search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Eric D. Shaw
Eric Shaw
Eric Shaw is an SEI alumni employee.
All
A Preliminary Model of Insider Theft of Intellectual Property
June 1, 2011
•
Technical Note
By
Andrew P. Moore
,
Dawn Cappelli
,
Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University)
,
Eric D. Shaw
,
Derrick Spooner
,
Randall F. Trzeciak
Insider Theft of Intellectual Property for Business Advantage: A Preliminary Model
July 20, 2009
•
White Paper
By
Andrew P. Moore
,
Dawn Cappelli
,
Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University)
,
Eric D. Shaw
,
Randall F. Trzeciak
Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
December 1, 2006
•
Technical Report
By
Stephen R. Band (Counterintelligence Field Activity - Behavioral Science Directorate)
,
Dawn Cappelli
,
Lynn F. Fischer
,
Andrew P. Moore
,
Eric D. Shaw
,
Randall F. Trzeciak
A Risk Mitigation Model: Lessons Learned From Actual Insider Sabotage
November 7, 2006
•
Presentation
By
Dawn Cappelli
,
Andrew P. Moore
,
Eric D. Shaw