underinvestment: a real options perspective.” Journal of Accounting and Public Policy, vol. 34, no. 5, pp. 509–519, 2015. [Google Scholar]
  • 27.Yue W. T. and Cakanyildirim M., “Intrusion prevention in information systems: Reactive and proactive responses.” Journal of Management Information Systems, vol. 24, no. 1, pp.329–353, 2007. [Google Scholar]
  • 28.Cai C., Mei S. E., and Zhong W. J., “Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems.” Information Technology and Management, vol. 20, no. 2, pp. 55–71, 2019. [Google Scholar]
  • 29.Cavusoglu H., Mishra B., and Raghunathan S., “The value of intrusion detection systems (IDSs) in information technology security.” Information Systems Research, vol. 16, no. 1, pp. 28–46, 2005. [Google Scholar]
  • 30.Cavusoglu H., Raghunathan S., and Cavusoglu H., “Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems.” Information Systems Research, vol. 20, no. 2, pp. 198–217, 2009. [Google Scholar]
  • 31.Gordon L. A., Loeb M. P., and Lucyshyn W., “Information security expenditures and real options: A wait-and-see approach.” Computer Security Journal, vol. 19, no. 2, 2003. [Google Scholar]
  • 32.Cavusoglu H. and Raghunathan S., “Configuration of detection software: A comparison of decision and game theory approaches.” Decision Analysis, vol. 1, no.3, pp. 131–148, 2004. [Google Scholar]

Decision Letter 0

Olivier Bos

6 Nov 2022

PONE-D-22-24920Information sharing and deferral option in cyber security investmentPLOS ONE

Dear Dr. Cai,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

==============================Dear authors,

I have now heard back from an expert reviewer on your paper entitled Information Sharing and Deferral Option in Cyber Security Investment. The reviewer considers you work is an interesting contribution. The reviewer has a couple of comments about the “deferral option” that you should address. I agree with him/her, and you must take in account carefully to all points raised in the report.

Moreover, the reviewer mentioned that one criteria is not in line with the publication criteria of PLOS One. I do agree, and I expect a better improvement that suggested in the reviewer’s report. You must improve the written English in the manuscript to reach the required standard: "an intelligible fashion and written in standard English". This is a major point to address.

Irrespective of the direction you eventually choose I registered the submission as major revision. PLOS One often has short deadlines. You should let the journal managers know that you need more time (if you do; the deadlines are not useful for theoretical economic work). Extension of the auto-deadline is fine with me.

Sincerely,

Olivier Bos

==============================

Please submit your revised manuscript by Dec 15 2022 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Olivier Bos

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. We suggest you thoroughly copyedit your manuscript for language usage, spelling, and grammar. If you do not know anyone who can help you do this, you may wish to consider employing a professional scientific editing service. 

Whilst you may use any professional scientific editing service of your choice, PLOS has partnered with both American Journal Experts (AJE) and Editage to provide discounted services to PLOS authors. Both organizations have experience helping authors meet PLOS guidelines and can provide language editing, translation, manuscript formatting, and figure formatting to ensure your manuscript meets our submission guidelines. To take advantage of our partnership with AJE, visit the AJE website (http://learn.aje.com/plos/) for a 15% discount off AJE services. To take advantage of our partnership with Editage, visit the Editage website (www.editage.com) and enter referral code PLOSEDIT for a 15% discount off Editage services.  If the PLOS editorial team finds any language issues in text that either AJE or Editage has edited, the service provider will re-edit the text for free.

Upon resubmission, please provide the following:

The name of the colleague or the details of the professional service that edited your manuscript

A copy of your manuscript showing your changes by either highlighting them or using track changes (uploaded as a *supporting information* file)

A clean copy of the edited manuscript (uploaded as the new *manuscript* file)

3. We note that the grant information you provided in the ‘Funding Information’ and ‘Financial Disclosure’ sections do not match. 

When you resubmit, please ensure that you provide the correct grant numbers for the awards you received for your study in the ‘Funding Information’ section.

4. Thank you for stating in your Funding Statement: 

"This work was supported in part by the Science and Technology Innovation Fund (163060171) and in part by the General Program in philosophy and Social Sciences (2022SJYB0124).

The Science and Technology Innovation Fund (163060171) and the General Program in philosophy and Social Sciences (2022SJYB0124) are all received by Chuanxi Cai."

Please provide an amended statement that declares *all* the funding or sources of support (whether external or internal to your organization) received during this study, as detailed online in our guide for authors at http://journals.plos.org/plosone/s/submit-now.  Please also include the statement “There was no additional external funding received for this study.” in your updated Funding Statement. 

Please include your amended Funding Statement within your cover letter. We will change the online submission form on your behalf.

5. In your Data Availability statement, you have not specified where the minimal data set underlying the results described in your manuscript can be found. PLOS defines a study's minimal data set as the underlying data used to reach the conclusions drawn in the manuscript and any additional data required to replicate the reported study findings in their entirety. All PLOS journals require that the minimal data set be made fully available. For more information about our data policy, please see http://journals.plos.org/plosone/s/data-availability.

Upon re-submitting your revised manuscript, please upload your study’s minimal underlying data set as either Supporting Information files or to a stable, public repository and include the relevant URLs, DOIs, or accession numbers within your revised cover letter. For a list of acceptable repositories, please see http://journals.plos.org/plosone/s/data-availability#loc-recommended-repositories. Any potentially identifying patient information must be fully anonymized.

Important: If there are ethical or legal restrictions to sharing your data publicly, please explain these restrictions in detail. Please see our guidelines for more information on what we consider unacceptable restrictions to publicly sharing data: http://journals.plos.org/plosone/s/data-availability#loc-unacceptable-data-access-restrictions. Note that it is not acceptable for the authors to be the sole named individuals responsible for ensuring data access.

We will update your Data Availability statement to reflect the information you provide in your cover letter.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: No

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: September 16, 2022

Report PONE-D-22-24920

1. The article provides an interesting analysis of information sharing and the deferral option in security investment.

2. One main contribution is to include the deferral option, which is not much analyzed in the literature.

3. A native reader is needed. The article ignores most rules on singular/plural, when to use “the,” etc.

4. The article should specify that the analysis is about information sharing between firms, not information sharing between attackers.

5. The article considers only one firm, abstracting away that information sharing actually occurs between at least two firms (or between at least two attackers). This limitation should be discussed. Especially, how can the results be realistic when only one firm is analyzed?

6. The first sentence in the abstract says “information security investment strategies.” The article should specify more clearly exactly which number of strategies are available for each player.

7. The deferral option should be defined more clearly. What is being deferred? The reader quickly realizes that the firm’s security investment (singular or plural?) may or may not be deferred. Can information sharing be deferred? Why does the reader have to search forever to find out whether or not information sharing can be deferred?

8. The authors should ensure that all the articles in the reference list, checking one by one, are cited inside the article.

9. The alpha is crucial, and should probably be different for the firm and the attacker.

10. The article’s focus on the deferral option pertains to whether the firm is proactive by investing early, or retroactive by investing later after a deferral. Comparison of the approach and results with the following article seems useful: Hausken, K. (2018), “Proactivity and Retroactivity of Firms and Information Sharing of Hackers,” International Game Theory Review 20, 1, 1750027, doi: 10.1142/S021919891750027X.

11. More generally, comparing the approach and results with the articles in the reference list should be made more thoroughly, accounting for the fact that the article considers only one firm.

12. The weak abstract should be strengthened substantially, listing and discussing the results, emphasizing the contribution relative to the literature, etc. Conclusions can be written without parameters.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Kjell Hausken

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Attachment

Submitted filename: PONE-D-22-24920.docx

PLoS One. 2023 Feb 6;18(2):e0281314. doi: 10.1371/journal.pone.0281314.r002

Author response to Decision Letter 0


25 Nov 2022

Dear Reviewers:

Thank you for your review, we have amended this article according to your advice. All the question and answer are as follows:

1. The article provides an interesting analysis of information sharing and the deferral option in security investment.

2. One main contribution is to include the deferral option, which is not much analyzed in the literature.

Answer: we have added the analysis of the deferral option in the third paragraph of introduction.

3. A native reader is needed. The article ignores most rules on singular/plural, when to use “the,” etc.

Answer: we have checked and fixed all the rules on singular/plural, when to use “the,” etc.

4. The article should specify that the analysis is about information sharing between firms, not information sharing between attackers.

5. The article considers only one firm, abstracting away that information sharing actually occurs between at least two firms (or between at least two attackers). This limitation should be discussed. Especially, how can the results be realistic when only one firm is analyzed?

Answer to question 4 and 5: This study assumes that firms have joined an industry-specific information-sharing group. No charges are incurred for joining this information-sharing group, providing that a firm is willing to share cybersecurity-related information with the group’s members (i.e., free-riders are excluded from this group). Based on the agreement, all firms report detailed information to the group’s members on their actual cybersecurity breaches and the steps taken to prevent and respond to cybersecurity breaches. Hence, the study constructs a game model between a firm and an attacker; however, the firm can enjoy information sharing. In this study, information sharing occurs between the members of the industry-specific information-sharing group. Additionally, the analysis in this study concerns information sharing between firms, not information sharing between attackers. All of these has been specified in the previous section of the model description.

6. The first sentence in the abstract says “information security investment strategies.” The article should specify more clearly exactly which number of strategies are available for each player.

Answer: A firm has three strategies: immediate investment, no investment, and decision-making after deferral. An attacker has only two strategies: intrusion and no intrusion. All of these has been specified in the previous section of the model description.

7. The deferral option should be defined more clearly. What is being deferred? The reader quickly realizes that the firm’s security investment (singular or plural?) may or may not be deferred. Can information sharing be deferred? Why does the reader have to search forever to find out whether or not information sharing can be deferred?

Answer: The deferral option is a strategy of firm’s security investment, not the strategy of firm’s information sharing. That is, firm’s cybersecurity investment can be deferred, firm’s information sharing cannot be deferred. All of these has been specified in the previous section of the model description.

8. The authors should ensure that all the articles in the reference list, checking one by one, are cited inside the article.

Answer: All the articles in the reference list has been checked. We have deleted one of the articles that is not cited inside the article.

9. The alpha is crucial, and should probably be different for the firm and the attacker.

Answer: α is different for the firm and the attacker, however, the effect of firm’s deferral investment on firm and attack’s expected benefits is positive correlation. Additionally, the difference of α between firm and attacker has no influence on our conclusion; hence, we assume the effect of firm’s deferral investment on the expected benefits of firm and attack is equal for the convenience of calculation. We have illustrated it in the Model Description.

10. The article’s focus on the deferral option pertains to whether the firm is proactive by investing early, or retroactive by investing later after a deferral. Comparison of the approach and results with the following article seems useful: Hausken, K. (2018), “Proactivity and Retroactivity of Firms and Information Sharing of Hackers,” International Game Theory Review 20, 1, 1750027, doi: 10.1142/S021919891750027X.

Answer: Similar to the proactive and retroactive defences in Hausken (2018), firm’s defence is proactive if it invests immediately, or retroactive if it invests later after a deferral.

The information sharing in this article is the information sharing between firms, but the information sharing in Hausken (2018) is the information sharing between hackers.

This paper investigates the effect of information sharing and deferral option on a firm’s expected benefits, and the firm and the attacker are simultaneously playing game. Notably, information sharing can improve the effect of deferral decision on a firm’s expected benefits when the accuracy of information sharing is low but weaken the effect when the accuracy of information sharing is high. Hausken (2018) analysis the interplay between the information sharing of hackers and the defense strategies of firms, and the game is four-period games. Notably, firm prefers to deter the first disadvantaged hacker when the two hackers benefit substantially from information sharing, reputation gain, or the second player is advantaged. All of these has been specified in the third and fourth paragraph of introduction.

11. More generally, comparing the approach and results with the articles in the reference list should be made more thoroughly, accounting for the fact that the article considers only one firm.

Answer: this article considers only one firm; however, this article assume the firm has joined an industry-specific information-sharing group, and there is no charges are incurred for joining this information-sharing group, providing that a firm is willing to share cybersecurity-related information with the group’s members (i.e., free-riders are excluded from this group). The relationship between firms is not considered, but the firm can share information with other firms in the group. Therefore, the results in this paper can be applied to the condition with two or more firms.

12. The weak abstract should be strengthened substantially, listing and discussing the results, emphasizing the contribution relative to the literature, etc. Conclusions can be written without parameters.

Answer: we have added the contribution of this paper relative to the literature ate the end of the abstract. The parameters in the conclusions are replaced with the definition.

Finally, we have employed a professional scientific editing service (Editage) for this study’s language usage, spelling, and grammar. We deeply appreciate your consideration of our manuscript, and give us good reviews. If you have any queries, please do not hesitate to contact us.

Thank you and best regards.

Yours sincerely

Chuanxi Cai

Attachment

Submitted filename: Response to Reviewers.docx

Decision Letter 1

Olivier Bos

13 Dec 2022

PONE-D-22-24920R1Information sharing and deferral option in cybersecurity investmentPLOS ONE

Dear Dr. Cai,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

 I have now carefully checked your review responses and read the revised version in detail again. The reviewer and I are happy about your revision. Yet you ignored the reviewer request about the command of knowledge in English. I urge you to proceed and follow his/her advise. I cannot accept the paper without this improvement. 

Please submit your revised manuscript by Jan 27 2023 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Olivier Bos

Academic Editor

PLOS ONE

Journal Requirements:

Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: (No Response)

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: No

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The authors have addressed my concerns, but ignored my request for a native reader. For example, the authors do not know when to use “the” and “a”, mixes past tense and present tense in the literature review, several typos exist, and the article ignores rules on singular/plural. For example, after equation (6) the following sentence is presented: “Fig. 3 indicate the game model.” Since Fig. 3 is singular, it should be “Fig. 3 indicates the game model.” or, which is better, “Fig. 3 presents the game model.”

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Kjell Hausken

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

PLoS One. 2023 Feb 6;18(2):e0281314. doi: 10.1371/journal.pone.0281314.r004

Author response to Decision Letter 1


18 Dec 2022

Dear Reviewers:

Thank you for your review, we have amended this article according to your advice. All the question and answer are as follows:

1. The authors have addressed my concerns, but ignored my request for a native reader. For example, the authors do not know when to use “the” and “a”, mixes past tense and present tense in the literature review, several typos exist, and the article ignores rules on singular/plural. For example, after equation (6) the following sentence is presented: “Fig. 3 indicate the game model.” Since Fig. 3 is singular, it should be “Fig. 3 indicates the game model.” or, which is better, “Fig. 3 presents the game model.”

Answer: we have checked and fixed all the rules on “the” and “a”, past tense and present tense, singular/plural. Additionally, several typos are also fixed. We deeply appreciate your consideration of our manuscript, and give us good reviews. If you have any queries, please do not hesitate to contact us.

Thank you and best regards.

Yours sincerely

Chuanxi Cai

Attachment

Submitted filename: Response to Reviewers1.docx

Decision Letter 2

Olivier Bos

20 Jan 2023

Information sharing and deferral option in cybersecurity investment

PONE-D-22-24920R2

Dear Dr. Cai,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Olivier Bos

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Acceptance letter

Olivier Bos

26 Jan 2023

PONE-D-22-24920R2

Information sharing and deferral option in cybersecurity investment

Dear Dr. Cai:

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department.

If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org.

If we can help with anything else, please email us at plosone@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Olivier Bos

Academic Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    S1 Appendix

    (DOCX)

    Attachment

    Submitted filename: PONE-D-22-24920.docx

    Attachment

    Submitted filename: Response to Reviewers.docx

    Attachment

    Submitted filename: Response to Reviewers1.docx

    Data Availability Statement

    All relevant data are within the paper.


    Articles from PLOS ONE are provided here courtesy of PLOS

    RESOURCES