Browse Definitions :
Definition

contract theory

Contributor(s): Ivy Wigmore

Contract theory is the study of how people and organizations develop legal agreements in situations with uncertain conditions, unknown factors and information asymmetry. Contract theory applies to both multi-party negotiations between a principal and one or more agents and contracts created by a single individual or organization to specify details of multi-party agreements, such as employee contracts.

Ideally, a contract specifies the responsibilities and requirements of both parties so meticulously that there can be no room for dispute or misunderstanding. However, that ideal may never be achieved, for various reasons. Moral hazard, one model within contract theory, is the risk that one party to a transaction is not acting in good faith.  For example, that party may have withheld important  information or provided misleading information or may have undisclosed motivation driving elements of an agreement that are being negotiated. Moral hazard often involves the assumption of risks that disadvantage the party with less information. Other models within contract theory include adverse selection, in which the principal party is not fully informed of the agent’s risk factors, and signaling, in which the agent reliably conveys information about itself to the principal, for example, a job applicant listing qualifications that match the hirer’s list of requirements.

Contract theory is a special application of game theory, which is the study of mathematical models of negotiation, conflict and cooperation between individuals, organizations and governments. Central questions of game/contract theory include why an individual makes a particular decision and how the decisions made by one individual affect others.

See a lecture on contract theory:

This was last updated in June 2016

Continue Reading About contract theory

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close