Skip to main content

Advertisement

Log in

Abstract

Criminal profiling’ may provide an effective measure for industrial security. While criminal profiling has been frequently applied to support the prevention and investigation of crimes, particularly violent crimes, it has not been applied to industrial espionage. Criminal profiling such as behavioral and investigative data profiling could help to identify the criminals leaking the secrets. The application of criminal profiling may contribute to prevent and reduce industrial espionage. The purpose of this study is, therefore, to attempt to apply criminal profiling to industrial security and eventually prevent and control industrial espionage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

References

  1. Alison L, Bennel C, Mokros A (2002) “The personality paradox in offender profiling: a theoretical review of the processes involved in deriving background characteristics from crime scene actions. Psychol Public Policy Law 8:115–135

    Article  Google Scholar 

  2. Bartol CR (2003) Criminal Behavior: a Psychosocial Approach, 6th edn. Upper Saddle River, New Jersey

    Google Scholar 

  3. Bumgarner JB (2004) Profiling and Criminal Justice in America. ABC-CLIO, Santa Barbara

    Google Scholar 

  4. Davis BJ (2007) Crime Scene Science: Criminal Profiling, Milwaukee. World Almanac Library, WI

    Google Scholar 

  5. Douglas JE, Burgess AW, Burgess AG, Ressler RK (2006) Crime Classification Manual, 2nd edn. Jossey Press, San Francisco

    Google Scholar 

  6. Girod RJ (2004) Profiling the Criminal Mind. iUniverse, New York

    Google Scholar 

  7. Hicks SJ, Sales BD (2006) Criminal Profiling: Developing and Effective Science and Practice. American Psychological Association, Washington, DC

    Book  Google Scholar 

  8. Holmes RM, Holmes ST (2002) Profiling Violent Crimes: An Investigative Tool, 3rd edn. Sage Publication, Thousand Oaks

    Google Scholar 

  9. Mena J (2003) Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann, Boston

    Google Scholar 

  10. NIS (National Intelligence Service). (2009). Current Trends in High-Tech Industry Protection, Vol. 10

  11. Park KB, Bae HC (2002) Micro- and Macro- utilities of criminal profiling for crime investigations and policy evaluation. Korean J Psychol 21(1):1–24

    MathSciNet  Google Scholar 

  12. Pinzzotto AJ, Finkel NJ (1990) Criminal personality profiling: An outcome and process study. Law Hum Behav 14:215–233

    Article  Google Scholar 

  13. Rider A (1980) “The firesetter: a psychological profile. FBI Law Enforcement Bull 49(6):12–17

    Google Scholar 

  14. Seifert JW (2007) Data Mining and Homeland Security: An Overview. Congressional Research Service, Washington, DC

    Google Scholar 

  15. Turvey B (2005) Criminal Profiling: An Introduction to Behavioral Evidence Analysis, 2nd edn. Elsevier Academic Press, San Diego

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chang-Moo Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, CM. Criminal profiling and industrial security. Multimed Tools Appl 74, 1689–1696 (2015). https://doi.org/10.1007/s11042-014-2014-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2014-2

Keywords

Navigation