Abstract
This study investigates the effect of information sharing and deferral option on a firm’s information security investment strategies by considering strategic interactions between a firm and an attacker. We find that 1) information sharing decreases a firm’s security investment rate. 2) If a deferral decision is possible, the firm will decrease its immediate investment, and avoid non-investment. 3) After information sharing, the probability of a firm’s deferral decision increases for low-benefit information (SL) but decreases for high-benefit information (SH). 4) When information sharing accuracy is low, a firm only defers decisions in a fraction of SL; when information sharing accuracy is high, the firm defers its decisions in all SL and a fraction of SH. 5) Information sharing can improve the effect of deferral decision when accuracy is low but weaken it when accuracy is high. These results contradict the literature, wherein information sharing reduces a firm’s uncertainty on cybersecurity investment and decreases deferment options associated with investment.
1. Introduction
Corporations worldwide are currently making critical investments in various cybersecurity-related activities. Hence, security investments in information systems have become critical in information security economics. Hausken [1] believes substantial security investment is needed to deter most perpetrators. Gao and Zhong [2] analysed information security investment strategies under both targeted and mass attacks by considering strategic interactions between two competitive firms and a hacker. Qian et al. [3] determined a new game of information sharing and security investment between two allied firms. Considering information security insurance, Qian et al. [4] determined an information security investment game between two firms with complementary information assets. Shao et al. [5] analysed the impact of reputational concerns on information security managers’ investment decisions. Li Xiaotong [6] provided a solution for the information security investment decisions of complementary enterprises under the characteristics of multi-enterprise and non-cooperative enterprises. Li Xiaotong [7] conducted an evolutionary game-theoretical analysis of enterprise information security investments based on an information-sharing platform. Li and Xue [8] conducted an economic analysis of information security investment decisions for substitutable enterprises.
The potential benefits (payoffs) of security investments largely involve potential cost savings, which are riddled with significant uncertainty. Therefore, to obtain more information, firms tend to defer much of their cybersecurity investments unless they are reacting to a major breach [9]. Moreover, when the firms obtain information about the intrusion of an attacker, they can share the information to decrease the cost of their defence. Bian et al. [10] indicated that investors are prone to imitate their neighbours’ activities through a comprehensive analysis of the risk dominance degree of certain investment behaviour. Overall, before making cybersecurity investments, firms tend obtain more accurate information through information sharing or decrease uncertainty by deferring decisions.
Deferral (postponing one decision to a later date) is a recent occurrence in cybersecurity investment; however considerable research has been made in psychology [11,12] and management [13,14] literature. White et al. [11] suggested that choice deferrals can arise from absolute evaluations or relative comparisons. Larasati and Yeh [13] demonstrated that a more attractive choice always decreases choice deferral. Berens and Funke [15] determined how situational and personal factors influence two different forms of decision avoidance: 1) deferring choice to a later point in time (decision deferral) and 2) refusing both alternatives (option refusal). Deferral can lead to better decisions by enabling a search for additional information or better alternatives. However, this can be risky because a cybersecurity breach could occur during the deferral process. In this study, the deferral option is one of the firm’s strategies before making cybersecurity investments. Hence, the firm has three strategies for cybersecurity investment: immediate investment, no investment, and decision-making after deferral. If the firm cannot make decision between investment and no investment, it can select the deferral option. That is, the firm can make no decision for some time and decide whether to invest after obtaining more information by deferring. Previous research on deferral has mainly focused on factors affecting the deferral decision-making of firms but this article focus on the effect of deferral option on a firm’s expected benefits.
Moreover, information sharing has a certain history in cybersecurity investment [3,16–23], which can help firms obtain more useful information about the attacker and firm. However, information sharing is also associated with the free-rider problem, risk of information leakage and information errors [24]. Therefore, incentives for information sharing are harder to furnish. Information sharing between firms is a deterrent to an attack, which could change the choice of the attacker [23]. Hausken [25] analysed a firm’s proactive and retroactive defence against hackers with information sharing in four-period games. Hausken [25] only considered information sharing between hackers and not information sharing between firms. Gordon et al. [26] demonstrated how information sharing could encourage firms to proactively (and not reactively) approach cybersecurity investments. Assuming that information obtained through information sharing is accurate, Gordon et al. [26] believe that a firm’s information sharing decreases the value of its deferment option associated with the investment. In Gordon et al. [26], a firm’s cost saving from information security investment by hiring a cybersecurity consulting firm—according to a Chief Security Officer (CSO)—would be either $40000 (low-saving) or $200000 (high-saving) a month, and with an identical probability (50%). However, practically, the probabilities cannot be equal as they are affected by the attacker’s decision. Additionally, Gordon et al. [26] assumed that the accuracy of the information-sharing signal was fixed and equal between low-saving and high-saving signals. Hence, Chief Financial Officer (CFO) has no choice but to invest in the CSO’s high-saving signal or defer their decision in the CSO’s low-saving signal. However, in practice, the CSO’s strategy is affected by mood, hunger, stress, sleep deprivation, risk preference, etc., and accuracy is neither equal nor fixed. Additionally, the CFO can close investments without deferring.
Motivated by Gordon et al. [26] in information security investment, we construct a model between a firm and attacker, and analyse the effect of a firm’s information sharing and deferral option on a firm’s expected benefits. Our model reflects the probability of the firm’s cost saving, accuracy of the information-sharing signal, and the CFO’s different decision. For example, regardless of whether an attacker chooses to intrude, the CSO can obtain a high-saving signal or a low-saving signal. Regardless of the type of the signal the CFO receives from the CSO, the CFO has three strategies: immediate investment, no investment, and decision-making after deferral. Similar to the proactive and retroactive defences in Hausken [25], a firm’s defence is proactive if it invests immediately and retroactive if it invests later after a deferral. Unlike the analysis of the interplay between the information sharing of hackers and the defence strategies of firms in Hausken [25], this study examines the effect of information sharing and deferral option on a firm’s expected benefits. Moreover, for convenience, we assume that information accuracy after information sharing is only affected by the CSO’s risk preference. Hence, we did not consider the CSO’s mood, hunger, stress, sleep deprivation, and other elements. An interesting result in this study is that information sharing can improve the effect of deferral decision on a firm’s expected benefits when accuracy of information is low, but it weakens the effect when information sharing accuracy is high. This interesting result contradicts Gordon et al. [26] wherein information sharing decreases the value of the deferment option associated with investment.
The remainder of this paper is organized as follows. Section 2 establishes a game model of the interaction between a firm and attacker. The model describes both the firm’s deferral option and information sharing. Section 3 derives the equilibrium strategies and the primary results of the model. Section 4 derives the results on the value of the deferral option and information sharing under the default and optimal conditions respectively, and then presents the simulation and analysis of the results. Finally, Section 5 concludes the study.
2. Model
2.1. Model description
This study assumes that a firm has joined an industry-specific information-sharing group. No charges are incurred for joining this information-sharing group, providing that the firm is willing to share cybersecurity-related information with the group’s members (i.e., free-riders are excluded from this group) [26]. Based on the agreement, all firms report detailed information to the group’s members on their actual cybersecurity breaches and the steps taken to prevent and respond to cybersecurity breaches. Hence, the study constructs a game model between a firm and an attacker; however, the firm can enjoy information sharing. In this study, information sharing occurs between the members of the industry-specific information-sharing group. Additionally, the analysis in this study concerns information sharing between firms, not information sharing between attackers. The firm now has three strategies: immediate investment, no investment, and decision-making after deferral. An attacker only has two strategies: intrusion and no intrusion. In this study, the deferral option constitutes the firm’s security investment strategy, not the strategy of the firm’s information sharing. That is, firm’s security investment can be deferred, firm’s information sharing cannot be deferred. Table 1 list the notations used in our subsequent discussion.
Table 1. List of notations (all the probability is between 0 and 1).
Parameters | Explanation |
H | Benefits to the firm when a firm invests and an attacker intrudes (H>C) |
L | Benefits to the firm when a firm invests and an attacker does not intrude (L<C) |
C | Costs of each investment for a firm |
μ | Benefits to the attacker when an attacker intrudes |
β | Penalty to the attacker when an attacker intrudes and a firm invests (μ<β) |
α | Effect of firm’s deferral investment on firm and attack’s expected benefits (0≤α≤1) |
P D | Probability that CSO obtain SH through firm’s information sharing, given an attacker intrudes |
P F | Probability that CSO obtain SH through firm’s information sharing, given an attacker doesn’t intrude |
S H | The signal of firm’s cost saving to be high if a firm invests |
S L | The signal of firm’s cost saving to be low if a firm invests |
Decision variables | Explanation |
ρ | Probability of firm’s investment in the absence of information sharing and deferral option |
ψ | Probability of attacker’s intrusion in the absence of information sharing and deferral option |
ρ in_def | Probability of firm’s immediate investment in the presence of deferral option |
ρ no_def | Probability of firm’s non-investment in the presence of deferral option |
ρ de_def | Probability of firm’s deferral decision in the presence of deferral option |
ψ def | Probability of attacker’s intrusion in the presence of deferral option |
ρ 1in_sha | Probability of firm’s investment, in the presence of information sharing, when the CFO receives SH |
ρ 2in_sha | Probability of firm’s investment, in the presence of information sharing, when the CFO receives SL |
ψ sha | Probability of attacker’s intrusion in the presence of information sharing |
ρ 1in_sha+def | Probability of firm’s immediate investment, in the presence of information sharing and deferral option, when the CFO receives SH |
ρ 2in_sha+def | Probability of firm’s immediate investment, in the presence of information sharing and deferral option, when the CSO obtains SL |
ρ 1de_sha+def | Probability of firm’s deferral decision, in the presence of information sharing and deferral option, when the CFO receives SH |
ρ 2de_sha+def | Probability of firm’s deferral decision, in the presence of information sharing and deferral option, when the CFO receives SL |
ψ sha+def | Probability of attacker’s intrusion, in the presence of information sharing and deferral option |
Functions | Explanation |
M | The firm’s expected benefits |
A | The attacker’s expected benefits |
When an attacker intrudes, the firm can learn more about the attacker if it invests in defense. If a firm invests in defense and the attacker does not intrude, the firm cannot benefit. Hence, the firm benefits if the firm invests and the attacker intrudes. When a firm invests and an attacker intrudes, we assume that the cost of a firm’s investment is C, the benefit of the firm’s investment is H, and the attacker will have a benefit of μ but incur penalty of β. That is, the firm’s net benefits are H-C, and the attacker’s net benefits are μ−β when the firm invests and the attacker intrudes. Similarly, a firm’s net benefits are L-C when it invests and the attacker does not intrude. Neither a firm nor an attacker has no benefit when the firm does not invest and the attacker dose not intrude; a firm could sustain damage when it does not invest and the attacker intrudes. However, the damage has no influence on the conclusion, so we assume that the firm’s damage is zero for convenience of calculation. Therefore, whether the attacker intrudes or not, the firm will not benefit if it doesn’t invest in it. Regardless of whether the firm invests, the attacker has no benefit if it does not intrude. We assume that the probability of a firm’s investment is ρ, and the probability of an attacker’s intrusion is ψ.
More accurate information about investment payoffs can be obtained if a firm defers the investment. However a cybersecurity breach could occur during the deferral process. Therefore, we define α as the effect of a firm’s deferral investment on the expected benefits of the firm and attack. Actually, α is different for the firm and attacker; however, the effect of a firm’s deferral investment on the firm and attack’s expected benefits is positive correlation. And the difference of α between the firm and attacker has no influence on out conclusion; hence, we assume that the effect of the firm’s deferral investment on the expected benefits of the firm and attack is equal for the convenience of calculation. Hence, the firm’s net benefits are αH−C, and the attacker’s net benefits are μ−αβ when the firm invests and the attacker intrudes in cybersecurity (0<α<1).
To facilitate calculation, we assume that only two conditions can be found after deferral. That is, a firm always invests if the attacker intrudes, and the firm does not invest if the attacker does not intrude. Actually, a firm can invest, never invest, or goes on deferring after deferring; however, gradually speaking, the two conditions take the large part of the three choices as the firm gets more useful information about the attacker than before. The conclusion in this paper keep the same if some new parameters are introduced. Additionally, αH≥C, μ≥αβ, and α decreased with an increase in deferral time. A firm will not invest if αH<C. If an attack intrudes, it must have benefits when the firm defers decision (μ≥αβ). This is because the firm gets more useful information with the increase of deferral time, but the attacker also gets more useful information. And the firm has been attacked before it invest if it defers the decision.
ρin_def, ρno_def and ρde_def are the firm’s probabilities of investing immediately, avoiding up investing (does not invest), and deferring decisions respectively, in the presence of deferral option only. ψdef is the attacker’s probability of intrusion in the presence of the deferral option only.
Deferral decisions in cybersecurity aim to decrease uncertainty associated with potential payoff from cybersecurity investments. Information sharing can reduce uncertainty to some extend and the value of deferral option [26]. Accuracy of the information acquired from information-sharing is critical in reducing uncertainty. We will discuss the accuracy by introducing a receiver operating characteristic (ROC) curve [27,28] in a practical example [26], wherein the model is similar to the intrusion detection system (IDS) discussed by Cavusoglu et al. [29] and firewall discussed by Cavusoglu and Raghunathan [30].
2.2. Information sharing and ROC curve
In the example [31], 60% of the budget is earmarked for basic cybersecurity activities, and the Chief Security Officer (CSO) is authorized to use these funds. However, the remaining 40% of the cybersecurity budget cannot be spent without approval from the firm’s Chief Financial Officer (CFO). The CSO aims to use the remaining portion of the firm’s cyber security budget to hire a consulting firm to enhance the cyber security operations of its clients. From the CSO’s perspective, hiring a cybersecurity consulting firm now rather than later makes sense, as the CSO bears the ultimate responsibility for actual security breaches. According to advice from the CSO, the CFO can invest immediately (hire a cybersecurity consulting firm), defer their decision, and avoid the investment.
We measure the effectiveness of firms’ information sharing through parameters PD and PF. PD denotes the probability that SCO obtains an SH from information sharing when an attacker intrudes, where SH is the signal of a firm’s cost savings to be high (H) if it invests. Unlike SH, SL signals that a firm’s cost savings is low (L) if it invests. PF is the probability that an SCO obtains an SH from information sharing when an attack does not intrude. Similar to an IDS, we consider a CSO that uses a number score x estimated from the information sharing and a threshold value t in the heart of the CSO to determine whether hiring the cybersecurity consulting firm immediately can help the firm gain high-cost savings. For x >t, the CSO views the attacker as an attacker who intrudes. It follows that , where fI(x) and fN(x) are the probability density functions of x for attackers with and without intrusion. Fig 1 illustrates the probability calculation. For a given CSO and information sharing, we capture the relationship between PD and PF as PF = (PD)r, where r captures the CSO’s risk preference. We derived this functional form for the ROC curve as follows:
Fig 1. Probability calculation.
Number score, which is used to distinguish an attacker with and without intrusion, follows an exponential distribution [32]. If the numerical scores for the attacker who intrudes and does not intrude follow exponential distributions with parameters θI and θN, θN>θI, respectively. We then write PD and PF as follows:
(1) |
(2) |
where PD can be expressed as a function of PF, and we write it as PF = (PD)r, where r = θN/θH is greater than one. Similar to Cavusoglu et al. [29] in Fig 2, parameter r captures the CSO’s risk preference and PD>PF. The CSO can obtain two types of signals (SH and SL) from information sharing, and the CFO has two types of investment probability according to the CSO’s signal. Table 1 lists all the decision variables and their implications.
Fig 2. ROC curve.
3. Model analysis
3.1. Information sharing
Lemma 1. Assuming that the firm’s information sharing performs better than the firm’s random determination because PD>PF, the frequency of investment is always higher in the scenario of high-cost saving signal than that of low-cost saving scenario (i.e., ). Additionally, the firm may invest in the SL signal scenario only when it completely invests in all SH signal scenarios.
We derive a mixed-strategy Nash equilibrium between a firm and an attacker. We used the following probability computations to derive the equilibrium.
The probabilities of being in the signal of high-cost saving (SH) and low-cost saving (SL) scenarios are given by the following:
(3) |
(4) |
According to Bayes’ rule, the posterior probabilities of the attacker’s intrusion when the firm’s CFO receives a signal of high-cost saving and low-cost saving can be calculated as follows:
(5) |
(6) |
Fig 3 presents the game model. Our model assumes that both the firm’s CFO and the attacker have perfect information, all of which are available to both. The firm’s expected benefits when receiving a signal of high-cost saving and low-cost saving take the following form:
(7) |
(8) |
Fig 3. Game tree with information sharing.
Thus, the firm’s overall expected benefits is as follows:
(9) |
Similarly, the attacker’s expected benefits when receiving a signal of high-cost saving and low-cost saving take the following form:
(10) |
(11) |
Thus, the attacker’s overall expected benefits is as follows:
(12) |
We assume that a simultaneous game is played between the firm and attacker. The Nash Equilibrium strategies of this game can be solved wherein neither the firm nor the attacker can improve the game’s utility by unilaterally deviating the game’s strategy.
Proposition 1. When a firm and attacker play a simultaneous game, the optimal frequencies of the firm’s investments and the attacker’s intrusion for a given condition in the presence of information sharing as follows:
Proof provided in the Appendix.
If the firm’s information sharing is not considered, the CFO will randomly determines whether an attacker intrudes. Thus, the firm’s and attacker’s expected benefits take the following form:
(13) |
(14) |
According to and , we have and . Hence, the Nash Equilibrium between a firm and an attacker in the absence of information sharing is as follows:
Proposition 2. The following mixed strategy profiles constitute the Nash Equilibrium in the given condition in the absence of information sharing.
To further understand how information sharing affects the strategies of a firm’s CFO and attacker, we compare the probability of the firm’s investment and the attacker’s intrusion in two conditions: in the presence of information sharing and absence of information sharing. We define a firm’s investment rate as the probability of an investment in the consulting firm. The firm’s investment rate is μ/β in the absence of information sharing (Proposition 2). The firm’s investment rate is given by P(SH)+P(SL) in the presence of information sharing, which is equal to the following:
Proposition 3. (1)When the accuracy (PD) of information sharing is low, a firm will invest not only in all SH signal but also in a fraction of SL signal; when the accuracy (PD) of information sharing is high, the firm won’t invest in SL signal and may only invest in a fraction of SH signal.
(2) Information sharing decreases firm’s security investment rate.
When the accuracy (PD) of information-sharing is low, a firm invests in all SH signals because the probability of false positives (PF) is low, and the firm invests in a fraction of SL signal because the probability of false negatives (1−PD) is high. When the accuracy (PD) of information sharing is high, the firm invests in a fraction of SH as the probability of false positives (PF) is high, and the firm gives up investing in SL signal as the probability of false negatives (1−PD) is low.
Information sharing divides the parameter spaces into two regions that help the firm accurately target its investment object. Therefore, to maintain the equilibrium point between the firm and attacker, the firm will decrease its investment rate in the presence of information sharing.
3.2. Deferral decision and information sharing
We assumed L≤C, μ≥αβ, and αH≥C in the model description in Chapter II. Additionally, we assume that both the firm’s CFO and the attacker have perfect information. Table 2 list the decisions of the firm and attacker and the relevant benefits when the deferral option is considered. The firm’s and attacker’s expected benefits take the following form:
(15) |
(16) |
where . The firm’s expected benefits increase in ρde_def according to Eq (15), and = 0. Hence, the optimal decision for the firm is . Therefore, we have the following:
(17) |
(18) |
Table 2. Firm’s and attacker’s decisions and the relevant benefits when the deferral option is considered.
Decisions and probability | Benefits | ||
---|---|---|---|
Attacker | Firm | Firm | Attacker |
Intrude (ψdef) | Invest Immediately (ρin_def) | H−C | μ−β |
Defer Decision (ρde_def) | αH−C | μ−αβ | |
Not Invest (ρno_def) | 0 | μ | |
Not intrude (1-ψdef) | Invest Immediately (ρin_def) | L−C | 0 |
Defer Decision (ρde_def) | 0 | 0 | |
Not Invest (ρno_def) | 0 | 0 |
When and , we have the optimal frequencies of the firm’s investment and the attacker’s intrusion, for a given condition with the deferral option.
Proposition 4. (1)The following mixed strategy profiles constitute the Nash Equilibrium in the given condition of a firm’s deferral option.
(2) When a firm can defer its decision, the firm will decrease the probability of immediate investment, and avoid non-investment. That is and .
(3) Probability of a firm’s deferral decision increases in parameter α, that is .
For a firm to decide between immediate investment and non-investment is difficult; hence, a deferral decision may be a more sensible decision. Compared with non-investment, deferral decision, which decrease uncertainty, can help firms obtain a part of the benefits. Thus, a firm will decrease the probability of immediate investment and avoid non-investment. Essentially, a firm will increase the probability of deferral decision to make a more sensible decision. According to Proposition 4, a firm will avoid non-investment if the firm can defer its decision. Hence, assuming that the firm and attacker are simultaneously playing games, we construct a game tree (Fig 4) when both the firm’s information sharing and deferral option are considered.
Fig 4. Game tree in the presence of information sharing and deferral option.
Similar to the scenario with only the firm’s information sharing, if both the firm’s information sharing and deferral option are considered, the firm’s expected benefits when obtaining a signal of high-cost saving and low-cost saving take the following form:
(19) |
(20) |
Thus, the firm’s overall expected benefits is
(21) |
Similarly, if both the firm’s information sharing and deferral option are considered, the attacker’s expected benefits when obtaining a signal of high-cost saving and low-cost saving take the following form:
(22) |
(23) |
Thus, the attacker’s overall expected benefits is as follows:
(24) |
Proof is similar to Proposition 1: For a given scenario with a firm’s information sharing and deferral option, we have the optimal frequencies of the firm’s investment and the attacker’s intrusion.
Proposition 5. When a firm and an attacker play a simultaneous game, for a given scenario with both the firm’s information sharing and deferral option, the optimal frequencies of the firm’s investments and the attacker’s intrusion are as follows:
If , then
If , then
Similar to the case with only the firm’s information sharing, in the scenario with both the firm’s information sharing and deferral option, the firm’s investment and deferral rates are given by P(SH)+ P(SL) and P(SH)+P(SL) respectively, which are equal to the following:
if ; and
if .
Proposition 6. (1) When the accuracy (PD) of firm’s information sharing is low, the firm will invest immediately not only all SH signal, but also a fraction of SL signal. When the accuracy (PD) of firm’s information sharing is high, the firm will avoid investing all SL signal, and in fact, the firm may invest immediately a fraction of SH signal.
(2) After information sharing, the probability of the firm’s deferral decision increases for SL signal, but it decreases for SH signal. Besides, the firm’s overall deferral rate increases after the information sharing.
(3) Attacker decreases its probability of intrusion when the accuracy (PD) of the information sharing is high, but it increases the probability when the accuracy (PD) is low.
Proof is as follow:
When because of . Besides, , and .
When because of . Besides, = 1, and .
Explanation of (1) is similar to that of Proposition 3; hence, it is omitted here. A firm’s information sharing helps the firm accurately target its investment object. Thus, the firm increases the probability of immediate investment in the SH signal case (firm decreases the probability of its deferral decision) and decreases the probability of immediate investment in the SL signal case (firm increases the probability of its deferral decision). The extent of the change in a firm’s deferral decision in SL signal is higher than in the SH signal, causing overall deferral rate to increase. High deterrence of a firm’s information sharing cause the attacker to decrease its intrusion probability when the accuracy (PD) of a firm’s information sharing is high. This is opposite when the accuracy is low.
4. Value of information sharing and deferral option
4.1. Value of information sharing and deferral option with default CSO
After analysing the effect of a firm’s information sharing and deferral decision on the firm’s and attacker’s decisions in Chapter III, we discuss the effect on a firm’s expected benefits.
Using Proposition 1 and Eq (9), the firm’s expected benefits in the absence of information sharing and deferral decision is M* = 0.
Using Proposition 2 and Eq (13), the firm’s expected benefits in the presence of only the firm’s information sharing is as follows: , if , if .
Using Proposition 4 and Eq (17), the firm’s expected benefits in the presence of only the firm’s deferral option is .
Using Proposition 5 and Eq (21), the firm’s expected benefits in the presence of the firm’s information sharing and deferral decision is , if , if .
Proposition 7. (1) Firm’s information sharing can increase a firm’s expected benefits only when the accuracy is low, and the firm’s expected benefits increases in the accuracy (PD).
(2) Deferral decision can increase a firm’s expected benefits, and the firm’s expected benefits increase in parameter α.
(3) Firm’s information sharing can improve the effect of deferral decision when the accuracy (PD) is low but weaken the effect when the accuracy (PD) is high.
The proof is as follows:
When .
When ;
When .
Low accuracy (PD) has a low deterrence to the attacker, causing the attacker’s intrusion probability to become high and stable. Therefore, a firm’s decision in Propositions 1 and 5 can make the firm increase its benefits. A high accuracy (PD) has a high deterrence to the attacker, causing the attacker’s intrusion probability to become low and unstable. Therefore, the firm’s decision in Propositions 1 and 5 cannot increase its benefits.
Deferring cybersecurity investment can cause some cybersecurity breaches. However, it decreases uncertainty, and the firm can make a more sensible decision; hence the firm’s expected benefits increase. With an increase in parameter α, the negative effect of deferral investment on the firm’s benefits decreases; hence, the firm’s expected benefits increase in parameter α. Both the firm’s deferral decision and information sharing aim to decrease the uncertainty associated with the firm’s potential costs.
When the accuracy (PD) of a firm’s information sharing is low, the firm will increase the probability of the deferring decision in Proposition 5. Hence, the firm will decrease the probability of investing in the SL single. Investment in SL singles is inefficient in increasing the firm’s expected benefits; hence, when the accuracy is low, the firm’s information sharing improves the effect of the firm’s deferring decision. When the accuracy (PD) of a firm’s information sharing is high, the firm will decrease the probability of the deferring decision in Proposition 5. Hence, the firm will increase the probability of investing in the SL single. Therefore, when the accuracy is high, the firm’s information sharing weakens the effect of the firm’s decision to defer.
4.2. Value of information sharing and deferral option with optional CSO
Proposition 7 indicates that by choosing PD (or choosing CSO), the CFO can determine how to operate. In the presence of a firm’s information sharing and deferral decision, a comparison of the firm’s benefits in the equilibrium regions demonstrates that the firm realizes high benefits when PD≤(μ−αβ)/[(1−α)β]. Consequently, the CFO will choose the value of PD to realize PD≤(μ−αβ)/[(1−α)β]. Next, the firm should decide where to lie in this region. When PD≤(μ−αβ)/[(1−α)β] writing the benefit as a function of PD and taking the first derivative yields the following:
(25) |
Proof: and = 0.
This derivative implies that the CFO should maximize choose the maximum PD when PD≤(μ−αβ)/[(1−α)β]. Thus, the optimal PD is in this region, with a firm’s deferral option and information sharing. Similarly, a firm in the absence of its deferral option should maximize choose maximum PD when PD≤μ/β. Hence, if only a firm’s information sharing is considered, . A firm’s information sharing has a negative effect on its deferral decision when accuracy (PD) is high; hence, it is omitted here.
To further analyse the effect of a firm’s information sharing and deferral option, we calculated the firm’s expected benefits for information sharing, deferral decision, and both information sharing and deferral decision. These are a number of examples. Let C = 10, H = 20, L = 5, r = 3, μ = 0.8, β = 10. Fig 5 presents the condition of α = 0.6, Fig 6 presents the condition of α = 0.7.
Fig 5. Firm’s expected benefits (α = 0.6).
Fig 6. Firm’s expected benefits (α = 0.7).
Figs 5 and 6 illustrate Proposition 7. Additionally, when accuracy (PD) is low, the firm’s optimal decision combine its information sharing and deferral decision. When accuracy (PD) is between (μ−αβ)/[(1−α)β] and μ/β, the firm’s optimal decision is only its information sharing. When accuracy (PD) is high enough, which is higher than μ/β, the firm’s optimal decision is only its deferral decision. Accuracy (PD) is related to the risk preference of the CSO, and the probability of an attacker’s breach is related to the time of deferral and accuracy (PD). Thus, a firm should analyses the risk preference of CSO, the accuracy of information sharing, and the time of deferral before making its decisions in cyber security investment.
5. Conclusion
Based on a game framework between a firm and an attacker, we determined the effect of the firm’s information sharing and deferral option on a firm’s expected benefits. We divided the parameter space of the Chief Financial Officer’s decision into different regions by different accuracy of information sharing. Notably, after a firm’s information sharing, the probability of a firm’s deferral decision decreases for a high-benefit signal but increases for a low-benefit signal. Additionally, a firm’s overall deferral rate increases after information sharing. Moreover, a firm’s information sharing can improve the effect of its deferral decision on its expected benefits when the accuracy of information sharing is low, but weakens the effect when the accuracy of information sharing is high.
This article includes a deferral option; however, deferral time is not considered. In fact, the effect of deferral option on a firm’s expected benefits is closely related to deferral time. Deferral time will be an interesting issue for future research. To facilitate calculation, we assume that neither a free-ride nor a cost for a firm’s information sharing. This will be considered in the future, and the relationship between the probability of accuracy and false positives will be an interesting but challenging issue.
Supporting information
(DOCX)
Data Availability
All relevant data are within the paper.
Funding Statement
The Science and Technology Innovation Fund (163060171) and the General Program in philosophy and Social Sciences (2022SJYB0124) are all received by Chuanxi Cai. The Science and Technology Innovation Fund (163060171) is supported by Nanjing Forestry University, and the General Program in philosophy and Social Sciences (2022SJYB0124) is supported by Jiang Su Provice. There is no additional external funding received for this study The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
References
- 1.Hausken K., “Returns to information security investment: Endogenizing the expected loss.” Information Systems Frontiers, vol. 16, no. 2, pp. 329–336, 2014. [Google Scholar]
- 2.Gao X. and Zhong W. J., “Information security investment for competitive firms with hacker behaviour and security requirements.” Annals of Operations Research, vol. 235, no. 1, pp. 277–300, 2015. a. [Google Scholar]
- 3.Qian X. et al. , “A new game of information sharing and security investment between two allied firms.” International Journal of Production Research, vol. 56, no. 12, pp. 4069–4086, 2018. [Google Scholar]
- 4.Qian X. et al., “A game of information security investment considering security insurance and complementary information assets.” International Transactions in Operational Research, vol. 29, no. 3, pp. 1791–1824, 2022. [Google Scholar]
- 5.Shao X. et al., “Shall we follow? Impact of reputation concern on information security managers’ investment decisions.” Computers & Security, vol. 97, pp. 101961, 2020. [Google Scholar]
- 6.Li X., “Decision making of optimal investment in information security for complementary enterprises based on game theory.” Technology Analysis & Strategic Management, pp. 1–15, 2020. [Google Scholar]
- 7.Li X., “An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform.” Managerial and Decision Economics, vol. 43, no. 3, pp.595–606, 2022. [Google Scholar]
- 8.Li X. and Xue Q., “An economic analysis of information security investment decision making for substitutable enterprises.” Managerial and Decision Economics, vol. 42, no. 5, pp. 1306–1316, 2021. [Google Scholar]
- 9.Demetz L. and Bachlechner D., “To invest or not to invest? Assessing the economic viability of a policy and security configuration management tool.” The Economics of Information Security and Privacy. Springer, pp. 25–47, 2013. [Google Scholar]
- 10.Bian Y. T., Xu L., and Li J. S., “Evolving dynamics of trading behaviour based on coordination game in complex networks.” Physica A: Statistical Mechanics and its Applications, vol. 449, 281–290, 2016. [Google Scholar]
- 11.White C. M., Hoffrage U., and Reisen N., “Choice deferral can arise from absolute evaluations or relative comparisons.” Journal of Experimental Psychology: Applied, vol. 21, no. 2, pp. 140, 2015. doi: 10.1037/xap0000043 [DOI] [PubMed] [Google Scholar]
- 12.Bhatia S. and Mullett T. L., “The dynamics of deferred decision.” Cognitive psychology, vol. 86, pp. 112–151, 2016. doi: 10.1016/j.cogpsych.2016.02.002 [DOI] [PubMed] [Google Scholar]
- 13.Larasati A. and Yeh M. Y., “Does more attractive choice always decrease choice deferral? The moderating effect of ideal point.” International Journal of Hospitality Management, vol. 54, pp. 43–51, 2016. [Google Scholar]
- 14.Lee W. B. and Kim J. H., “The effect of single option on choice deferral: focusing on anticipated regret.” The korean journal of consumer and advertising psychology, vol. 20, no. 3, pp. 319–342, 2019. [Google Scholar]
- 15.Berens S. and Funke J., “A vignette study of option refusal and decision deferral as two forms of decision avoidance: Situational and personal predictors.” PloS one, vol. 15, no. 10, e0241182, 2020. doi: 10.1371/journal.pone.0241182 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 16.Gal-Or E. and Ghose A., “The economic incentives for sharing security information.” Information Systems Research, vol. 16, no. 2, pp. 186–208, 2005. [Google Scholar]
- 17.Hausken K., “Information sharing among firms and cyber attacks.” Journal of Accounting and Public Policy, vol. 26, no. 6, pp. 639–688, 2007. [Google Scholar]
- 18.Liu D., Ji Y., and Mookerjee V., “Knowledge sharing and investment decisions in information security.” Decision Support Systems, vol. 52, no. 1, pp. 95–107, 2011. [Google Scholar]
- 19.Gao X., Zhong W. J., and Mei S. E., “Security investment and information sharing under an alternative security breach probability function.” Information Systems Frontiers, vol. 17, no. 2, pp. 423–438, 2015. b. [Google Scholar]
- 20.Hausken K., “A strategic analysis of information sharing among cyber hackers.” JISTEM-Journal of Information Systems and Technology Management, vol. 12, no. 2, pp. 245–270, 2015. [Google Scholar]
- 21.Hausken K., “Security investment, hacking, and information sharing between firms and between hackers.” Games, vol. 8, no.2, pp. 23, 2017. [Google Scholar]
- 22.Solak S. and Zhuo Y., “Optimal policies for information sharing in information system security.” European Journal of Operational Research, vol. 284, no. 3, pp. 934–950, 2020. [Google Scholar]
- 23.Gao X. et al., “Information security investment with budget constraint and security information sharing in resource-sharing environments.” Journal of the Operational Research Society, to be published. doi: 10.1080/01605682.2022.2096506, pp. 1–16, 2022. [DOI] [Google Scholar]
- 24.Kwak J. K. and Gavirneni S., “Impact of information errors on supply chain performance.” Journal of the Operational Research Society, vol. 66, no.2, pp. 288–298, 2015. [Google Scholar]
- 25.Hausken K. “Proactivity and retroactivity of firms and information sharing of hackers.” International Game Theory Review, vol. 20, no. 1, 1750027, 2018. [Google Scholar]
- 26.Gordon L. A., et al., “The impact of information sharing on cyber security underinvestment: a real options perspective.” Journal of Accounting and Public Policy, vol. 34, no. 5, pp. 509–519, 2015. [Google Scholar]
- 27.Yue W. T. and Cakanyildirim M., “Intrusion prevention in information systems: Reactive and proactive responses.” Journal of Management Information Systems, vol. 24, no. 1, pp.329–353, 2007. [Google Scholar]
- 28.Cai C., Mei S. E., and Zhong W. J., “Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems.” Information Technology and Management, vol. 20, no. 2, pp. 55–71, 2019. [Google Scholar]
- 29.Cavusoglu H., Mishra B., and Raghunathan S., “The value of intrusion detection systems (IDSs) in information technology security.” Information Systems Research, vol. 16, no. 1, pp. 28–46, 2005. [Google Scholar]
- 30.Cavusoglu H., Raghunathan S., and Cavusoglu H., “Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems.” Information Systems Research, vol. 20, no. 2, pp. 198–217, 2009. [Google Scholar]
- 31.Gordon L. A., Loeb M. P., and Lucyshyn W., “Information security expenditures and real options: A wait-and-see approach.” Computer Security Journal, vol. 19, no. 2, 2003. [Google Scholar]
- 32.Cavusoglu H. and Raghunathan S., “Configuration of detection software: A comparison of decision and game theory approaches.” Decision Analysis, vol. 1, no.3, pp. 131–148, 2004. [Google Scholar]