Dr. Eric D. Shaw, Consulting and Clinical Psychology, Ltd.


Home • Clinical Practice • Consulting • Clinical Practice Policies • Credentials • Publications and Research • Contact Info


Publications and Research

Shaw, Eric and Stock, Harley (2011) “Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall,” Symantec Corporation, White Paper, December 7, available at http://investor.symantec.com/phoenix.zhtml?c=89422&p=irol-newsArticle   

Moore, A. Cappelli D., Caron, T., Shaw, E., Spooner, D. and  Trzeciak, R. (2011) A Preliminary Model of Insider Theft of Intellectual Property,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1.  

Shaw, E. (2011) “The Assessment of Anonymous Threats,” presented at the Police and Public Safety Section of the American Psychological Association’s Division 18 (Psychologist in Public Service) Mini-Conference, August 3, Silver Spring, Md. 

Shaw, E. “Critical Challenges in Insider Risk Mitigation and Behavioral Science/Organizational Assessment Opportunities,” White Paper and presentation at “Suspicious Behavior Detection and Insider Threats Conference,” Sponsored by the Human Factors/Behavioral Sciences Division, Science and Technology Directorate, U.S. Department of Homeland Security, Landsdowne, Virginia, September 23, 2009.

Moore, A.P., Cappelli, D.M., Caron, T.C. Shaw, E.D. and Trzeciak, R.F.(2009) Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model,” paper delivered at The First Workshop on Managing Insider Security Threats, Purdue University, June 15.  

Keynote Address Super Strategies 2008 The audit Best-Practices Conference, “Insider Fraud and Sabotage: How to Detect and Deter Crimes,” April 14, 2008.

Keynote Address, IT Security World Conference and Expo 2007, San Francisco, September 18th. "The Insider Threat: We Have Met the Enemy and He is Us."

With Paul Luehr, "High Tech Approaches to Computer Crime," at Secure 360, St. Paul, Minnesota, May 23, 2007.

Shaw, E.D. (2006) "The Role of Behavioral Research and Profiling in Malicious Cyber Insider Investigations," Digital Investigation, The International Journal of Digital Forensics and Incident Response, Vol. 3, pps. 20-31, Elsevier Publications, Exeter, UK.

Band, S., Cappelli, D., Fischer, L. Moore, A, Shaw, E. and Trezciek, R. (2006) Comparing Insider IT Sabotage and Espionage: A Model-Based Approach, Technical Report CMU/SEI-2006-TR-026, Software Engineering Institute, Carnegie Mellon.

Shaw, E.D. and Fischer, L. (2005) Ten Tales of Betrayal: An Analysis of Attacks on Corporate Infrastructure by Information Technology Insiders, Volume One, Monterrey, CA.: Defense Personnel Security Research and Education Center. FOUO

Shaw, E.D. (2004). "The insider threat: Can it be managed?" In Parker, T. (Ed.), Cyber Adversary Characterization: Auditing the Hacker Mind, June. Syngress Publications,Rockland, Mass.

Shaw, E.D., & Stroz, E. (2004). "WarmTouch software: Assessing Friend, Foe and Relationship." In Parker, T. (Ed.), Cyber Adversary Characterization: Auditing the Hacker Mind, June. Syngress Publications, Rockland, Mass.

Shaw, E.D. and Fischer, L. (2004) Ten Tales of Betrayal: Attacks on Corporate Infrastructure by Information Technology Insiders, Volume Two, Case Studies, Monterrey, CA.: Defense Personnel Security Research and Education Center. FOUO

Shaw, E.D. (2003). "Saddam Hussein: Political psychological profiling results relevant to his possession, use and possible transfer of weapons of mass destruction (WMD) to terrorist groups," Studies in Conflict and Terrorism, 26:347-364.

Shaw, E.(2001) "To Fire or Not to Fire," Information Security, January.

Post, J, Ruby, K and Shaw, E.(2001) "From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism," in Terrorism and Political Violence, 12.2.

Shaw, E., Post, J. and Ruby, K.(2000)"Managing the Insider Threat: The Personnel Security Audit," Information Security, July.

Shaw, E. Post, J. and Ruby, K.(1999) "Profiling the Dangerous IT Professional," Security Management, December.

Shaw, E.D. and Post, J.(1997) "Threats of Workplace Violence: The Role of the Mental Health Professional on the Law Enforcement and Security Team," The Police Chief, March.

Shaw, E.D.(1996) "Working with the Cultural Group Object," paper delivered at the 19th Annual Conference on Psychology of the Self, Washington, DC, October 20.

Shaw, E.D.(1994)"General Guidelines for Detecting and Managing Potentially Violent Employees," Presented at Preventing Violence in the Workplace, George Washington University National Satellite Downlink, October 18.

Kocsis, J. Shaw, E., et al. (1993) "Neuropsychological Effects of Lithium Discontinuation," Journal of Clinical Psychopharmacology, 13, 4:268-275.

Shaw, E.D. Katzman, K. and Pritchard, M.(1990) "The Use of the Public Comments of Saddam Husayn to Assess Iraqi Foreign Policy Intentions," McLean, VA: Defense Systems, Inc.

Shaw, E.D.(1990) "Najibullah's Trip to Moscow: Changes in Issue Positions, Political Orientation and Psychological State Before and After the Visit," McLean, Va.: Defense Systems, Inc. November.

Shaw, E.D. "Psychological Profiles of Leading Soviet Military Officials," Volumes 1-6, McLean, Va.: Defense Systems, Inc. 1990-1992.

Shaw, E.D., et. al. (1989) "The Use of the Public Comments of Mu'ammar Qadhafi to Predict Libyan Foreign Policy Behavior," McLean, Va.: Defense Systems Inc.

Shaw, E.D.and Van Melis-Wright, M. (1989) "A Guide to the Group Dynamics of Foreign Political Organizations and Terrorist Groups," McLean, Va.: Defense Systems, IInc.

Shaw, E.D. Mann, J.J., Stokes, P.E. and Mannevitz, A.Z.(1987) "Effects of Lithium Carbonate on the Memory and Motor Speed of Bipolar Outpatients," Journal of Abnormal Psychology, Vol. 96, No. 1.

Shaw, E.D.(1986) "The Political Terrorists: Dangers of Diagnosis and an Alternative to the Psychopathology Model," International Journal of Law and Psychiatry, 8, 3, 1986.

Shaw, E.D. Mann, J.J., Stokes, P.E. and Mannevitz, A.Z.(1986) "Effects of Lithium Carbonate on Associational Productivity and Quality in Bipolar Outpatients, Implications for Creativity," American Journal of Psychiatry, 143, 9:1166-1169.

Shaw, E.D. (1983) "Political Hostages: Sanction and the Recovery Process," in Freedman and Alexander (Eds.) Perspectives On Terrorism, Wilmington, DE: Scholarly Resources, Inc.

Hazlewood, L. and Shaw, E. (1977) "Research Gaps in the Crisis Management of Terrorist Incidents," Arlington, Va.: Policy Sciences Division, CACI, Inc.-Federal, September.


© Copyright 2009 by Eric D. Shaw, Ph.D.


Contact: DrShaw@DrEricShaw.com (E-mail is not secure. Please do not send private information.)  Phone 202-686-9150