Dmitriy V. Chulkov, Ph.D.

Affiliations: 
2004 Purdue University, West Lafayette, IN, United States 
Area:
General Economics, General Business Administration, Management Business Administration
Google:
"Dmitriy Chulkov"

Parents

Sign in to add mentor
John M. Barron grad student 2004 Purdue
 (Economic studies in project escalation and project selection.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Chulkov DV, Barron JM. (2023) Incentive pay sensitivity to firm performance prior to anticipated CEO turnover. Heliyon. 9: e22163
Chulkov DV, Barron JM. (2019) Turnover in top management and de-escalation of commitment Applied Economics. 51: 2534-2551
Chulkov DV. (2017) On the Role of Switching Costs and Decision Reversibility in Information Technology Adoption and Investment Journal of Information Systems and Technology Management. 14: 309-321
Chulkov D. (2014) Innovation in centralized organizations: examining evidence from Soviet Russia Journal of Economic Studies. 41: 123-139
Chulkov D, VanAlstine J. (2014) The impact of multiple textbook format availability in business education Journal of Applied Research in Higher Education. 6: 176-186
Chulkov DV. (2012) Managing new technology investment for underwater security of ports Journal of Transportation Security. 5: 95-105
Chulkov DV. (2011) Rational Escalation: The Real Option Perspective Journal of Business & Economics Research. 5
Barron JM, Chulkov DV, Waddell GR. (2011) Top management team turnover, CEO succession type, and strategic change Journal of Business Research. 64: 904-910
Chulkov DV, Desai MS. (2008) Escalation and premature termination in MIS projects: The role of real options Information Management and Computer Security. 16: 324-335
Chulkov DV, Desai MS. (2005) Information technology project failures. Applying the bandit problem to evaluate managerial decision making Information Management and Computer Security. 13: 135-143
See more...