Browse Definitions:
Definition

digital profiling

Contributor(s): Matthew Haughn

Digital profiling is the process of gathering and analyzing information about an individual that exists online. A digital profile can include information about personal characteristics, behaviors, affiliations, connections and interactions. Digital profiling is used in marketing, enterprise security, criminal justice and recruitment, among other areas.

In enterprise security, digital profiling is used to identify suspect employees and protect the organization from an insider threat. An employee may be singled out because of suspicious behavior. To determine whether he really poses a risk to the company, his online behavior may be scrutinized a digital profile assembled. In a low-profile case, information would typically be gathered through corporate email, logs and social media content, connections and posts. In a more high-profile case, investigators might employ surveillance technologies for a more complex profile of the individual.

In criminal justice, digital profiling is used to identify suspected criminals and people of interest. Law enforcement officials work with forensic psychologists and combine a digital profile with other information that is known about a given individual.

In human resources (HR), recruiters and hiring managers use digital profiling to find and assess potential employees. In combination with traditional employee vetting using resumes and interviews, potential hires are evaluated based on their digital profiles, or online footprints. Recruiters may use social media sites for professionals like LinkedIn, where users can create profiles that will be appealing to potential employers. Social media activity can add to a candidate's digital profile both positively and negatively, as social media analytics become a larger part of recruiting efforts by employers.

This was last updated in August 2017

Continue Reading About digital profiling

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • incident management plan (IMP)

    An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that ...

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

SearchStorage

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

Close