Browse Definitions :
Definition

digital profiling

Digital profiling is the process of gathering and analyzing information about an individual that exists online. A digital profile can include information about personal characteristics, behaviors, affiliations, connections and interactions. Digital profiling is used in marketing, enterprise security, criminal justice and recruitment, among other areas.

In enterprise security, digital profiling is used to identify suspect employees and protect the organization from an insider threat. An employee may be singled out because of suspicious behavior. To determine whether he really poses a risk to the company, his online behavior may be scrutinized a digital profile assembled. In a low-profile case, information would typically be gathered through corporate email, logs and social media content, connections and posts. In a more high-profile case, investigators might employ surveillance technologies for a more complex profile of the individual.

In criminal justice, digital profiling is used to identify suspected criminals and people of interest. Law enforcement officials work with forensic psychologists and combine a digital profile with other information that is known about a given individual.

In human resources (HR), recruiters and hiring managers use digital profiling to find and assess potential employees. In combination with traditional employee vetting using resumes and interviews, potential hires are evaluated based on their digital profiles, or online footprints. Recruiters may use social media sites for professionals like LinkedIn, where users can create profiles that will be appealing to potential employers. Social media activity can add to a candidate's digital profile both positively and negatively, as social media analytics become a larger part of recruiting efforts by employers.

This was last updated in August 2017

Continue Reading About digital profiling

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close