Browse Definitions :
Definition

contract theory

Contract theory is the study of how people and organizations develop legal agreements in situations with uncertain conditions, unknown factors and information asymmetry. Contract theory applies to both multi-party negotiations between a principal and one or more agents and contracts created by a single individual or organization to specify details of multi-party agreements, such as employee contracts.

Ideally, a contract specifies the responsibilities and requirements of both parties so meticulously that there can be no room for dispute or misunderstanding. However, that ideal may never be achieved, for various reasons. Moral hazard, one model within contract theory, is the risk that one party to a transaction is not acting in good faith.  For example, that party may have withheld important  information or provided misleading information or may have undisclosed motivation driving elements of an agreement that are being negotiated. Moral hazard often involves the assumption of risks that disadvantage the party with less information. Other models within contract theory include adverse selection, in which the principal party is not fully informed of the agent’s risk factors, and signaling, in which the agent reliably conveys information about itself to the principal, for example, a job applicant listing qualifications that match the hirer’s list of requirements.

Contract theory is a special application of game theory, which is the study of mathematical models of negotiation, conflict and cooperation between individuals, organizations and governments. Central questions of game/contract theory include why an individual makes a particular decision and how the decisions made by one individual affect others.

See a lecture on contract theory:

This was last updated in June 2016

Continue Reading About contract theory

Networking
  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can ...

  • User Datagram Protocol (UDP)

    User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections...

  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

Security
  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ...

  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close