Browse Definitions:

information asymmetry

Contributor(s): Ivy Wigmore

Information asymmetry is an imbalance between two negotiating parties in their knowledge of relevant factors and details. Typically, that imbalance means that the side with more information enjoys a competitive advantage over the other party.

Information asymmetry is relevant to most types of negotiations and is particularly significant to game theory, and the related contract theory, which is the study of how two parties come to terms of agreement despite unknown factors and unequal knowledge. In the most common scenario, a seller has more knowledge of the goods or services he offers than the potential buyer. 

George Akerlof introduced the term information asymmetry in his 1970 article, "The Market for 'Lemons': Quality Uncertainty and the Market Mechanism." Akerlof argued that because people buying cars have less complete information about them than car salesmen do, the salesmen are motivated to sell people cars of less-than-average quality. At the same time, because most buyers can’t differentiate good cars from bad cars (lemons), sellers of good cars can’t sell them for what they are worth, comparatively. Akerlof referred to this situation as the “lemon problem.”

To mitigate the risk of getting a bad deal due to information asymmetry – whether buying a car or negotiating a contract – the best practice involves trying to ensure that you know as much as you can and discussing any areas of uncertainty.

See a lecture on asymmetric information and signaling:

This was last updated in May 2016

Continue Reading About information asymmetry

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.


File Extensions and File Formats

Powered by:


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.