
J. Michael PearsonSouthern Illinois University Carbondale | SIU · Department of Management
J. Michael Pearson
DBA
About
88
Publications
89,965
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,521
Citations
Introduction
Additional affiliations
August 1991 - June 1996
Publications
Publications (88)
This article explores the relationship between culture and cyberloafing. A survey measuring individuals’ propensity to engage in cyberloafing in the workplace was conducted with people from 17 countries representing a wide range of cultures. Tests were performed to explore relationships between participants’ propensity to cyberloaf and the cultural...
Cyberloafing is an issue of growing concern for contemporary organizations. This paper develops an integrated research model which combines the Theory of Interpersonal Behavior and Organizational Justice to provide a holistic examination for cyberloafing behavior. Data was collected from working respondents via on-line questionnaire to test the res...
Cyberloafing is an issue of growing concern for contemporary organizations. This paper develops an integrated research model which combines the Theory of Interpersonal Behavior and Organizational Justice to provide a holistic examination for cyberloafing behavior. Data was collected from working respondents via on-line questionnaire to test the res...
Abstract
Although there has been much empirical attention on studying groups and ones intention to adopt new
technology, almost no research has focused on how this adoption is influenced by the collective nature of
the implementation. The purpose of this study was to study an important contextual factor, whether group
versus individual adoption of...
Cyberloafing has become a pervasive problem for many organizations and some researchers have suggested that a deterrence approach utilizing acceptable use policies for Internet-based applications coupled with mechanisms designed to monitor employee Internet usage and detect unauthorized usage can be an effective way to reduce it. However, the resul...
Online reviews have been studied extensively because of their impact on online consumers’ purchase decisions. Little attention, however, has been paid to consumers’ perceptions of online review configurations. This study examines how a consumer's purchase decision is affected by online review configurations. Additionally, researchers analyze whethe...
As firms increasingly sanction an open sourcing strategy, the question of which open source project to undertake remains tentative. The lack of established metrics makes it difficult to formulate such strategy. While many projects have been formed and created, only a few managed to remain active. With the majority of these projects failing, firms n...
Purpose ‐ Previous research has found that information technology (IT) professionals exhibit significantly lower organizational citizenship behaviour (OCB) than non-IT professionals. Thus, the purpose of this paper is to examine how an IT professional's job stress, trust, and commitment affect the valence of job satisfaction, which in turn influenc...
This paper explores how social relationships between new accounting faculty members and their former dissertation chairs can influence the publishing productivity of the new faculty members in their early academic careers. The focus on social relationships offers a unique approach to studying the effectiveness doctoral education. Our findings show...
Software piracy continues to be a growing problem on a global scale for software developers. The purpose of this study was to conduct a cross-cultural comparison of a model predicting the intent of individuals to pirate software using two sub samples: Jordan and the US. Our results suggest that the Theory of Reasoned Action provides a strong predic...
This study builds upon previous research by comparing and contrasting the decision to adopt wireless technologies with the decision to continue to use wireless technologies. In the context of web-enabled cell phones, we propose, test and compare the predictive ability of two value-based models using a multi-group analysis. The findings suggest that...
Organizational citizenship behavior (OCB) has been suggested to facilitate organizational functioning. However, previous research has found that information technology (IT) professionals exhibit significantly lower OCB than non-IT professionals. To explain this phenomenon, this research includes demographic variables including age, gender, and tenu...
This paper analyses the role of website usability in a B2C electronic commerce environment. The authors identify dimensions of website usability that have been examined in the literature and integrate those usability dimensions within an electronic commerce acceptance model using an e-commerce simulation. Structural equation modelling was used to a...
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon.
According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized
copies. Software piracy behavior has been investigated for more than 30years. However, after a...
Online review, an important form of reputation systems, has been studied intensively because of its powerful impact on online retailers, intermediaries, and customers. However, to date, very little attention has been paid to factors that influence an individual’s intention to provide an online review. An extended theory of planned behavior and Big-...
The innovation diffusion theory (IDT) could be considered as one of the earliest theories that attempts to explore factors that influence an individual to adopt an innovation or a new technology. The theory suggests five key beliefs that influence the adoption of any innovation: relative advantage, complexity, compatibility, trialability, and obser...
Organisations and individuals release source code on the Web to improve their software by attracting peers in the strategic move of " opensourcing" that has created thousands of open source projects (e.g., Eclipse-IBM, Thunderbird-Mozilla and Linux-Torvalds). Nevertheless, most of these projects fail to attract people and never become active. To mi...
As the use of the Internet has grown, so have new ways for employees to loaf. Cyberloafing has become a pervasive problem for firms. Information systems researchers have suggested that a deterrence approach through the use of acceptable use policies for Internet-based applications coupled with Internet monitoring mechanisms can be an effective way...
Social influence is an important factor in guiding individual behavior, including purchase decisions. The online gaming industry has demonstrated itself to be one of the most successful business sectors to integrate the Internet into its business models. The purpose of the study is to investigate the influence an individual's social environment has...
Internet banking in Jordan has developed rapidly since the year 2001, as most Jordanian banks have adopted some form of Internet usage and launched websites to serve their customers. This study extends the Unified Theory of Acceptance and Use of Technology (UTAUT) by adding perceived facilitating conditions and personality dimensions, two factors t...
This article develops a theoretical model that suggests that differential levels of uncertainty, knowledge relatedness, and richness of information will have a substantial impact on the decision to engage in entrepreneurship. Effects of the individual differences fear of failure and general self-efficacy are also considered. Using a metric conjoint...
Internet banking is booming in Jordan and it is time for banks and customers to reap the benefits from such technology. Bank customers' propensity to use internet banking is dependent on their attitudes towards such technology. This work validates an Arabic technology acceptance instrument through a rigorous process so that banks can better underst...
This study used a B2C e-commerce simulation in an effort to validate two Web site usability instruments. The results of the confirmatory factor analysis found the first instrument exhibited moderately acceptable measurement properties, while the second instrument displayed poor validity for the suggested dimensions. Attempted validation of these in...
E-commerce has become an important medium of exchange. Two related issues that face e-merchants are increased competition and trust development. The relationship between the vendor and the customer is an important and complex issue, especially in e-commerce settings. Many researchers have studied the issues related to e-relationships. This paper in...
Innovation with information technology (IT) helps companies gain more from their IT investment. IT innovation by individuals can be affected by many factors (such as overload, autonomy, and work / family conflict) and developing a better understanding of these factors can help managers make better decisions about the work environment. Using Partial...
Innovation with information technology (IT) helps companies gain more from their IT investment. IT innovation by individuals can be affected by many factors (such as overload, autonomy, and work / family conflict) and developing a better understanding of these factors can help managers make better decisions about the work environment. Using Partial...
Organizations have been faced with social/economic pressure to utilize IT and to facilitate communication via technological modes. The communications that are dependent on media richness are affected by individual user characteristics. The individual users who participate in group projects must communicate and ultimately can have different performa...
The theory of reasoned action originally introduced in the field of Social Psychology has been widely used to explain individuals’ behaviour. The theory postulates that individuals’ behaviour is influenced by their attitude and subjective norm. The purpose of this study was to determine factors that influence an individual’s intention to use a tech...
Purpose
As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and developed many different information security standards and guidelines. Building on these previous efforts, the purpose of this study is to put forth a framework for...
IT managers in global firms often rely on user evaluations to guide their decision-making in adopting, implementing, and monitoring the effectiveness of enterprise systems across national cultures. In these decisions, managers need instruments that provide valid comparisons across cultures. Using samples representing five nations/world regions incl...
Organizations are investing significant amounts of resources in both internal and external web-based applications. Many of these applications must be used by either employees of the organization or by e-customers of the organization. One of the key components of any web-based application is its interface, and a key criteria in utilization of these...
In this study, we extend the decomposed theory of planned behavior (DTPB) by incorporating trust and examining its impact on an individual's intention to adopt Internet banking. A majority of the technology adoption research has been completed in developed countries such as the U.S. Overall, the results indicate that the proposed model provides a g...
IT departments are service providers to business users, and service quality has been proposed as one measure of IT effectiveness. Previous research has adapted the SERVQUAL scale from service marketing literature, using it to gauge business users' expected and perceived levels of IT service quality. In this research, we investigate the other side o...
To further our understanding about how to control Internet abuse in the workplace, this study examines how a person's level of self-control leads to cyber-slacking, how deterrence measures commonly used within organizations impact individual decisions to cyber-slack, and how self-control moderates the relative salience of one of the commonly used d...
This exploratory study examines the importance of mentor/mentee relationships on faculty development by measuring how social exchange between new faculty members (mentees) in information systems and their former dissertation chairs (mentors) relate to how quickly the new faculty members completed their doctoral program and the number of peer review...
Few studies have explicitly focused on risky group decision making in information sharing or examined the manifestation of communication differences in face-to-face (FTF) and computer-mediated communication (CMC) teams. Hypothesizing that information-sharing behaviors could be influenced not only by contextual forces but also by personality and tru...
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
The theory of reasoned action originally introduced in the field of Social Psychology has been widely used to explain individuals' behaviour. The theory postulates that individuals' behaviour is influenced by their attitude and subjective norm. The purpose of this study was to determine factors that influence an individual's intention to use a tech...
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
This paper examines the unique social network ties, or 'tech ties' as we call them, that are created through the use of social software (i.e., blogs, instant messaging, meetup.com). The paper discusses how tech ties: a new means for developing social networks; just as effective as non-tech ties in supporting an individual's social network; valuable...
Purpose
This research aims to investigate the relative importance of five key criteria in assessing web usability. These criteria are navigation, download speed, personalization, ease of use, and accessibility. It is believed that these factors play a significant role in assessing web usability.
Design/methodology/approach
This study utilized a sc...
Internet abuse in the workplace (a.k.a. cyber-slacking) has become a pervasive problem for employers. When employees abuse the Internet through activities like online gaming, online shopping, personal investment managing, personal emailing, chatting, media watching and viewing pornography, they waste work time and reduce available bandwidth. Existi...
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
Purpose
The purpose of this research is to investigate the key determinants of the adoption of internet banking in Jordan. The paper also attempts to validate the appropriateness of the Unified Theory of Acceptance and Use of Technology (UTAUT) within the context of internet banking.
Design/methodology/approach
A questionnaire was developed based...
This research is an investigation into IS project management practices related to projects of varying size across diverse industries. Survey data on a broad range of project management issues was collected from 129 IS project managers. The relationships between project size with 13 project management practices and 3 project performance measures wer...
Prior IS research demonstrates that computer playfulness, personal innovativeness and cognitive absorption during technology use lead to a number of positive behavioral and affective outcomes. While early studies have warned that these individual traits and psychological states can lead to certain negative effects, little IS research has empiricall...
Previous studies have identified the difficulty of communicating in virtual teams. The lack of media richness, or opportunity for using non-verbal cues, leads to misunderstood communications and may limit the development of trust. Studies have also shown that males and females are so- cialized to communicate differently. Males use communication in...
The importance of Web site usability is apparent. Previous studies have found that a usable Web site creates a positive attitude toward online stores, increases stickiness and revisit rates, and eventually stimulates online purchases. A usable Web site also provides benefits to e-business by reducing website development, support, and maintenance co...
As technology improves, more teams are meeting virtually. In this study, we analyze how individual levels of trust, cohesion, output, outcome satisfaction, and process satisfaction differ in virtual and face-to-face teams completing different tasks. A controlled experiment in which business students were randomly assigned to either a virtual or fac...
While studies of information systems (IS) project management are plentiful, few studies have investigated how the tools and techniques used in project management differ for varying types of organizations. In this study we surveyed members of the Project Management Institute who work as IS project managers in a variety of different organizations bot...
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
An examination of the services offered by application service providers (ASPs) indicates that their current service quality needs to be improved to satisfy current and future clients. This study attempted to fulfill this need by identifying the dimensions of service quality for the ASP industry through both qualitative and quantitative approaches....
The study of technology adoption has received considerable attention from researchers in the IS community in recent years. With the increased use of the Internet and the World Wide Web, business organizations have taken advantage of the potential benefits that e-commerce can provide. However, a significant number of small and medium sized businesse...
Recently, the subject of research relevancy has received a great deal of attention in the IS academic press. Several leading academic journals, such as MIS Quarterly, Information Systems Research, and Information Resources Management Journal have devoted special issues and/or articles to this topic. Typically, these articles have been opinion piece...
The 2004 U.S. Presidential election has tapped into the online medium to reach the growing demographic of online citizens. In the Democratic Party's primary season, the Howard Dean campaign organization proved to be phenomenally successful at incorporating the online medium into its fundraising and grassroots mobilization, going beyond the online o...
As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and gender, and any moderating impact anxiety, enjoyme...
The current research is an exploratory investigation into current IS project management practices related to projects of varying size and complexity across diverse industries Survey data on a broad range of project management issues was collected from 129 IS project managers. The relationships between project size and complexity with 13 project man...
By combining two independent research streams, we examined the determinant factors of strategic value and adoption of electronic commerce as perceived by top managers in small and medium sized enterprises (SME) in the midwest region of the US. We proposed a research model that suggested three factors that have been found to be influential in previo...
China's acceptance into the World Trade Organization has provided the opportunity for Western organizations to enter the Chinese market. One of the most promising areas that has attracted a great deal of attention is the Chinese E-commerce market. Public use of the Internet in China has dramatically increased in the last few years. Businesses consi...
This chapter reviews the current research in strategic value and adoption of e-Commerce. It suggests future research areas and presents a theoretical framework that explains the factors associated with the perception of strategic value of e-Commerce and the e-Commerce adoption as well as the relationship between these two. The aim of the chapter is...
Many perspectives of user acceptance of Web sites have been examined, yet information systems research often overlooks the human-computer interaction aspects, particularly in the area of Web site usability. Web site usability has recently gained greater acceptance in information literature through the development of instruments by Palmer (2002) and...
IT-based business initiatives, such as ERP and BPR, require high computer self-efficacy among employees because such changes require large-scale use of computers. Computer self-efficacy is affected by many internal and external factors; for instance, personality or organizational culture. While extensive literature exists on how psychological and s...
IT-based business initiatives, such as ERP and BPR, require high computer self-efficacy among employees because such changes require large-scale use of computers. Computer self-efficacy is affected by many internal and external factors; for instance, personality or organizational culture. While extensive literature exists on how psychological and s...
IT-based business initiatives, such as ERP and BPR, require high computer self-efficacy among employees because these changes require a large-scale use of computers. Computer self-efficacy is affected by many internal and external factors, for instance, personality, organizational culture, etc. While extensive literature exists on how psychological...
By combining two independent research streams, we examine the strategic value and adoption of electronic commerce (e-commerce) as perceived by top managers in small and medium sized enterprises (SME). We propose a research model that posits three factors that have been found to be influential in previous research in the perception of strategic valu...
The study of trust in the context of technology adoption is one of initial trust formation. Due to the lack of complete information, an individual must make a 'leap of faith' when committing to the new technology. This leap of faith is trust. This study uses institution-based trust theory to link the characteristics of a new technology to the trust...
By combining two independent research streams, we examine the strategic value and adoption of electronic commerce (e-commerce) as perceived by top managers in small and medium sized enterprises (SME). We propose a research model that posits three factors that have been found to be influential in previous research in the perception of strategic valu...
When the Internet started to establish itself in the corpo-rate world, some observers foresaw a diminishing role for, if not the end to, many intermediary functions. Consequently it has been argued that suppliers will need to use the Internet and related technologies to cut costs and establish closer links with consumers by bypassing organiza-tions...
Computers provide increased capability for employees to better utilize information. However, these technologies will not provide the expected benefits unless end users utilize these technologies. In this study, we tested the relationship between Computer Self-Efficacy (CSE) and End-User Computing Satisfaction (EUCS). In addition, we investigated th...
Organizations have spent a great deal of capital and human resources on information technology. The expectation is that these expenditures will result in increased efficiency, productivity, and other long-term benefits to the organization. It has been suggested that organization culture can have a significant impact on achieving these organizationa...
This article focuses on the psychometric stability of the end-user computing satisfaction (EUCS) instrument by Doll and Torkzadeh when applied to Taiwanese end-users of typical business software applications. Using a survey of 342 users, this research provides evidence that the instrument is a valid and reliable measure in Taiwanese applications. G...
Due to the sensitive nature of and value associated with the different types of information required by today's managers, organizations must insist the accuracy of information provided by their computer-based systems. Unfortunately, recent cases involving software piracy, data theft, system espionage and employee monitoring have emphasized the unet...
Using a simulation-based decision modeling technique, this study investigated two components of ethical decision making: the relative importance of six ethical criteria; and the information systems (IS) professional's ability to determine the importance the six ethical criteria in their decision-making process. This was accomplished via a questionn...
The results of an empirical survey of information systems (IS) managers indicated that 41% understood the basic philosophy of Total Quality Management (TQM) fairly well. Furthermore, the IS managers typically indicated they thought most of the concepts/tools commonly associated with TQM would be useful to both the organization and the IS function....
In order to insure that a decision support system meets the needs of the user, it is necessary to understand the environment in which the DSS operates and the factors that make up the environment. This research identifies specific DSS structures and their relationship with key environmental factors. Five specific DSS structures were identified and...
The capabilities provided by decision support systems (DSS) can have a significant impact on the usefulness and satisfaction provided by a DSS. A questionnaire was sent to nonacademic members of the Institute of Management Sciences in an effort to identify characteristics and capabilities common to DSS. Analysis indicated that five different catego...
Online reviews have been studied intensively as they have a powerful impact on online consumers' purchase decisions. Very little attention, however, has been paid to an online consumer's perceptions of online review configurations. Thus, the main purpose of this study is to examine how an online consumer's online purchase decision is affected by di...