Shaw, Eric and
Stock, Harley (2011) “Behavioral Risk Indicators of Malicious
Insider Theft of Intellectual Property: Misreading the Writing on
the Wall,” Symantec Corporation, White Paper, December 7, available
Moore, A. Cappelli D., Caron, T., Shaw, E., Spooner,
D. and Trzeciak, R. (2011) “A
Preliminary Model of Insider Theft of Intellectual Property,”
Journal of Wireless Mobile Networks, Ubiquitous Computing, and
Dependable Applications, Vol. 2, No. 1.
Shaw, E. (2011) “The Assessment of
Anonymous Threats,” presented at the Police and Public Safety
Section of the American Psychological Association’s Division 18
(Psychologist in Public Service) Mini-Conference, August 3, Silver
Shaw, E. “Critical Challenges in
Insider Risk Mitigation and Behavioral Science/Organizational
Assessment Opportunities,” White Paper and presentation at
“Suspicious Behavior Detection and Insider Threats Conference,”
Sponsored by the Human Factors/Behavioral Sciences Division, Science
and Technology Directorate, U.S. Department of Homeland Security,
Landsdowne, Virginia, September 23, 2009.
Moore, A.P., Cappelli, D.M., Caron,
T.C. Shaw, E.D. and Trzeciak, R.F.(2009)
Theft of Intellectual Property for Business Advantage: A Preliminary
Model,” paper delivered at The First Workshop on Managing Insider
Security Threats, Purdue University, June 15.
Address Super Strategies 2008 The audit Best-Practices
Conference, “Insider Fraud and Sabotage: How to Detect and Deter
Crimes,” April 14, 2008.
Address, IT Security World Conference and Expo 2007, San Francisco,
September 18th. "The Insider Threat: We Have Met the Enemy and He is
With Paul Luehr, "High Tech Approaches to Computer Crime," at Secure
360, St. Paul, Minnesota, May 23, 2007.
Shaw, E.D. (2006) "The Role of Behavioral Research and Profiling in
Malicious Cyber Insider Investigations," Digital Investigation, The
International Journal of Digital Forensics and Incident Response,
Vol. 3, pps. 20-31, Elsevier Publications, Exeter, UK.
Band, S., Cappelli, D., Fischer, L. Moore, A, Shaw, E. and Trezciek,
R. (2006) Comparing Insider IT Sabotage and Espionage: A Model-Based
Approach, Technical Report CMU/SEI-2006-TR-026, Software Engineering
Institute, Carnegie Mellon.
Shaw, E.D. and Fischer, L. (2005) Ten Tales of Betrayal: An Analysis
of Attacks on Corporate Infrastructure by Information Technology
Insiders, Volume One, Monterrey, CA.: Defense Personnel Security
Research and Education Center. FOUO
Shaw, E.D. (2004). "The insider threat: Can it be managed?" In
Parker, T. (Ed.), Cyber Adversary Characterization: Auditing the
Hacker Mind, June. Syngress Publications,Rockland, Mass.
Shaw, E.D., & Stroz, E. (2004). "WarmTouch software: Assessing
Friend, Foe and Relationship." In Parker, T. (Ed.), Cyber Adversary
Characterization: Auditing the Hacker Mind, June. Syngress
Publications, Rockland, Mass.
Shaw, E.D. and Fischer, L. (2004) Ten Tales of Betrayal: Attacks on
Corporate Infrastructure by Information Technology Insiders, Volume
Two, Case Studies, Monterrey, CA.: Defense Personnel Security
Research and Education Center. FOUO
Shaw, E.D. (2003). "Saddam Hussein: Political psychological
profiling results relevant to his possession, use and possible
transfer of weapons of mass destruction (WMD) to terrorist groups,"
Studies in Conflict and Terrorism, 26:347-364.
Shaw, E.(2001) "To Fire or Not to Fire," Information Security,
Post, J, Ruby, K and Shaw, E.(2001) "From Car Bombs to Logic Bombs:
The Growing Threat from Information Terrorism," in Terrorism and
Political Violence, 12.2.
Shaw, E., Post, J. and Ruby, K.(2000)"Managing the Insider Threat:
The Personnel Security Audit," Information Security, July.
Shaw, E. Post, J. and Ruby, K.(1999) "Profiling the Dangerous IT
Professional," Security Management, December.
Shaw, E.D. and Post, J.(1997) "Threats of Workplace Violence: The
Role of the Mental Health Professional on the Law Enforcement and
Security Team," The Police Chief, March.
Shaw, E.D.(1996) "Working with the Cultural Group Object," paper
delivered at the 19th Annual Conference on Psychology of the Self,
Washington, DC, October 20.
Shaw, E.D.(1994)"General Guidelines for Detecting and Managing
Potentially Violent Employees," Presented at Preventing Violence in
the Workplace, George Washington University National Satellite
Downlink, October 18.
Kocsis, J. Shaw, E., et al. (1993) "Neuropsychological Effects of
Lithium Discontinuation," Journal of Clinical Psychopharmacology,
Shaw, E.D. Katzman, K. and Pritchard, M.(1990) "The Use of the
Public Comments of Saddam Husayn to Assess Iraqi Foreign Policy
Intentions," McLean, VA: Defense Systems, Inc.
Shaw, E.D.(1990) "Najibullah's Trip to Moscow: Changes in Issue
Positions, Political Orientation and Psychological State Before and
After the Visit," McLean, Va.: Defense Systems, Inc. November.
Shaw, E.D. "Psychological Profiles of Leading Soviet Military
Officials," Volumes 1-6, McLean, Va.: Defense Systems, Inc.
Shaw, E.D., et. al. (1989) "The Use of the Public Comments of
Mu'ammar Qadhafi to Predict Libyan Foreign Policy Behavior," McLean,
Va.: Defense Systems Inc.
Shaw, E.D.and Van Melis-Wright, M. (1989) "A Guide to the Group
Dynamics of Foreign Political Organizations and Terrorist Groups,"
McLean, Va.: Defense Systems, IInc.
Shaw, E.D. Mann, J.J., Stokes, P.E. and Mannevitz, A.Z.(1987)
"Effects of Lithium Carbonate on the Memory and Motor Speed of
Bipolar Outpatients," Journal of Abnormal Psychology, Vol. 96, No.
Shaw, E.D.(1986) "The Political Terrorists: Dangers of Diagnosis and
an Alternative to the Psychopathology Model," International Journal
of Law and Psychiatry, 8, 3, 1986.
Shaw, E.D. Mann, J.J., Stokes, P.E. and Mannevitz, A.Z.(1986)
"Effects of Lithium Carbonate on Associational Productivity and
Quality in Bipolar Outpatients, Implications for Creativity,"
American Journal of Psychiatry, 143, 9:1166-1169.
Shaw, E.D. (1983) "Political Hostages: Sanction and the Recovery
Process," in Freedman and Alexander (Eds.) Perspectives On
Terrorism, Wilmington, DE: Scholarly Resources, Inc.
Hazlewood, L. and Shaw, E. (1977) "Research Gaps in the Crisis
Management of Terrorist Incidents," Arlington, Va.: Policy Sciences
Division, CACI, Inc.-Federal, September.
© Copyright 2009 by
Eric D. Shaw, Ph.D.