Document 11508975

advertisement
Walden, Eric A., "Intellectual Property Rights And Cannibalization In Information Technology Outsourcing Contracts, MIS Quarterly,
Vol. 29, No. 4, December 2005, pp. 699-720.
Walden/Intellectual Property Rights
RESEARCH ARTICLE
INTELLECTUAL PROPERTY RIGHTS AND
CANNIBALIZATION IN INFORMATION
TECHNOLOGY OUTSOURCING
CONTRACTS1
By: Eric A. Walden
Information Sciences and Quantitative
Sciences
Jerry Rawls College of Business
Administration
Texas Tech University
Box 42101
Lubbock, TX 79409
U.S.A.
ewalden@ba.ttu.edu
is determined. This model is then modified to
account for the possibility of cannibalization of the
client’s benefit when multiple others are allowed
use of the software. The results show that the
best contractual structure depends strongly on the
environment.
Keywords: Contracts, outsourcing, economic
models, interorganizational relationships
Introduction
Abstract
This paper examines the question of how intellectual property rights in the software created during
information technology outsourcing relationships
should be divided. This paper expands on the
property rights approach developed by Grossman,
Hart, and Moore by recognizing that, with respect
to software, it is possible to separate excludability
rights from usability rights. These rights are
modeled and the contractually optimal distribution
1
V. Sambamurthy was the accepting senior editor for this
paper. Sandra Slaughter was the associate editor.
Natalia Levina served as a reviewer. The other
reviewers chose to remain anonymous.
Outsourcing is one of the most important issues in
information technology today. It has evolved from
a sporadic business practice into one that is
reshaping our entire global economy. Economic
approaches to understanding outsourcing have
focused largely on ownership of physical property
(Bakos and Nault 1997; Brynjolfsson 1994;
Grossman and Hart 1986; Hart and Moore 1988).
However, software is not physical property but
rather intellectual property, and as such it is not
constrained by the same physical or legal rules as
physical property. Thus, as software becomes an
ever-increasing proportion of information technology, it is necessary to update IT outsourcing
theory to consider the different types of ownership
that software allows.
MIS Quarterly Vol. 29 No. 4, pp. 699-720/December 2005
699
Walden/Intellectual Property Rights
Software creation is an inevitable outcome of
many IT outsourcing relationships. This is trivially
true for software sourcing deals, but it is also true
for other outsourcing relationships, such as facilities management, integration, or implementation.
In the normal course of maintaining an information
system, old code is replaced with more efficient
code, filters and adaptors are written to connect
different systems, and new functionality is introduced to solve business problems. The scope of
this paper is the intellectual property rights associated with all of the various software created
during the relationship.
The property rights literature (Hart and Moore
1990; Maskin and Tirole 1999a) provides a starting
point for building a theory of software as intellectual property. However, software does not follow
the same physical laws as does the physical
property that has been previously studied. In particular, the use of software by one entity does not
physically preclude the use of that same software
by other entities. Therefore, to understand how to
assign intellectual property rights in software
created during an outsourcing relationship, it is
necessary to modify property rights theory, in order
to create intellectual property rights theory.
This work undertakes that task. First, it recognizes
that software gives way to ownership structures
which are fundamentally different than those of
physical property. Second, the intellectual property rights in software in an outsourcing relationship are modeled. Third, implications for the
optimal distribution of software intellectual property
rights in a variety of different possible environments are elucidated, including the consequences
of cannibalization.
This paper makes several important contributions.
Most importantly, it creates a theoretical basis for
the future study of intellectual property in IT. This
grants both practitioners and researchers a
starting point for the formulation of intellectual
property issues, rather than forcing them to rely on
physical property theory as a basis for a nonphysical thing. This work also provides some
ready-made solutions for empirical testing by
700
MIS Quarterly Vol. 29 No. 4/December 2005
academics and the formulation of intellectual
property contracts by practitioners.
This paper follows Whang (1992) in observing
real-world contracts to inform my theory building.
Three contracts were procured from a private
source in order to serve as a guide for the
development of a realistic model. This work finds,
as did Whang, that, “while this is a small set of
cases, there is a substantial amount of commonality among these contracts and they merit
consideration, even if they are not comprehensive”
(1992, p. 309).
Specifically, the contracts
assigned two different property rights: the right to
use and the right to exclude others from using. In
the traditional property rights literature, these two
rights are inexorably joined because if one entity
uses a particular physical asset, others are automatically excluded from using that same asset.
However, with respect to software, these two rights
can be (and apparently are) separated and
assigned independently.
Managers must decide how to allocate property
rights between the parties to the contract.
Software is nonphysical and, thus, the range of
possible allocations is not bounded by the same
constraints that bound the ownership of physical
property. This paper shows that the optimal allocation of intellectual property rights depends on
three things: the ability of each firm to enhance
the internal usefulness of the intellectual property,
the ability of each firm to enhance the external
marketability of the intellectual property, and the
loss of competitive advantage arising from widescale distribution of the intellectual property.
The rest of the paper proceeds as follows. In the
next section, the literature on contracting for IT
and the property rights literature are reviewed.
Next, the property rights literature is extended to
account for intellectual property’s ability to separate usability and excludability rights. Following
that, propositions explaining some of the circumstances under which each of the intellectual
property right allocations are optimal are
developed. Finally, a discussion of the contribution, limitations, and directions for future research
is presented.
Walden/Intellectual Property Rights
Literature Review
To understand how intellectual property rights are
managed in IT outsourcing, it is necessary to
establish some definitions. In outsourcing, two
firms engage in a relationship. The relationship is
the set of all possible situations and actions the
two firms can face. The firms draft a contract to
define the parameters of the relationship. A contract is made up of sections, which address a specific aspect of the relationship (transfer of employees, for example). Each of the sections can
be thought of as being complete or incomplete.
A complete contract specifies all the actions that
each party would take in response to every
possible state of the world. This is an idealized
concept of a contract, but in reality it may have
value only where most of the important states of
the world, and important actions, can be specified.
However, in a long-term pervasive relationship,
such as that addressed in the contracts of this
study, completeness is an unrealistic goal.
Incomplete contracts are contracts that focus on
offering alternative ways to deal with aspects of
the relationship that are not easily addressable by
simply specifying all possible contingencies. For
example, an incomplete contract may specify
meetings (Ang and Beath 1993; Stinchcombe
1985) or ownership (Bakos and Brynjolfsson
1993a; Grossman and Hart 1986) to deal with
situations where appropriate actions cannot be
specified ex ante. While there is explicit recognition that no contracts are, in reality, complete,
there is lively debate on the extent to which
complete contract theory offers valuable insights
(see Hart and Moore 1999; Maskin and Tirole
1999a; Tirole 1999). In practice, actual contracts
contain both complete and incomplete sections.
Ownership is an alternative mechanism put into a
contract to help address the incompleteness of the
contract, with respect to some aspect of the relationship. This work follows the Grossman–Hart–
Moore definition of ownership: “all the rights
except those specifically mentioned in the contract” (Grossman and Hart 1986, p. 692). This is
an important point. Neither Grossman–Hart–
Moore nor this work claim that there are not parts
of the contract that are complete. Rather, Grossman, Hart, and Moore assert that, after all the
cost-effective clauses are written into a contract,
there are still important aspects of the relationship
that have not been defined. Thus, the contract
grants ownership of an asset to allow the
remaining states of the world and corresponding
actions concerning that asset to become the
responsibility of one of the parties.
The question immediately arises as to why contracting parties would cover some contingencies
directly, but leave others to be handled by alternative mechanisms, particularly when the alternative
mechanisms frequently result in a less-than- optimal solution. One reason is the cost of writing a
contract. Simply stated, if the expected cost of
writing a contract clause exceeds its value, then
the clause should be omitted (Battigalli and Maggi
2000). Another frequently cited reason is the
bounded rationality of the contract writers (Williamson 1985). Segal (1999) offers a rigorous model
of this situation, in which increasing the complexity
of the environment leads to a preference for incomplete contracts. Others simply cite the fact
that real-world contracts are never observed to be
fully contingent (Masten 2000). The important
point is that there is ample theoretical and empirical evidence to support the claim that contract
writers leave contracts incomplete with respect to
subsets of the relationship. Moreover, specific to
this work, the observed contracts were incomplete
with respect to software assets and the incompleteness was resolved with ownership. Therefore, the property rights approach seems to be a
reasonable base upon which to build additional
theory.
The property rights approach (Grossman and Hart
1986; Hart and Moore 1990) is an extension of
transaction cost economics (Coase 1937; Williamson 1975, 1985) and, as such, is aimed at
explaining the boundaries of the firm. The property rights approach posits that two firms create
value by working together. More value is created
if the firms cooperate than if they act indepen-
MIS Quarterly Vol. 29 No. 4/December 2005
701
Walden/Intellectual Property Rights
dently, creating a quasi-rent.2 The property rights
approach follows transaction cost economics in
recognizing that this quasi-rent cannot be entirely
divided by an ex ante contract. Thus, the property
rights approach is also known as incomplete
contract theory, although that is a bit of a misnomer, since many contracting theories recognize
the inability of firms to write complete contracts
(Hart 1995; Hart and Holmstrom 1987; Maskin and
Tirole 1999b; Masten 2000).
The Grossman–Hart–Moore calculus assumes
that investment and output are observable, but not
verifiable. The former avoids some stochastic
elements, making the model more tractable and
distinguishing it from agency theory. The latter
simply means that the courts cannot verify the
investment and, hence, it cannot be contracted
upon.
Therefore, contracts contain clauses
describing property rights rather than detailing the
investments that should be made in creating those
assets. This assumption has received considerable attention (Hart and Moore 1999; Maskin and
Tirole 1999b; Segal 1999; Tirole 1999).
One argument in support of this assumption is that
the set of states of the world are too complex to
specify ex ante. However, through the life of the
contract, the range of potential states becomes
smaller as events unfold, so that the participants
can observe and make informed decisions after
the contract is signed (Grossman and Hart 1986;
Hart and Moore 1988; Segal 1999). Another argument is that verification is costly (Hart 1995; Hart
and Moore 1999). This is persuasive, considering
that lawsuits can take years (or decades) to
resolve and cost millions of dollars. Yet another
argument (Hart 1995; Hart and Moore 1988), is
that there is no legal provision to prevent renegotiation, and in the absence of such a provision
verifiability is moot. Finally, specific to this paper,
each of the contracts examined did, in fact, specify
ownership of intellectual property rather than
define the nature of the investments to be made.
2
A quasi-rent is income above opportunity cost. In this
case, the quasi-rent is the difference between the value
created by working together and the value created by
acting independently.
702
MIS Quarterly Vol. 29 No. 4/December 2005
The existence of a quasi-rent leads to inefficiencies as each firm recognizes that it may not
get the full benefit of its investment. The property
rights approach specifies that the firms will engage
in ex post bargaining to split the surplus, where the
bargaining position and, hence, the bargaining
outcome are functions of ownership. If a physical
asset is solely owned by one firm, then that firm
will reap 100 percent of the return on any investments made in the asset and, hence, will invest at
an optimal level. If a physical asset is jointly
owned, each firm anticipates the fact that it will
have to share the value generated by its investment, and each firm underinvests. Simply stated,
the problem is that each firm pays 100 percent of
its own investment, but receives only half of the
value of that investment.
The property rights approach proposes ownership
as the solution to this problem. When firms
bargain over the quasi-rent attributable to an
asset, the owner of the asset will receive the entire
value. Creating value with an asset requires the
owner’s consent, and the owner can charge the full
value created for his consent. The essential
prescription of the property rights approach is that
the firm whose investment in an asset creates the
most value should be the owner of that asset. This
result occurs because the owner will make greater
investments in the asset.
The property rights approach has been applied in
prior IT literature to help explain the impact of
information technology on the size of firms. The
proposition is that certain information is inalienable
from the human agents that produce it and, thus,
ownership is predetermined (Brynjolfsson 1994).
This basic idea helps explain why, even when IT
significantly reduces coordination costs, firm size
may not change. That is to say, in spite of the fact
that IT offers a technical solution to outsourcing, in
general, it does not change the incentive structure
resulting from ownership and, thus, has little actual
effect on the level of outsourcing.
Building on this idea, IT literature has shown that
ownership considerations may also lead to firms
using a smaller number of suppliers in order to
give each supplier greater ownership and, hence,
Walden/Intellectual Property Rights
greater incentive to invest (Bakos and Brynjolfsson
1993b). Carried to its logical conclusion, this
stream of research has shown that in the presence
of indispensable agents (an agent with inalienable
assets that are necessary for value), the formation
of coalitions is the optimal response (Bakos and
Nault 1997).
This makes a case for less
outsourcing in the face of IT, rather than more.
An important thread to pick out in prior IT literature
concerning the property rights approach is that of
restricted ownership. Generally, the underlying
assumption is inalienability of information assets,
which restricts ownership to a specific firm or
agent. While there are certainly information assets
that are inalienable, this work investigates the
opposite issue. Rather than considering restrictions on ownership, this work considers IT-induced
extensions to ownership.
This is an important point and it bears additional
consideration. The practice of IT is solving
business problems with technology, and prior
literature has certainly demonstrated a business
problem. As Brynjolfsson observes, “merely
embodying information in a tradable form can
‘create’ a great deal of value even without increasing the stock of knowledge” (1994 p. 1652).
This task of embodying information in a tradable
form is an important business problem, which is at
the core of advances in object-oriented paradigms.
Thus, IT practice has spent considerable time and
effort in implementing technological solutions that
enable—force, in fact—new ownership structures
for software. It is time for theory to catch up with
these advances and consider the impacts of these
enhanced ownership structures in the context of
the property rights approach.
in the property rights literature. Ownership in all
applications of the property rights model, to date,
means the ability to exclude other parties from the
value generated by an asset. Grossman and Hart
(1986, p. 694) cite an Oliver Wendell Holmes’
definition of property rights, which concludes with
the sentence: “The owner is allowed to exclude
all, and is accountable to no one but him.” The
essence of ownership in the property rights literature is that the owner has veto power over value
creation. When it comes time to derive value from
an asset, the owner of the asset must give his
approval, or no value may be created.
There are two possible ownership structures under
this definition. One firm may be the sole owner of
the asset, in which case it derives sole value from
the asset. Another possibility is that both firms
jointly own the asset, so that each has veto power
over value creation. In this case, each firm has
equal bargaining power, and the value is assumed
to be split equally between them. While this leads
to a parsimonious model, it is far too simple a view
of ownership.
Legal ownership is richer than simple veto power,
in that it is a complex bundle of rights.3 Complex
combinations of rights can be given in a contract to
offer a much greater range of incentives. Grossman and Hart (1986, p. 692) recognize this bundle
of rights issue when they state “ownership is the
purchase of these residual rights of control.”4
However, in the interest of parsimony, all of these
rights are lumped together into a single construct
called ownership.
The spirit of economic inquiry is to begin with the
simplest possible model at the expense of overly
3
Theory Development
United States Code Annotated, Title 17, “Subject Matter
and Scope of Copyright,” §106, 2002.
4
Ownership
The crux of the basic property rights model is the
idea that ownership provides incentives. Thus, it
is important to clarify what is meant by ownership
As a reviewer points out, it is important to note that
where contracting is easy, one would expect complete
contingent contracts that simply rewarded the vendor
based on action. The Grossman–Hart–Moore model
recognizes that some things are easy to contract on and
only considers the part of the relationship where things
are difficult to contract. Hence, the concept of residual
rights, rather than total rights.
MIS Quarterly Vol. 29 No. 4/December 2005
703
Walden/Intellectual Property Rights
restrictive assumptions and then to build knowledge by relaxing those assumptions. This is precisely what is done here. This paper relaxes the
assumption that the bundle of property rights is a
whole, thereby enhancing and providing a deeper
understanding of the concept of property rights.
Moreover, the set of rights associated with an
asset depends on the nature of the asset. For
example, the set of rights attachable to a piece of
land will be different from those attached to an
employee, which will in turn be different from those
attached to software. Explicit recognition of this
allows for the construction of a richer theoretical
framework for property rights—one that generates
useable recommendations for practice and provides a basis for empirical investigation. This work
seeks to extend the theoretical implications of the
property rights literature by recognizing and
incorporating a richer set of property rights into the
basic model.
New Types of IT-Enabled
Property Rights
Property rights can create value in two ways. The
first, usability, allows the owner to actually deploy
the asset to generate profit. This is sometimes
called communal rights (Alchian and Demsetz
1973). The second, excludability, allows the
owner to charge for access to the asset. This
distinction is not informative in the case of physical
or even human capital assets because their finite
nature necessarily means that productive use of
an asset by one firm results in its exclusion from
another firm. An individual employed for the benefit of firm 2 for one year is not employed for the
benefit of firm 1 during that same year. A machine
being used by firm 1 cannot be used by firm 2.
There are obvious time-sharing options, but
because physical and human capital are finite,
there always exists a limit to their use.
Software, however, has no such restrictions
(Kauffman and Walden 2001; Shapiro and Varian
1999). Two or more firms can simultaneously, and
to full extent, use the same software at the same
704
MIS Quarterly Vol. 29 No. 4/December 2005
time. Thus, this distinction between ownership as
productive use and ownership as excludability
becomes important when dealing with software.
This work investigates outsourcing of software
assets and is most applicable to software development. It can be applied to a varying degree to
other types of outsourcing depending on how
much of the outsourcing relationship is concerned
with intellectual rather than physical property.
Clearly, software allows for very different ownership characteristics than physical assets. While
ownership and possession are often linked for
physical assets, as far as software is concerned,
possession is a meaningless term. In fact, virtually
all ownership characteristics of software are purely
conceptual and defined by law, rather than by
physics. Thus, to use the property rights literature
for software requires considerable reconceptualization of the idea of ownership. (This is not only a
problem in economics and IT, but also an ongoing
issue in the field of law.5)
The nonphysical restrictions of software allow
ownership to be changed in two ways. First,
excludability and usability may be separated. This
means that a firm may be given the right to use an
information asset without also being given the right
to exclude others from its use. This does not apply
to physical assets because by using the asset, one
necessarily excludes others from its use. This is
relevant to even a very large physical asset that it
would seem multiple agents could simultaneously
use, such as a lake. If one is granted usability,
one may pump out all of the water or dump in toxic
chemicals, in effect excluding anyone else from
using it. Thus, if one agent has given away the
right of usability, his ability to exercise the right of
excludability is seriously impaired, because the
value to the remaining agents depends on how the
agent that has usability rights uses the asset. This
arises directly out of the physical law that a body
cannot occupy two different places at the same
5
For a primer on this see the Congressional Budget
Office’s August 2004 publication “Copyright Issues in
Digital Media,” available online at http://www.cbo.gov/
showdoc.cfm?index=5738.
Walden/Intellectual Property Rights
time.6 Thus, by using a physical asset, an agent
effectively builds a “fence” around the physical
object, thereby excluding others. However, the
information embodied in software can occupy
multiple places at the same time.
The second enhancement is the consideration of
multiple replications of the same right. This allows
for identical and independent ownership to go to
multiple firms. One implication of this is that it no
longer makes sense to simplify the models to
include only two firms, as typical property rights
models do. The model must be expanded to
recognize that excludability still has value to one
firm even if another firm has usability rights. The
idea of independent ownership means that multiple
firms can have property rights without having to
share the benefits, as discussed below.
The Model
Following the Grossman–Hart–Moore calculus
(Grossman and Hart 1986; Hart 1995; Hart and
Moore 1988, 1990), let us consider a relationship
between a risk-neutral client and vendor. In the
initial period, they write a contract that describes
the ownership structures and a transfer price p
from client to vendor. The parties use the transfer
payment to achieve a cooperative bargaining solution that maximizes joint surplus. The ownership
structure that maximizes joint surplus is guaranteed by allowing the party that is better off under
that ownership structure to pay the other party
some amount to compensate it for loss of
ownership.
Hart and Moore say that the contract “specifies the
conditions of trade” (1988, p. 757). They allow
either one or zero units to be traded, which means
that the client will either gain use of the item produced or will not. In this case, the asset of desire
is the software created in the relationship, and thus
trade is not an appropriate term. A trade implies
taking something from one party and giving it to
another. While this is certainly a restriction on
physical assets, it is not a restriction for information assets. It is not necessary for the vendor to
give up use of the item for the client to also have
use of the item. Thus this work explicitly recognizes that the contract defines the terms of use
rather than the terms of trade.
After the contract is signed, the client (c) and
vendor (v) learn about the state of the world and
make investments (i) in the software assets, ic and
iv. The idea of learning the state of the world can
be made more concrete by thinking about it as the
knowledge revelation that occurs between the time
a project is begun and the time it is completed. As
this knowledge is revealed, the client and vendor
make investments in improving the assets. This
work follows the Grossman–Hart–Moore model in
assuming that investments and outputs are
observable, but not verifiable.
Several types of benefit are generated by investments. Grossman, Hart, and Moore assume that
the only value generated is a gain from trade.
However, as this work is concerned with gains
from use, it is necessary to consider more potential
sources of gain. This work considers gain to the
client from use, Uc, gain to the vendor from use,
Uv, and gain from potential resale, S. Grossman,
Hart, and Moore were able to ignore the latter two
gains by assuming that the highest value use of
the asset was with the client, and that only one
entity could use the asset. However, if multiple
entities can simultaneously use the asset, then
each value must be considered independently.
For tractability, all of the potential value from the
resale market is lumped together into one value, S.
One important consideration is that resale may be
easily verifiable, and hence, contractible.7 Certainly, some aspects of resale are verifiable and by
the Grossman–Hart–Moore calculus are excluded
from consideration. However, there are situations
in which resale is imperfectly verifiable. Often,
resale is difficult to verify because resale is done at
the object level rather than the system level. That
is to say, the vendor redeploys some of the objects
to achieve speed and scale, but these objects are
6
This may not be true for quantum particles, but,
thankfully, contracts are not generally written at the
quantum level.
7
I thank an anonymous reviewer for pointing this out.
MIS Quarterly Vol. 29 No. 4/December 2005
705
Walden/Intellectual Property Rights
deployed with other objects. This makes it difficult
to sort out each object’s contribution to value.
Furthermore, resale is difficult to verify in software
development because there are often a number of
complementary products that go along with software sales, such as maintenance, upgrades, and
integration. On the other hand, systems may be
designed with commercialization in mind
(DiRomualdo and Gurbaxani 1998), in which case
verifiability would be built into the contract. A promising direction for future research is an examination the boundaries of verifiability of resale. However, for the purposes of this paper, we assume
that there are some aspects to resale that are
unverifiable.
In the second period, after investments ic and iv are
made and the values of Uc, Uv, and S are realized,
the client and vendor costlessly renegotiate a contract dividing these values. The total pie then is
π total = Uc (ic , iv ) + Uv (ic , iv ) + S(ic , iv ) − ic − iv (1)
where the cost of investment is normalized to the
level of investment and Uc, Uv, and S are twice
differentiable, increasing, positive, concave
functions.
The innovation in equation (1) is that, because the
asset under consideration is an information asset,
all the relevant entities can conceivably use the
asset simultaneously. In the Grossman–Hart–
Moore model, only one entity could benefit from
use of the asset. Also, note that investments are
considered to be general, in that they create value
for all the entities involved.
As in the Grossman–Hart–Moore calculus, the
payoff to each party in the second period depends
on each party’s bargaining power in the second
period renegotiation, which, in turn, depends upon
the rights contracted for during the first period.
This work allows for two separate property rights:
excludability and usability. These cannot be
separated for physical assets, but may be for
information assets.
Excludability is the right to engage the legal
apparatus of the nation to force other entities to
706
MIS Quarterly Vol. 29 No. 4/December 2005
cease use of the asset (or to compensate the
property right owner for damages). With the right
of excludability comes the choice of exercising that
right. In other words, the ability to sell. An entity
with excludability rights can contract with other
entities not to exercise those rights. In this case,
the excluder sells its promise not to exclude. An
entity can choose not to exclude itself. Where
both parties have excludability rights, this work
follows Grossman–Hart–Moore in assuming that
Nash bargaining takes place, giving each party
one-half of the payoff from excludability rights.
Thus, if both parties have excludability rights, then
generating outside value from the asset requires
approval of both parties, who then bargain over the
surplus and receive one-half of that value.
Usability takes precedence over excludability, in
that it allows the property right owner to disengage
the nation’s legal apparatus. Usability is a promise
that no one can exercise excludability. Usability
allows the owner to take any private actions with
the asset that he desires. However, usability does
not allow the right of sale. Those with usability
rights cannot offer any threat to stop others from
using, and hence cannot sell a promise not to
exclude. For example, the author has usability
rights on the word processing software used to
write this paper. I can write what I want, but I
cannot resell, because I cannot credibly threaten
anyone else’s use of the software. No one will pay
me not to engage the legal apparatus of the
nation, because I have no rights to engage that
legal apparatus.
Each party’s property rights are an ordered pair of
rights (Re, Ru), where Re denotes excludability
rights and can take values E and N, corresponding
to the presence or absence of excludability rights.
Ru denotes usability rights and can take values U
and N, corresponding to the presence or absence
of those rights. Usability rights allow the owner to
maintain all of the value from the owner’s use. In
general, excludability rights allow the owner to
garner some share of the value of resale S of the
software. The payoffs to different ownership combinations are listed in Table 1. The investment
levels are suppressed, because the client always
pays ic and the vendor always pays iv. Likewise,
Walden/Intellectual Property Rights
Table 1. Payoffs to Second Period Game as a Function of Ownership (Client’s Payoff
is on Top)
Vendor
(E,U)
(E,N)
(N,U)
(N,N)
(E,U)
(E,N)
(N,U)
(N,N)
Uc + ½S
½Uc + ½S
Uc
½Uc
Uv + ½S
½Uc + Uv + ½S
Uv + S
½Uc + Uv + S
Uc + ½Uv + ½S
½Uc + ½Uv + ½S
Uc
½Uc
½Uv + ½S
½Uc + ½Uv + ½S
Uv + S
½Uc + Uv + S
Uc + S
Uc + S
Uc
0
Uv
Uv
Uv
Uv
Uc + ½Uv + S
Uc + ½Uv + S
Uc
0
½Uv
½Uv
0
0
the transfer payment p is also suppressed
because the client always pays p and the vendor
always gains p. The derivation of this table is
discussed in the appendix.8
Rather than discuss 16 ownership structures, the
table is simplified to rule out some irrational combinations. In addition, the symmetry of the table is
used to avoid discussions that are identical but for
a change in subscripts.
First, notice that the four ownership structures in
the bottom right of the table are not rational
choices. They are not rational, in the Pareto optimal sense, because other ownership structures
exist which make at least one of the parties better
off without making the other worse off. For
example, [(N,U), (N,U)] can be improved upon by
granting excludability to both of the parties [(E,U),
(E,U)], because each will get what they would
under [(N,U), (N,U)] plus one-half S, which is
positive.
Second, notice that [(E,U), (N,U)] and [(E,N),
(N,U)] have identical payoffs. The only role ownership plays is in determining payoffs. Hence,
[(E,U), (N,U)] and [(E,N), (N,U)] have no relevant
differences. For simplicity, assume that (E,U) will
be chosen over (E,N) if the payoffs are identical.
8
The appendix for this paper is located at http://misq.org/
archivist/vol/no29/issue4/WaldenAppendix.pdf.
This also eliminates [(E,N), (N,N)], [(N,U), (E,N)],
and [(N,N), (E,N)].
This leaves the leftmost column and the topmost
row, which are symmetrical, and the [(E,N), (E,N)]
ownership structure. Because the leftmost column
is symmetrical to the topmost row, only the
topmost row will be discussed. This yields five
ownership structures and associated payoffs, as
described in Table 2. The transfer price and
investment levels are included for completeness.
First Best
It is clear from (1) that the first best level of
investment is the level of investment that solves
∂U c (ic , iv ) ∂U v (ic , iv ) ∂S (ic , iv )
= 1 (2)
+
+
∂i c
∂ic
∂i c
and
∂U c (ic , iv ) ∂U v (ic , iv ) ∂S (ic , iv )
= 1 (3)
+
+
∂i v
∂iv
∂i v
In this first best situation, both the client and
vendor equate their marginal contribution to profit
to the marginal cost of investment. However, this
first best will not be achieved, because under no
proposed ownership structure do the two firms
face a payoff that yields these two first-order
conditions (see appendix). Thus, a second best
solution must be found.
MIS Quarterly Vol. 29 No. 4/December 2005
707
Walden/Intellectual Property Rights
Table 2. Reduced Payoffs From Different Ownership Structures
Ownership Structure
[(client rights),(vendor rights)]
Client Payoff
Vendor Payoff
[(E,U), (E,U)]
Uc + ½S – p – ic
Uv + ½S + p – iv
[(E,N), (E,U)]
½Uc + ½S – p – ic
½Uc + Uv + ½S + p – iv
[(N,U), (E,U)]
Uc – p – ic
Uv + S + p – iv
[(N,N), (E,U)]
½Uc – p – ic
½Uc + Uv + S + p – iv
[(E,N), (E,N)]
½Uc + ½Uv + ½S – p – ic
½Uc + ½Uv + ½S + p – iv
Second Best
The contracting parties’ problem is to choose the
ownership structure that maximizes the joint
return. This means choosing the ownership structure that maximizes (1) subject to the constraint
that the chosen level of investment is the solution
to the first-order conditions detailed in the appendix. Thus, investment is a function of ownership structure and joint surplus is a function of
investment.
In general, the optimal ownership structure depends on how each party’s investment creates
value, and none of the structures under consideration dominate any others. Thus, to evaluate the
benefits of different structures, it is necessary to
make meaningful assumptions about the effects of
investments.
Let the term is primarily sensitive to mean that the
level of a value source, V 0 { Uc, Uv, S }, is sensitive (primarily) to one type of investment, ik, in the
sense that MV/Mij = g(MV/Mik), where j, k 0 {client,
vendor}, j … k, and g is arbitrarily small. This
means that only one entity’s investments bring
about any meaningful change in value and the
other entity’s investments have an arbitrarily small
effect.
Let the term depends equally on mean that the
level of a value source, V 0 { Uc, Uv, S }, is determined equally by each entity, in the sense that V =
f(ic) + f(iv), where f is an increasing, concave,
twice-differentiable positive function. Because
708
MIS Quarterly Vol. 29 No. 4/December 2005
both entities have the same f, the investments by
each have the same impact.
Let the term similar sensitivity mean that for any
two value sources, V, W 0 { Uc, Uv, S } and any
two types of investment, j, k 0 {client, vendor},
MV/Mij = (1 + g)MW/Mik, where g is arbitrarily small.
This simply means that the level of each value
source changes in a similar manner.
Let the term return to investment falls off more
rapidly mean that for any two value sources, V, W
0 { Uc, Uv, S } and any two types of investment, j,
k 0 {client, vendor}, if M2V/Mij2 > M2W/Mik2, then the
return to ij in V falls off more rapidly than the return
to ik in W. This literally refers to the curvature of
the value function. If one value function has
greater curvature, then the impact of investment
on value creation falls off rapidly relative to a
function with less curvature.
Define a source of value, V, as being relatively
more sensitive to an investment type, ij, than value
source, W, if MV/Mij > MW/Mij + q, for all ij, where q is
arbitrarily large. This means that for any given
value of ij, the marginal benefit of investing in V is
much greater than the marginal benefit for
investing in W.
Define a source of value V to be sensitive over a
wide range to a type of investment, ij, if M2V/Mij2 =
g(MV/Mij), where g is arbitrarily small. This simply
means that the rate of change of the first derivative
is small relative to the size of the derivative. Thus,
the impact of investment, ij, is consistent over a
large range of values.
Walden/Intellectual Property Rights
Given these definitions, each of the ownership
structures can be evaluated. The conditions presented are not exhaustive, but they are representative of real situations. Other sufficient conditions
exist that may make one ownership structure
preferred to others. All proofs are located in the
appendix.
Proposition 1: When [(E,U), (E,U)] IS
Second Best. If Uc is primarily sensitive
to ic, Uv is primarily sensitive to iv, S
depends equally on ic and iv, and the
sensitivity of Uc to ic is similar to the
sensitivity of Uv to iv, then [(E,U), (E,U)]
ownership is the second best (i.e., it is at
least as good as any other ownership
structure, but fails to be optimal).
This is an intuitive ownership structure where each
party gains the full value of their internal benefit
and the parties share the external benefit equally.
This works if the internal benefit to each party is
unilaterally determined by the party in question.
However, these conditions are not what one would
expect in a typical outsourcing arrangement. In
typical outsourcing, the client’s benefit depends on
the vendor’s investment as much, or more, than it
depends on the client’s. Outsourcing is usually
done to take advantage of the relative superiority
of the vendor.
There are arrangements where this type of
contract would work well. This sort of equality
contract would tend to work well in joint research
and development projects (Jap 2001). Arrangements that are created more for developing a
sellable product than for internal use would be well
served by such a contract. Thus, it is not surprising that the contracts viewed for this work do
not exhibit this ownership structure.
Proposition 2: When [(E,N), (E,U)] Is
Second Best. If Uv is primarily sensitive
to iv, Uc depends equally on ic and iv, S
depends equally on ic and iv, the sensitivity Uc with respect to ic is similar to
the sensitivity Uc with respect to iv, and Uv
is sensitive over a wide range to iv, then
[(E,N), (E,U)] ownership is the second
best.
It is easy to imagine a situation where a technically
competent vendor desires to enter a new business
domain about which it knows very little. The
vendor can then partner with a client that has a
great deal of in-depth business knowledge in the
domain. The combination of technical proficiency
and in-depth business knowledge can then
produce valuable software that the client itself can
use, but that also has good resale potential. A
variation on this would be a situation in which the
vendor’s benefit was very small, but the client
required the vendor’s help, and the software being
designed had significant resale value.
Proposition 3: When [(N,U), (E,U)] IS
Second Best. If Uc is primarily sensitive
to ic, and both Uv and S are primarily
sensitive to iv then [(N,U), (E,U)]
ownership is the second best.
These conditions suggest that value creation is
largely independent so that investment by the
client creates value for the client and investment
by the vendor creates value for the vendor. Under
such circumstances, it is not clear why either party
would desire to form a relationship rather than
produce independently.
This concern could be addressed if Uc = fc(ic) + [giv
+ q], where g is small, q is a large constant, and
the term in brackets is the effect of the vendor’s
investment. In this case, the vendor has a set of
standardized, high-value investments that it makes
but, after making those standard investments,
additional vendor investment has negligible impact
on value creation.
This seems like a reasonable perspective on
typical outsourcing arrangements. The vendor has
some set of general best practices that it brings to
the relationship, which create real value. However, all the specific fine-tuning depends on the
client’s efforts to adapt the software to its particular
processes (or its processes to the software).
Proposition 4: When [(N,N), (E,U)] Is
Second Best. If all sources of value
depend primarily on the vendor’s iv, then
[(N,N), (E,U)] ownership is the second
best.
MIS Quarterly Vol. 29 No. 4/December 2005
709
Walden/Intellectual Property Rights
If the vendor is particularly competent, and the
client is not, then this may be a very realistic
scenario. In such a case, it makes sense to give
all of the rights solely to the vendor. However, this
leaves the client exposed and allows the vendor to
appropriate some of the value the client may gain
from the use of the software.
This ownership structure also makes sense when
a vendor hires a domain expert for advice.10 In
such a case, the arbitrary labels client and vendor
are misleading, because the vendor is paying the
client for services. However, the model is flexible
enough to account for this situation, which is
common in practice.
At first glance one would not expect a client to ever
agree to such a contract. However, upon reflection, it seems that clients do sometimes agree to
such a contract, and rationally so. Clients frequently outsource software development because
of a sense of internal frustration. These clients do
not feel that they can effectively manage software
development. They recognize that they need software to handle a function, but they also recognize
that they lack the expertise, in-house, to build the
software. If these types of clients are prudent,
they will grant all of the rights to the vendor in
order to maximize vendor investment, then seek a
transfer price, p, that enables them to gain the
benefits of the system up-front. In other words,
they negotiate a negative p. In essence, they sell
the vendor the right to take advantage of them in
the future for current gains.
In sum, this ownership structure can make sense
even though it reduces incentive for client investment. It makes sense because it allows a client to
gain some up-front payment that compensates the
client for future appropriation by the vendor.
However, it probably also causes other difficulties
beyond the scope of this analysis (Singh and
Walden 2003). Nonetheless it should be recognized and explored.
This may seem like a purely academic logic
exercise, but evidence suggests that it is not.
Cash infusions from outsourcing vendors to clients
are common (Lacity and Hirschheim 1993). The
Outsourcing Institute reports that one of the top 10
reasons for outsourcing is, in fact, to gain a cash
infusion.9 In many full sourcing agreements, the
vendor will purchase all of the client’s hardware
and leases for more than market price. It is
common for vendors to give clients low interest
loans (Lacity and Hirschheim 1993). This suggests that the transfer price agreed upon in the
original contract is, in fact, negative, with the
vendor actually paying the client. Of course, this
payment is then recouped in later periods (Singh
and Walden 2003). Clients frequently cite rising
prices in the later years of the contract as a major
cause of friction (Barthelemy 2001).
Proposition 5: When [(E,N), (E,N)] Is
Second Best. If the value from all
sources depends equally on ic and iv, the
return to ic with respect to Uc falls off
more rapidly than the return to iv with
respect to Uc, the return to iv with respect
to Uv falls off more rapidly than the return
to ic with respect to Uv, and Uc is relatively
more sensitive to iv than Uv is, then
[(E,N), (E,N)] ownership is the second
best.
This situation is likely to occur when the software
development is truly a partnership with the client
supplying business expertise and the vendor
supplying technical expertise. This represents the
ideal of development as a partnership with proper
incentives for both vendor and client. However,
such a partnership only makes sense if both
parties actually contribute equally.
Summary of Ownership Structures
Each of the ownership structures may be second
best in different situations. The conditions provided are not exhaustive, but do offer some indication of meaningful conditions that make each dif-
9
See http://www.outsourcing.com/content.asp?page=
01b/articles/intelligence/oi_top_ten_survey.html.
710
MIS Quarterly Vol. 29 No. 4/December 2005
10
I thank an anonymous reviewer for this insight.
Walden/Intellectual Property Rights
ferent ownership structure superior to the others.
There are two important take-aways. First, this
work details sufficient conditions for each structure to be second best. This knowledge can guide
practitioner creation of contracts, and provides
testable hypotheses for future academic work.
Just as important is the fact that there are so many
nondominant ownership structures. There is a tendency to search for a globally best contract, with
relative disregard for the complexity of choices.
Some commentators suggest that outsourcing
should be a partnership, with each participant
working toward creating shared value. However,
as the analysis shows, this type of contract only
makes sense if the participants are equal partners.
In other situations, it may make sense to grant the
vendor considerable ownership if value is primarily
sensitive to vendor investment. In yet other situations, it makes sense to give each party the fruits
of their labor, and nothing else, but still form a
partnership. The point is, the ideal contract depends on how each party’s investments influence
value creation, and it is not likely that this will be
the same for every relationship. The ideal ownership structures as a function of the relational
environment are displayed in Table 3.
Cannibalization
Because software is intellectual, not physical,
property and can be sold to many agents simultaneously, cannibalization must also be considered. Cannibalization occurs when the vendor
uses or sells software that would generate more
value to the client if the client were the sole user
In such situations, the software that is developed
may have greater value to the client if only the
client has access to that software. This can be
operationalized in the model by making the client’s
value a negative function of resale value.11 In this
case, the joint benefit becomes
11
I thank an anonymous reviewer for pointing this out.
[
π total = U c ( i c , i v ) −δS ( i c , i v )
]
+ U v (i c , i v ) + S (ic , i v ) − i c − iv
(4)
The term in brackets is the client’s new benefit
function and cannibalization is assumed to enter
linearly. The coefficient * is assumed to be
positive.
It is clear that the potential benefit under cannibalization will be smaller than the benefit absent of
cannibalization because a negative term has been
added to the benefit function. This also means
that the benchmark of first best will be different, so
that the same levels of investment that were first
best without cannibalization will no longer be first
best. However, there are several other effects
which are less clear.
Proposition 6: The Effect of Cannibalization on Client Incentives. If the
net benefit to client use of the software is
[Uc(ic, ic) – *S(ic, ic)], then the client will
have reduced incentive to invest under
each of the five ownership structures.
This is an intuitive result, but is only made accurate because none of the five ownership structures
fully transfers the client’s usage benefit to the
vendor. Thus, the client will always incur some
level of cannibalization loss when it makes investments, which will lead to lower client investment.
The intuition is that the client does not want to
work very hard making software for its competitors.
Proposition 7: The Effect of Cannibalization on Vendor Incentives. If the
net benefit to client use of the software is
[Uc(ic, ic) – *S(ic, ic)], then the possibility of
vendor overinvestment occurs under
each of the five ownership structures.
This is a slightly less intuitive result that again
follows from the fact that the vendor cannot fully
internalize the client’s usage benefit. If the vendor
could appropriate the full value of the client’s
usage benefit, then it would fully consider the
cannibalization costs. However, because it cannot, the vendor can make some investment that
benefits the vendor but harms the client.
MIS Quarterly Vol. 29 No. 4/December 2005
711
Walden/Intellectual Property Rights
Table 3. Summary of Ownership Structures
Ownership Structure
Conditions That Make the Ownership Structure Second Best
Ownership structure
[(E,U), (E,U)] allows both
parties to the contract full
use of the software, but
requires that they share
the proceeds from sales
to third parties.
This ownership structure works best when three conditions hold:
(1) The usefulness of the software to each party is determined primarily
by the investments of that party.
(2) The resale value of the software is determined equally by the
investments of each party.
(3) The ability of each party to generate usefulness for itself is
approximately the same.
Ownership structure
[(E,N), (E,U)] allows the
vendor to freely use the
software, but the client
must pay for its use, and
requires that they share
the proceeds from sales
to third parties.
This ownership structure works best when five conditions hold:
(1) The usefulness of the software to the vendor is determined
primarily by the investments of the vendor.
(2) The usefulness of the software to the client depends equally on the
vendor and client’s investments.
(3) The resale value of the software is determined equally by the
investments of each party.
(4) The ability of each party to generate usefulness for the client is
approximately the same.
(5) The ability of the vendor to generate usefulness for the vendor
persists over a wide range of possible investment levels (i.e.,
returns diminish slowly).
Ownership structure
[(N,U), (E,U)] allows both
the vendor and client free
use of the software, but
the vendor keeps all of
the proceeds from sales
to third parties.
This ownership structure works best when three conditions hold:
(1) The usefulness of the software to the client is determined primarily
by the investments of the client.
(2) The usefulness of the software to the vendor is determined
primarily by the investments of the vendor.
(3) The resale value of the software is determined primarily by the
investments of the vendor.
Ownership structure
[(N,N), (E,U)] allows the
vendor to freely use the
software and grants the
vendor all of the proceeds
from sales to third parties.
Moreover, the vendor and
client share the value of
the usefulness of the
software to the client.
This ownership structure works best when all sources of value creation
depend on the vendor’s investments.
712
MIS Quarterly Vol. 29 No. 4/December 2005
Walden/Intellectual Property Rights
Table 3. Summary of Ownership Structures
Ownership Structure
Conditions That Make the Ownership Structure Second Best
Ownership structure
[(E,N), (E,N)] splits all
benefits equally between
the two parties.
This ownership structure works best when three conditions hold:
(1) The usefulness of the software to each party and the resale value
of the software is determined equally by the investments of each
party.
(2) The ability of the vendor to generate usefulness for the client
diminishes more quickly than the ability of the client to generate
usefulness for the client.
(3) The ability of the vendor to generate usefulness for the vendor
diminishes more quickly than the ability of the client to generate
usefulness for the vendor.
(4) The return to vendor investment in client usefulness is greater than
the return to vendor investment in vendor usefulness.
This is particularly problematic given that vendor
investment in resale is generally more important
than client investment. Vendors have the network,
the marketing channels, and the reputation to
resell useful software. Clients’ competencies
usually lie in other areas, namely, the sale of their
own products. Thus, it generally makes sense to
give excludability rights to the vendor. However, if
the vendor works too hard making the software
usable by the client’s competitors, the client may
derive little or no value from the software. This
can make the software a competitive necessity
rather than a competitive advantage (Hitt and Frei
1998).
The next proposition requires that MUc/Miv is arbitrarily large. This means that the value to the
client is highly sensitive to the vendor’s investment. Viewed another way, it means that the
vendor is very efficient at creating client value.
Presumably this is often the case, as an important
consideration of most outsourcing arrangements is
for the vendor to create value for the client.
Vendors who are not efficient at creating client
value will usually be passed over in favor of
vendors that are more efficient.
Proposition 8: Ownership Structures
to Combat Cannibalization Problems.
If the cannibalization problem is defined
to be greater when the level of * necessary for vendor overinvestment is smaller
and MUc/Miv is arbitrarily large, then the
ownership structures can be ranked from
the largest cannibalization problem to the
smallest as [(E,U), (E,U)], [(N,U), (E,U)],
[(E,N), (E,N)], [(E,N), (E,U)], [(N,N),
(E,U)].
This proposition offers guidance as to when the
cannibalization problem will be more prevalent.
The actual level of the problem depends on the
level of *, but this proposition offers guidance on
when organizations should become concerned
about the problem.
There are two basic strategies suggested by this
proposition on how to handle the cannibalization
problem. First, the parties could sign a contract
that reduces the vendor’s share of the resale
benefit. This limits vendor investment by removing
the primary incentive. However, this solution is
likely to be unappealing in practice because it is
too blunt an instrument. If, as discussed above,
vendors are more competent at resale than clients,
then removing a significant share of the resale
value from them would tend to overcorrect the
problem, causing more harm than good.
MIS Quarterly Vol. 29 No. 4/December 2005
713
Walden/Intellectual Property Rights
Table 4. Summary of Cannibalization Effects
Proposition
Implication
Proposition 6: The Effect of
Cannibalization on Client
Incentives
A client will always have reduced incentive to invest in software
created in an outsourcing relationship if the use of that software
by other firms will reduce the value to the client. This occurs
because even when a client has no intellectual property rights, it
can still appropriate some value from the relationship. However,
the value is less than if there is no cannibalization issue.
Proposition 7: The Effect of
Cannibalization on Vendor
Incentives
Vendors may invest more in software created in an outsourcing
relationship than is socially optimal. This occurs because the
vendor cannot internalize the client’s loss of competitive
advantage arising from cannibalization.
Proposition 8: Ownership
Structures to Combat
Cannibalization Problems
The more intellectual property rights the client possesses, the
larger the cannibalization problem. This occurs because the
vendor internalizes less of the client’s loss of competitive
advantage as the vendor surrenders intellectual property rights to
the client.
The second strategy is to give the vendor some
share of the client’s net usage benefit via ownership. Because the vendor can never fully internalize the client’s net usage benefit, this will
always fall short of aligning vendor incentives with
total benefit. However, it does result in a move in
the right direction. Since all five basic ownership
structures promote underinvestment in the
absence of cannibalization, in the presence of
cannibalization, the additional incentive given by
client absorption of some of the costs will temper
the potential for vendor overinvestment.
The optimal strategy depends on the level of
vendor overinvestment. If overinvestment is a real
problem (* is large), then removing some of the
resale rights from the vendor will have more of an
impact on the problem. If overinvestment is a
minor problem (* is moderate), then forcing the
vendor to internalize a portion of the client net
benefit will accomplish a finer tuning of investments. If there is no overinvestment (* is small),
then the strategies discussed in the prior section
will be appropriate with no changes.
Overall, the results show that, in the presence of
cannibalization, client incentives are reduced and
714
MIS Quarterly Vol. 29 No. 4/December 2005
vendor incentives are increased relative to the new
first best.12 The relative increase in vendor incentives may lead to vendor overinvestment. Parties
to the contract can deal with this by removing a
vendor’s excludability rights or by removing a
client’s usability rights. These ideas are summarized in Table 4.
Discussion
This work has expanded the traditional property
rights approach to consider a variety of different
ownership structures made possible by the nonphysical nature of software. Specifically, the work
proposes, illustrates, and explains how software
permits a separation of usability and excludability.
12
Vendor incentives are actually reduced or unchanged
relative to the first best without cannibalization.
However, the optimal level of investment is reduced by
more than the vendor incentives are reduced. Thus, the
vendor will make investments that are a larger
percentage (perhaps even greater than 100 percent) of
the first best under cannibalization. In the absence of
cannibalization, the vendor’s investments are a smaller
percentage of the first best level of investment.
Walden/Intellectual Property Rights
This allows for one firm to hold unlimited usage
rights without requiring the other firm to surrender
any particular rights. Such a distinction requires
the property rights approach to recognize not only
the two firms explicitly involved in a relationship
but also all of the other firms implicitly in the market. This, in turn, leads to ownership structures,
such as copyleft,13 that would be nonsensical for
physical assets.
On a practical front, this work shows that the best
distribution of property rights depends on the
nature of the relationship between the two parties.
Thus, no single way to manage a relationship is
always better than any other way. The choice
between total outsourcing, partnership, incentives,
or any of the many ways to structure the relationship depends on the relative strengths and
weaknesses of the parties.
Another interesting finding is that all of the
contracts studied for motivation offered full usage
rights to clients, whereas theory suggests that a
client might want to be compensated ex ante
rather than to have property rights. One explanation of this is that negotiating power is as important
in the division of assets as value creation (Lerner
and Merges 1998). This line of reasoning suggests that firms will appropriate as many property
rights as possible, even if doing so reduces overall
surplus. Clients are certainly in a strong negotiating position prior to the signing of the contract,
and it is reasonable to believe that they use this
position to appropriate additional rights for
themselves.
This work also shows practitioners how the
possibility of cannibalization distorts the incentives
of the relationship, so that the vendor works hard
to make a technology that can be redeployed by
the client’s competitors.
Contribution
On a theoretical front, this work extends the
property rights approach (Bakos and Brynjolfsson
1993a; Bakos and Nault 1997; Brynjolfsson 1994;
Grossman and Hart 1986; Hart 1995; Hart and
Moore 1988, 1990) in order to make a number of
valuable contributions to IT literature. The thesis
of the work is that different types of assets have
different characteristics, which lead to different
potential bundles of property rights and call for
different methods of contracting for those rights.
Instead of the standard property rights model’s
physical assets, this work considers software
assets. The theory presented is based on the
actual text of real-world contracts, and takes into
account the different property rights that those
contracts exhibit.
13
Copyleft is the type of license that covers Linux. It
specifies that all agents have the right to do anything with
the software except exclude others from its use.
Finally, this work offers suggestions for what
intellectual property should be assigned in five
different situations, and how intellectual property
rights should be modified to account for cannibalization. This is extremely important to practitioners because they must actually formulate and
abide by outsourcing contracts.
Directions for Future Research
and Speculations
As with any intellectual undertaking, simply performing the process has raised new questions, and
this section speculates what some of the more
interesting questions and solutions might be.
Many of these speculations and questions
originated with reviewers.
Moral Hazard and Property Rights
One question that always arises in a research
context is, Why not some other model? Another
popular economic model for interorganizational
relationships is moral hazard (Bhattacharyya and
Lafontaine 1995). In moral hazard models, it is the
goal of the principle to choose a rule for sharing
the value of the output when the inputs are not
observable. A more recent popularization is a
multi-task model in which there are several outputs
and inputs that are more or less observable
(Holmstrom and Milgrom 1991).
MIS Quarterly Vol. 29 No. 4/December 2005
715
Walden/Intellectual Property Rights
Moral hazard type models were not used in this
work, simply because the contract sections dealing
with intellectual property, and specifically software,
did not contain sharing rules. Rather, they contained clauses assigning ownership via software
licenses. Thus, a moral hazard model would not
offer an appropriate description of the contracts
observed. Both simple moral hazard and multitask problems can degenerate into ownership
institutions if the outputs are sufficiently unobservable. However, the choice of different ownership
institutions remains. Rather than deal with the
issues of uncertainty, this work focuses on the
issues of different ownership structures. Thus, this
work offers a parsimonious model of ownership
structures without making additional assumptions
about the relative uncertainty of outcomes.
Of course, unobservability raises questions about
the ability to act on ownership structures.
However, from a practical point of view, firms must
make some estimation of the value propositions of
outsourcing, including the value of intellectual
property. The property rights approach allows
firms to take a guess at the time the contract is
written and assign the appropriate ownership
structure. The moral hazard model would require
a guess to be made at the time the output
occurred, and then to compensate the parties
based on that guess. This would be particularly
problematic in practice because there would be
great incentives to guess wrong.
The guess problem is further complicated in the
moral hazard model because no actions are left to
the parties after the guess and, thus, there is no
mechanism to insure an accurate guess. Adverse
selection problems like those of Snir and Hitt
(2004) solve this by allowing for more value creation beyond the realization of the outcome. Some
such mechanisms could be added to a moral
hazard model to insure that the guesses were
honest. However, this would further complicate
the model and still not address the central question
of different ownership structures. The property
rights approach avoids this guessing problem by
forcing renegotiation, wherein each party can
credibly commit to refuse unreasonable guesses.
While the moral hazard framework is problematic
716
MIS Quarterly Vol. 29 No. 4/December 2005
for the intellectual property part of the contract, it
may be useful elsewhere. For example, one of the
contracts requires that the project manager be
compensated based upon the outcome of a user
satisfaction survey. Such a survey avoids the
guessing problem because the individual users
have no vested interest in lying.
Generalizability
This model is based on a small number of
contracts and, therefore, questions of generalizability arise. As noted in the beginning, there is a
great deal of commonality among these contracts,
so it is not unthinkable that other contracts by the
same vendor will be similar. In practice, contracts
are generally formulated from templates, so these
contracts are probably representative of an ideal
contract that forms the basis for a number of other
arrangements. Because the vendor is large, this
may include a significant fraction of all outsourcing
arrangements. Of course, this is not proof, but
rather it is speculation that should be validated
empirically. From a practical standpoint, that may
be extremely difficult, due to confidentially issues.
As Nobel laureate Ronald Coase laments, “The
main obstacle faced by researchers in industrial
organization is a lack of available data on contracts and the activities of firms” (1992, p. 719).
Many additional directions for future research
present themselves as a result of this analysis.
Generally, these can be categorized as operational
and economic. The operational research questions are touched on briefly in some of the analysis
above. For example, the impact of IT on the ability
to contract, measure, and monitor certainly will
prove to be an interesting and valuable avenue for
inquiry (Banker et al. 2000). Researchers should
not only develop an explanation of how IT may
allow firms to write better contracts, but also how
contracts can be written to take advantage of
some of the special properties of IT, such as
costless reproduction of software. Decision support for outsourcing contracts is also an avenue of
inquiry that would help firms utilize IT to generate
value. While it seems that none are more qualified
to develop such systems than the IT community,
Walden/Intellectual Property Rights
the legal nuances of contracting would require the
cooperation of legal scholars, paving the way for
more interdisciplinary research.
Another important operational research area
concerns itself with digital contracting. Some
authors have begun to examine this issue (Dasgupta and Dickinson 1998). There is no a priori
reason why contracts must be static documents.
Contracts could be dynamic intelligent systems
that constantly update their parameters in
response to changes in the external environment.
A digital contract could have the capabilities of
smoothing the impacts of business events by
tapping directly into the accounting, finance, and
operational systems of each firm.
Another direction for future research is to expand
the range of property rights considered. This work
focuses on two different types of ownership rights
defined in prior property rights literature (Alchian
and Demsetz 1973). However, there are clearly a
multitude of different property rights that exist in
reality.14 For example, each party could have the
right to grant usability rights, so that each party
could freely sell the property to others without
gaining the acceptance of the other party. Alternatively, the software could be created with
copyleft—the ability for anyone to use the software, but for no one to sell the software. Rights
could be assigned to allow one party to exclude
some certain group and the other party to exclude
some other group—like a protected territory. The
range of possible property rights is limited only by
the creativity of the contract writer. Further
exploration of other commonly appearing rights
would certainly be a welcome contribution, as
would devising hitherto unimagined rights that
generate greater welfare.
While this work has focused on property rights,
other methods of generating surplus in IT
outsourcing might also play a significant role.
These might include dependence balancing (Heide
and John 1988), reputation (Williamson 1985),
trust (Das and Teng 1998), and messaging (Tirole
14
I thank an anonymous reviewer for pointing this out.
1999). In all likelihood, no one theory can explain
all of the text in contracts, and future research
should address the degree to which different
theories explain contracts. More importantly,
future research should address the boundary
conditions that lead firms to choose one theory
over another.
Finally, this work focuses on a narrow section of
the contract concerned with the software assets.
It seems that, to some degree, the arguments put
forth apply to other types of intellectual property,
such as know-how, data, or trade secrets. The
fundamental difference between software and
physical assets is the ability for software to be
simultaneously and independently used in an
infinite number of locations, while physical assets
must occupy a single location at any given time.
This ability to be in use at multiple locations at the
same time is an attribute largely shared by all
intellectual property. For those types of intellectual
property that require a great deal of human interaction, the model would have to be modified to
account for two characteristics. First, transfer of
the intellectual property among humans may entail
significant costs. Second, humans are free-willed
entities rather than assets to be owned, and thus
their incentives must be taken into account.
However, the effort may be well worth it in order to
better understand knowledge management.
Bakos, Brynjolfsson, and Nault have examined
some of the human aspects of intellectual property
from a property rights viewpoint; however, they
constrained themselves to the traditional ownership structures (Bakos and Brynjolfsson 1993a;
Bakos and Nault 1997).
Conclusion
The property rights approach has a great deal to
offer to the understanding of software issues in IT
outsourcing contracts. The basic model proposes
that incentives lead to actions, which generate
value. While this has a great deal of face validity
and logical consistency, it is not easily actionable
because it is too general. However, when it is
recognized that different types of assets give rise
to different, fairly specific, bundles of property
MIS Quarterly Vol. 29 No. 4/December 2005
717
Walden/Intellectual Property Rights
rights, one can begin to generate richer, actionable, and testable theory. Of particular importance
to the IT outsourcing context are intellectual property issues, such as software issues. Of course,
these intellectual property issues may also apply to
trade secrets and other knowledge assets.
Outsourcing will continue to grow in importance in
the coming years as firms seek new ways to
generate value. The contract is the defining document of these relationships. Understanding how it
is created and how it should be created offers a
remarkable opportunity for IT researchers and
practitioners to help firms become more successful. This work is a beginning step in aiding
development of a comprehensive theory of the
why and how of IT contracting, and it is hoped that
it inspires a generation of researchers to scrutinize
this question and continue the research.
Acknowledgments
The author would like to thank George John,
Donald Jones, James Burkman, Zhangxi Lin,
Param Vir Sidhu, three anonymous reviewers, and
the two editors for their valuable comments and
insights; Robert Kauffman and Alina Chircu for the
introduction to incomplete contract theory; and the
participants in the Texas Tech IS colloquium for
their input.
References
Alchian, A. A., and Demsetz, H. “The Property
Right Paradigm," The Journal of Economic
History (33:1), 1973, pp. 16-27.
Ang, S., and Beath, C. M. “Hierarchical Elements
in Software Contracts," Journal of Organizational Computing (3:3), 1993, pp. 329-361.
Bakos, J. Y., and Brynjolfsson, E. “From Vendors
to Partners: Information Technology and Incomplete Contracts in Buyer-Supplier Relationships," Journal of Organizational Computing
and Electronic Commerce (3:3), 1993a, pp.
301-328.
Bakos, J. Y., and Brynjolfsson, E. “Information
Technology, Incentives, and the Optimal
718
MIS Quarterly Vol. 29 No. 4/December 2005
Number of Suppliers," Journal of Management
Information Systems (10:2), 1993b, pp. 37-53.
Bakos, Y. J., and Nault, B. R. “Ownership and
Investment in Electronic Networks," Information
Systems Research (8:4), 1997, pp. 321-341.
Banker, R. D., Kalvenes, J., and Patterson, R. A.
“Information Technology, Contract Completeness and Buyer-Supplier Relationships," Proceedings of the 21st International Conference on
Information Systems, W. J. Orlikowski, S. Ang.
P. Weill, H. C. Krcmar, and J. I. DeGross
(Eds.), Brisbane, Australia, 2000, pp. 218-228.
Barthelemy, J. “The Hidden Costs of IT Outsourcing," MIT Sloan Management Review
(42:3), 2001, pp. 60-69.
Battigalli, P., and Maggi, G. “Imperfect Contracting," Princeton University Working Papers
in Economics Theory, 2000 (available online at
http://www.princeton.edu/~ectheory/).
Bhattacharyya, S., and Lafontaine, F. “DoubleSided Moral Hazard and the Nature of Share
Contracts," Rand Journal of Economics (26:4),
1995, pp. 761-781.
Brynjolfsson, E. “Information Assets, Technology,
and Organization," Management Science
(40:12), 1994, pp. 1645-1663.
Coase, R. H.
“The Nature of the Firm,"
Economica (4:4), 1937, pp. 386-405.
Coase, R. H. “The Institutional Structure of Production," The American Economic Review
(82:4), 1992, pp. 713-719.
Das, K. T., and Teng, B.-S. “Between Trust and
Control: Developing Confidence in Partner
Cooperation in Alliances," Academy of Management Review (23:3), 1998, pp. 491-512.
Dasgupta, S., and Dickinson, F. “Electronic
Contracting in Online Stock Trading," Electronic
Markets (8:3), 1998, pp. 20-22.
DiRomualdo, A., and Gurbaxani, V. “Strategic
Intent for IT Outsourcing," Sloan Management
Review (39:4), 1998, pp. 67-80.
Grossman, S. J., and Hart, O. D. “The Costs and
Benefits of Ownership: A Theory of Vertical
and Lateral Integration," Journal of Political
Economy (94:4), 1986, pp. 691-719.
Hart, O. Firms, Contracts, and Financial Structure, Oxford University Press, London, 1995.
Hart, O., and Holmstrom, B. “The Theory of
Contracts," in Advances in Economic Theory,
Walden/Intellectual Property Rights
Fifth World Congress, T. R. Bewley (Ed.),
Cambridge University Press, Cambridge, MA,
1987, pp. 369-398.
Hart, O., and Moore, J. “Incomplete Contracts and
Renegotiation," Econometrica (56:4), 1988, pp.
755-785.
Hart, O., and Moore, J. “Property Rights and the
Nature of the Firm," The Journal of Political
Economy (98:4), 1990, pp. 1119-1158.
Hart, O., and Moore, J. “Foundations of Incomplete Contracts," The Review of Economic
Studies (66:226), 1999, pp. 115-138.
Heide, J. B., and John, G. “The Role of Dependence-Balancing in Safeguarding TransactionSpecific Assets in Conventional Channels,"
Journal of Marketing (52:1), 1988, pp. 20-35.
Hitt, L. M., and Frei, F. X. “Evaluating Investments
in Electronic Distribution: The Case of PC
Banking," paper presented at the 10th Annual
Workshop on Information Systems and Economics, New York, December 11-12, 1998
(extended abstract available at http://is2.stern.nyu.edu/~wise98/pdf/seven_a.pdf).
Holmstrom, B., and Milgrom, P. “Multitask Principal-Agent Analysis: Incentive Contracts, Asset
Ownership, and Job Design," Journal of Law,
Economics, and Organization (73:4), 1991, pp.
24-52.
Jap, S. “'Pie Sharing' In Complex Collaboration
Contexts," Journal of Marketing Research
(38:1), 2001, pp. 86-100.
Kauffman, R. J., and Walden, E. A. “Economics
and Electronic Commerce: Survey and Directions for Research," International Journal of
Electronic Commerce (5:4), 2001, pp. 5-116.
Lacity, M.C., and Hirschheim, R. Information
Systems Outsourcing: Myths, Metaphors and
Realities, John Wiley & Sons, New York, 1993.
Lerner, J., and Merges, R. P. “The Control of
Technology Alliances: An Empirical Analysis of
the Biotechnology Industry," The Journal of
Industrial Economics (46:2), 1998, pp. 125-156.
Maskin, E., and Tirole, J. “Two Remarks on the
Property-Rights Literature," The Review of Economic Studies (66:226), 1999a, pp. 139-149.
Maskin, E., and Tirole, J. “Unforeseen Contingencies and Incomplete Contracts," The Review
of Economic Studies (66:226), 1999b, pp. 83114.
Masten, S. E. “Contractual Choice," in Encyclopedia of Law and Economics, Volume III. The
Regulation of Contracts, B. Bouckaert and G.
De Geest (Eds.), Edward Elgar, Cheltenham,
UK, 2000, pp. 25-45.
Segal, I. “Complexity and Renegotiation: A Foundation for Incomplete Contracts," The Review of
Economic Studies (66:1), 1999, pp. 57-82.
Shapiro, C., and Varian, H. R. Information Rules:
A Strategic Guide to the Network Economy,
Harvard Business School Press, Cambridge,
MA, 1999.
Singh, P., and Walden, E. A. “Flexibility and Cost
in Information Technology Outsourcing:
Balancing Opposing Goals," Proceedings of the
9th Americas Conference on Information Systems, J. Ross and D. Galletta (Eds.), Tampa,
FL, 2003, pp. 1653-1663.
Snir, E. M., and Hitt, L. M. “Vendor Screening in
Information Technology Contracting with a Pilot
Project," Journal of Organizational Computing
and Electronic Commerce (14:1), 2004, pp. 6188.
Stinchcombe, A. L. “Contracts as Hierarchical
Documents," in Organization Theory and Project Management: Administering Uncertainty in
Norwegian Offshore Oil, A. L. Stinchcombe and
C. A. Heimer (Eds.), Norwegian University
Press, Bergen, Norway, 1985, pp. 121-171.
Tirole, J. “Incomplete Contracts: Where Do We
Stand?," Econometrica (67:4), 1999, pp. 741781.
Whang, S. “Contracting for Software Development,” Management Science (38:3), 1992, pp.
307-324.
Williamson, O. The Economic Institutions of
Capitalism, Free Press, New York, 1985.
Williamson, O. Markets and Hierarchies: Analysis
and Antitrust Implications, Free Press, New
York, 1975.
About the Author
Eric Walden’s research interests focus on developing a greater understanding of information systems in the organizational context. This includes
issues within and among organizations. Eric tries
MIS Quarterly Vol. 29 No. 4/December 2005
719
Walden/Intellectual Property Rights
to combine strong theory from industrial organization in economics, with empirical validation
within an organizational context. It is his hope that
this focus will bridge a gap between pure analytic
economics issues and softer, real world organizational issues, making each more accessible to
the other and helping to develop real theory unique
720
MIS Quarterly Vol. 29 No. 4/December 2005
to the information systems literature. Eric received
his Ph.D. from the University of Minnesota, and is
currently an assistant professor at the Rawls
College of Business at Texas Tech University. His
prior research has appeared in Information Systems Research, The International Journal of
Electronic Commerce, and Electronic Markets.
Download