J. Michael Pearson

J. Michael Pearson
Southern Illinois University Carbondale | SIU · Department of Management

DBA

About

88
Publications
89,965
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,521
Citations
Additional affiliations
August 1991 - June 1996
Kansas State University
Position
  • Professor (Assistant)
August 2001 - present
Southern Illinois University Carbondale
Position
  • Professor (Full)
Description
  • Project Management, Information Technology (MBA and Doctoral level), Management of Change, Research Methods, Small Business Management (online), Systems Design,
August 2001 - present
Southern Illinois University Carbondale
Position
  • Professor (Full)
Description
  • Currently working on the impact of technology on job performance / stress / satisfaction. Other areas of interest include entrepreneurship, ethical behavior, and research trends in IS.

Publications

Publications (88)
Article
This article explores the relationship between culture and cyberloafing. A survey measuring individuals’ propensity to engage in cyberloafing in the workplace was conducted with people from 17 countries representing a wide range of cultures. Tests were performed to explore relationships between participants’ propensity to cyberloaf and the cultural...
Chapter
Cyberloafing is an issue of growing concern for contemporary organizations. This paper develops an integrated research model which combines the Theory of Interpersonal Behavior and Organizational Justice to provide a holistic examination for cyberloafing behavior. Data was collected from working respondents via on-line questionnaire to test the res...
Article
Cyberloafing is an issue of growing concern for contemporary organizations. This paper develops an integrated research model which combines the Theory of Interpersonal Behavior and Organizational Justice to provide a holistic examination for cyberloafing behavior. Data was collected from working respondents via on-line questionnaire to test the res...
Article
Full-text available
Abstract Although there has been much empirical attention on studying groups and ones intention to adopt new technology, almost no research has focused on how this adoption is influenced by the collective nature of the implementation. The purpose of this study was to study an important contextual factor, whether group versus individual adoption of...
Article
Cyberloafing has become a pervasive problem for many organizations and some researchers have suggested that a deterrence approach utilizing acceptable use policies for Internet-based applications coupled with mechanisms designed to monitor employee Internet usage and detect unauthorized usage can be an effective way to reduce it. However, the resul...
Article
Full-text available
Online reviews have been studied extensively because of their impact on online consumers’ purchase decisions. Little attention, however, has been paid to consumers’ perceptions of online review configurations. This study examines how a consumer's purchase decision is affected by online review configurations. Additionally, researchers analyze whethe...
Article
Full-text available
As firms increasingly sanction an open sourcing strategy, the question of which open source project to undertake remains tentative. The lack of established metrics makes it difficult to formulate such strategy. While many projects have been formed and created, only a few managed to remain active. With the majority of these projects failing, firms n...
Article
Full-text available
Purpose ‐ Previous research has found that information technology (IT) professionals exhibit significantly lower organizational citizenship behaviour (OCB) than non-IT professionals. Thus, the purpose of this paper is to examine how an IT professional's job stress, trust, and commitment affect the valence of job satisfaction, which in turn influenc...
Article
Full-text available
This paper explores how social relationships between new accounting faculty members and their former dissertation chairs can influence the publishing productivity of the new faculty members in their early academic careers. The focus on social relationships offers a unique approach to studying the effectiveness doctoral education. Our findings show...
Article
Software piracy continues to be a growing problem on a global scale for software developers. The purpose of this study was to conduct a cross-cultural comparison of a model predicting the intent of individuals to pirate software using two sub samples: Jordan and the US. Our results suggest that the Theory of Reasoned Action provides a strong predic...
Article
This study builds upon previous research by comparing and contrasting the decision to adopt wireless technologies with the decision to continue to use wireless technologies. In the context of web-enabled cell phones, we propose, test and compare the predictive ability of two value-based models using a multi-group analysis. The findings suggest that...
Article
Full-text available
Organizational citizenship behavior (OCB) has been suggested to facilitate organizational functioning. However, previous research has found that information technology (IT) professionals exhibit significantly lower OCB than non-IT professionals. To explain this phenomenon, this research includes demographic variables including age, gender, and tenu...
Article
Full-text available
This paper analyses the role of website usability in a B2C electronic commerce environment. The authors identify dimensions of website usability that have been examined in the literature and integrate those usability dimensions within an electronic commerce acceptance model using an e-commerce simulation. Structural equation modelling was used to a...
Article
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30years. However, after a...
Article
Online review, an important form of reputation systems, has been studied intensively because of its powerful impact on online retailers, intermediaries, and customers. However, to date, very little attention has been paid to factors that influence an individual’s intention to provide an online review. An extended theory of planned behavior and Big-...
Article
Full-text available
The innovation diffusion theory (IDT) could be considered as one of the earliest theories that attempts to explore factors that influence an individual to adopt an innovation or a new technology. The theory suggests five key beliefs that influence the adoption of any innovation: relative advantage, complexity, compatibility, trialability, and obser...
Conference Paper
Full-text available
Organisations and individuals release source code on the Web to improve their software by attracting peers in the strategic move of " opensourcing" that has created thousands of open source projects (e.g., Eclipse-IBM, Thunderbird-Mozilla and Linux-Torvalds). Nevertheless, most of these projects fail to attract people and never become active. To mi...
Conference Paper
As the use of the Internet has grown, so have new ways for employees to loaf. Cyberloafing has become a pervasive problem for firms. Information systems researchers have suggested that a deterrence approach through the use of acceptable use policies for Internet-based applications coupled with Internet monitoring mechanisms can be an effective way...
Conference Paper
Full-text available
Social influence is an important factor in guiding individual behavior, including purchase decisions. The online gaming industry has demonstrated itself to be one of the most successful business sectors to integrate the Internet into its business models. The purpose of the study is to investigate the influence an individual's social environment has...
Article
Full-text available
Internet banking in Jordan has developed rapidly since the year 2001, as most Jordanian banks have adopted some form of Internet usage and launched websites to serve their customers. This study extends the Unified Theory of Acceptance and Use of Technology (UTAUT) by adding perceived facilitating conditions and personality dimensions, two factors t...
Article
Full-text available
This article develops a theoretical model that suggests that differential levels of uncertainty, knowledge relatedness, and richness of information will have a substantial impact on the decision to engage in entrepreneurship. Effects of the individual differences fear of failure and general self-efficacy are also considered. Using a metric conjoint...
Article
Full-text available
Internet banking is booming in Jordan and it is time for banks and customers to reap the benefits from such technology. Bank customers' propensity to use internet banking is dependent on their attitudes towards such technology. This work validates an Arabic technology acceptance instrument through a rigorous process so that banks can better underst...
Article
This study used a B2C e-commerce simulation in an effort to validate two Web site usability instruments. The results of the confirmatory factor analysis found the first instrument exhibited moderately acceptable measurement properties, while the second instrument displayed poor validity for the suggested dimensions. Attempted validation of these in...
Article
E-commerce has become an important medium of exchange. Two related issues that face e-merchants are increased competition and trust development. The relationship between the vendor and the customer is an important and complex issue, especially in e-commerce settings. Many researchers have studied the issues related to e-relationships. This paper in...
Article
Full-text available
Innovation with information technology (IT) helps companies gain more from their IT investment. IT innovation by individuals can be affected by many factors (such as overload, autonomy, and work / family conflict) and developing a better understanding of these factors can help managers make better decisions about the work environment. Using Partial...
Article
Full-text available
Innovation with information technology (IT) helps companies gain more from their IT investment. IT innovation by individuals can be affected by many factors (such as overload, autonomy, and work / family conflict) and developing a better understanding of these factors can help managers make better decisions about the work environment. Using Partial...
Article
Full-text available
Organizations have been faced with social/economic pressure to utilize IT and to facilitate communication via technological modes. The communications that are dependent on media richness are affected by individual user characteristics. The individual users who participate in group projects must communicate and ultimately can have different performa...
Article
Full-text available
The theory of reasoned action originally introduced in the field of Social Psychology has been widely used to explain individuals’ behaviour. The theory postulates that individuals’ behaviour is influenced by their attitude and subjective norm. The purpose of this study was to determine factors that influence an individual’s intention to use a tech...
Article
Full-text available
Purpose As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and developed many different information security standards and guidelines. Building on these previous efforts, the purpose of this study is to put forth a framework for...
Article
IT managers in global firms often rely on user evaluations to guide their decision-making in adopting, implementing, and monitoring the effectiveness of enterprise systems across national cultures. In these decisions, managers need instruments that provide valid comparisons across cultures. Using samples representing five nations/world regions incl...
Article
Organizations are investing significant amounts of resources in both internal and external web-based applications. Many of these applications must be used by either employees of the organization or by e-customers of the organization. One of the key components of any web-based application is its interface, and a key criteria in utilization of these...
Article
Full-text available
In this study, we extend the decomposed theory of planned behavior (DTPB) by incorporating trust and examining its impact on an individual's intention to adopt Internet banking. A majority of the technology adoption research has been completed in developed countries such as the U.S. Overall, the results indicate that the proposed model provides a g...
Article
Full-text available
IT departments are service providers to business users, and service quality has been proposed as one measure of IT effectiveness. Previous research has adapted the SERVQUAL scale from service marketing literature, using it to gauge business users' expected and perceived levels of IT service quality. In this research, we investigate the other side o...
Article
Full-text available
To further our understanding about how to control Internet abuse in the workplace, this study examines how a person's level of self-control leads to cyber-slacking, how deterrence measures commonly used within organizations impact individual decisions to cyber-slack, and how self-control moderates the relative salience of one of the commonly used d...
Article
This exploratory study examines the importance of mentor/mentee relationships on faculty development by measuring how social exchange between new faculty members (mentees) in information systems and their former dissertation chairs (mentors) relate to how quickly the new faculty members completed their doctoral program and the number of peer review...
Conference Paper
Few studies have explicitly focused on risky group decision making in information sharing or examined the manifestation of communication differences in face-to-face (FTF) and computer-mediated communication (CMC) teams. Hypothesizing that information-sharing behaviors could be influenced not only by contextual forces but also by personality and tru...
Chapter
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
Article
Full-text available
The theory of reasoned action originally introduced in the field of Social Psychology has been widely used to explain individuals' behaviour. The theory postulates that individuals' behaviour is influenced by their attitude and subjective norm. The purpose of this study was to determine factors that influence an individual's intention to use a tech...
Chapter
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
Article
This paper examines the unique social network ties, or 'tech ties' as we call them, that are created through the use of social software (i.e., blogs, instant messaging, meetup.com). The paper discusses how tech ties: a new means for developing social networks; just as effective as non-tech ties in supporting an individual's social network; valuable...
Article
Purpose This research aims to investigate the relative importance of five key criteria in assessing web usability. These criteria are navigation, download speed, personalization, ease of use, and accessibility. It is believed that these factors play a significant role in assessing web usability. Design/methodology/approach This study utilized a sc...
Article
Full-text available
Internet abuse in the workplace (a.k.a. cyber-slacking) has become a pervasive problem for employers. When employees abuse the Internet through activities like online gaming, online shopping, personal investment managing, personal emailing, chatting, media watching and viewing pornography, they waste work time and reduce available bandwidth. Existi...
Article
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
Article
Full-text available
Purpose The purpose of this research is to investigate the key determinants of the adoption of internet banking in Jordan. The paper also attempts to validate the appropriateness of the Unified Theory of Acceptance and Use of Technology (UTAUT) within the context of internet banking. Design/methodology/approach A questionnaire was developed based...
Article
This research is an investigation into IS project management practices related to projects of varying size across diverse industries. Survey data on a broad range of project management issues was collected from 129 IS project managers. The relationships between project size with 13 project management practices and 3 project performance measures wer...
Conference Paper
Prior IS research demonstrates that computer playfulness, personal innovativeness and cognitive absorption during technology use lead to a number of positive behavioral and affective outcomes. While early studies have warned that these individual traits and psychological states can lead to certain negative effects, little IS research has empiricall...
Article
Full-text available
Previous studies have identified the difficulty of communicating in virtual teams. The lack of media richness, or opportunity for using non-verbal cues, leads to misunderstood communications and may limit the development of trust. Studies have also shown that males and females are so- cialized to communicate differently. Males use communication in...
Article
The importance of Web site usability is apparent. Previous studies have found that a usable Web site creates a positive attitude toward online stores, increases stickiness and revisit rates, and eventually stimulates online purchases. A usable Web site also provides benefits to e-business by reducing website development, support, and maintenance co...
Conference Paper
Full-text available
As technology improves, more teams are meeting virtually. In this study, we analyze how individual levels of trust, cohesion, output, outcome satisfaction, and process satisfaction differ in virtual and face-to-face teams completing different tasks. A controlled experiment in which business students were randomly assigned to either a virtual or fac...
Article
Full-text available
While studies of information systems (IS) project management are plentiful, few studies have investigated how the tools and techniques used in project management differ for varying types of organizations. In this study we surveyed members of the Project Management Institute who work as IS project managers in a variety of different organizations bot...
Chapter
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
Article
Full-text available
An examination of the services offered by application service providers (ASPs) indicates that their current service quality needs to be improved to satisfy current and future clients. This study attempted to fulfill this need by identifying the dimensions of service quality for the ASP industry through both qualitative and quantitative approaches....
Article
Full-text available
The study of technology adoption has received considerable attention from researchers in the IS community in recent years. With the increased use of the Internet and the World Wide Web, business organizations have taken advantage of the potential benefits that e-commerce can provide. However, a significant number of small and medium sized businesse...
Article
Full-text available
Recently, the subject of research relevancy has received a great deal of attention in the IS academic press. Several leading academic journals, such as MIS Quarterly, Information Systems Research, and Information Resources Management Journal have devoted special issues and/or articles to this topic. Typically, these articles have been opinion piece...
Conference Paper
Full-text available
The 2004 U.S. Presidential election has tapped into the online medium to reach the growing demographic of online citizens. In the Democratic Party's primary season, the Howard Dean campaign organization proved to be phenomenally successful at incorporating the online medium into its fundraising and grassroots mobilization, going beyond the online o...
Article
Full-text available
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
Conference Paper
The current research is an exploratory investigation into current IS project management practices related to projects of varying size and complexity across diverse industries Survey data on a broad range of project management issues was collected from 129 IS project managers. The relationships between project size and complexity with 13 project man...
Article
Full-text available
By combining two independent research streams, we examined the determinant factors of strategic value and adoption of electronic commerce as perceived by top managers in small and medium sized enterprises (SME) in the midwest region of the US. We proposed a research model that suggested three factors that have been found to be influential in previo...
Article
China's acceptance into the World Trade Organization has provided the opportunity for Western organizations to enter the Chinese market. One of the most promising areas that has attracted a great deal of attention is the Chinese E-commerce market. Public use of the Internet in China has dramatically increased in the last few years. Businesses consi...
Article
This chapter reviews the current research in strategic value and adoption of e-Commerce. It suggests future research areas and presents a theoretical framework that explains the factors associated with the perception of strategic value of e-Commerce and the e-Commerce adoption as well as the relationship between these two. The aim of the chapter is...
Article
Many perspectives of user acceptance of Web sites have been examined, yet information systems research often overlooks the human-computer interaction aspects, particularly in the area of Web site usability. Web site usability has recently gained greater acceptance in information literature through the development of instruments by Palmer (2002) and...
Chapter
Full-text available
IT-based business initiatives, such as ERP and BPR, require high computer self-efficacy among employees because such changes require large-scale use of computers. Computer self-efficacy is affected by many internal and external factors; for instance, personality or organizational culture. While extensive literature exists on how psychological and s...
Chapter
IT-based business initiatives, such as ERP and BPR, require high computer self-efficacy among employees because such changes require large-scale use of computers. Computer self-efficacy is affected by many internal and external factors; for instance, personality or organizational culture. While extensive literature exists on how psychological and s...
Article
IT-based business initiatives, such as ERP and BPR, require high computer self-efficacy among employees because these changes require a large-scale use of computers. Computer self-efficacy is affected by many internal and external factors, for instance, personality, organizational culture, etc. While extensive literature exists on how psychological...
Conference Paper
Full-text available
By combining two independent research streams, we examine the strategic value and adoption of electronic commerce (e-commerce) as perceived by top managers in small and medium sized enterprises (SME). We propose a research model that posits three factors that have been found to be influential in previous research in the perception of strategic valu...
Article
The study of trust in the context of technology adoption is one of initial trust formation. Due to the lack of complete information, an individual must make a 'leap of faith' when committing to the new technology. This leap of faith is trust. This study uses institution-based trust theory to link the characteristics of a new technology to the trust...
Article
By combining two independent research streams, we examine the strategic value and adoption of electronic commerce (e-commerce) as perceived by top managers in small and medium sized enterprises (SME). We propose a research model that posits three factors that have been found to be influential in previous research in the perception of strategic valu...
Article
Full-text available
When the Internet started to establish itself in the corpo-rate world, some observers foresaw a diminishing role for, if not the end to, many intermediary functions. Consequently it has been argued that suppliers will need to use the Internet and related technologies to cut costs and establish closer links with consumers by bypassing organiza-tions...
Conference Paper
Full-text available
Computers provide increased capability for employees to better utilize information. However, these technologies will not provide the expected benefits unless end users utilize these technologies. In this study, we tested the relationship between Computer Self-Efficacy (CSE) and End-User Computing Satisfaction (EUCS). In addition, we investigated th...
Article
Organizations have spent a great deal of capital and human resources on information technology. The expectation is that these expenditures will result in increased efficiency, productivity, and other long-term benefits to the organization. It has been suggested that organization culture can have a significant impact on achieving these organizationa...
Article
This article focuses on the psychometric stability of the end-user computing satisfaction (EUCS) instrument by Doll and Torkzadeh when applied to Taiwanese end-users of typical business software applications. Using a survey of 342 users, this research provides evidence that the instrument is a valid and reliable measure in Taiwanese applications. G...
Article
Full-text available
Due to the sensitive nature of and value associated with the different types of information required by today's managers, organizations must insist the accuracy of information provided by their computer-based systems. Unfortunately, recent cases involving software piracy, data theft, system espionage and employee monitoring have emphasized the unet...
Article
Using a simulation-based decision modeling technique, this study investigated two components of ethical decision making: the relative importance of six ethical criteria; and the information systems (IS) professional's ability to determine the importance the six ethical criteria in their decision-making process. This was accomplished via a questionn...
Article
The results of an empirical survey of information systems (IS) managers indicated that 41% understood the basic philosophy of Total Quality Management (TQM) fairly well. Furthermore, the IS managers typically indicated they thought most of the concepts/tools commonly associated with TQM would be useful to both the organization and the IS function....
Article
In order to insure that a decision support system meets the needs of the user, it is necessary to understand the environment in which the DSS operates and the factors that make up the environment. This research identifies specific DSS structures and their relationship with key environmental factors. Five specific DSS structures were identified and...
Article
The capabilities provided by decision support systems (DSS) can have a significant impact on the usefulness and satisfaction provided by a DSS. A questionnaire was sent to nonacademic members of the Institute of Management Sciences in an effort to identify characteristics and capabilities common to DSS. Analysis indicated that five different catego...
Article
Full-text available
Online reviews have been studied intensively as they have a powerful impact on online consumers' purchase decisions. Very little attention, however, has been paid to an online consumer's perceptions of online review configurations. Thus, the main purpose of this study is to examine how an online consumer's online purchase decision is affected by di...

Network

Cited By