Browse Definitions :
Definition

digital profiling

Digital profiling is the process of gathering and analyzing information about an individual that exists online. A digital profile can include information about personal characteristics, behaviors, affiliations, connections and interactions. Digital profiling is used in marketing, enterprise security, criminal justice and recruitment, among other areas.

In enterprise security, digital profiling is used to identify suspect employees and protect the organization from an insider threat. An employee may be singled out because of suspicious behavior. To determine whether he really poses a risk to the company, his online behavior may be scrutinized a digital profile assembled. In a low-profile case, information would typically be gathered through corporate email, logs and social media content, connections and posts. In a more high-profile case, investigators might employ surveillance technologies for a more complex profile of the individual.

In criminal justice, digital profiling is used to identify suspected criminals and people of interest. Law enforcement officials work with forensic psychologists and combine a digital profile with other information that is known about a given individual.

In human resources (HR), recruiters and hiring managers use digital profiling to find and assess potential employees. In combination with traditional employee vetting using resumes and interviews, potential hires are evaluated based on their digital profiles, or online footprints. Recruiters may use social media sites for professionals like LinkedIn, where users can create profiles that will be appealing to potential employers. Social media activity can add to a candidate's digital profile both positively and negatively, as social media analytics become a larger part of recruiting efforts by employers.

This was last updated in August 2017

Continue Reading About digital profiling

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close