Multimedia Tools and Applications

, Volume 74, Issue 5, pp 1689–1696 | Cite as

Criminal profiling and industrial security

  • Chang-Moo LeeEmail author


Criminal profiling’ may provide an effective measure for industrial security. While criminal profiling has been frequently applied to support the prevention and investigation of crimes, particularly violent crimes, it has not been applied to industrial espionage. Criminal profiling such as behavioral and investigative data profiling could help to identify the criminals leaking the secrets. The application of criminal profiling may contribute to prevent and reduce industrial espionage. The purpose of this study is, therefore, to attempt to apply criminal profiling to industrial security and eventually prevent and control industrial espionage.


Criminal profiling Industrial security Information security Industrial espionage Investigation Investigative mining 


  1. 1.
    Alison L, Bennel C, Mokros A (2002) “The personality paradox in offender profiling: a theoretical review of the processes involved in deriving background characteristics from crime scene actions. Psychol Public Policy Law 8:115–135CrossRefGoogle Scholar
  2. 2.
    Bartol CR (2003) Criminal Behavior: a Psychosocial Approach, 6th edn. Upper Saddle River, New JerseyGoogle Scholar
  3. 3.
    Bumgarner JB (2004) Profiling and Criminal Justice in America. ABC-CLIO, Santa BarbaraGoogle Scholar
  4. 4.
    Davis BJ (2007) Crime Scene Science: Criminal Profiling, Milwaukee. World Almanac Library, WIGoogle Scholar
  5. 5.
    Douglas JE, Burgess AW, Burgess AG, Ressler RK (2006) Crime Classification Manual, 2nd edn. Jossey Press, San FranciscoGoogle Scholar
  6. 6.
    Girod RJ (2004) Profiling the Criminal Mind. iUniverse, New YorkGoogle Scholar
  7. 7.
    Hicks SJ, Sales BD (2006) Criminal Profiling: Developing and Effective Science and Practice. American Psychological Association, Washington, DCCrossRefGoogle Scholar
  8. 8.
    Holmes RM, Holmes ST (2002) Profiling Violent Crimes: An Investigative Tool, 3rd edn. Sage Publication, Thousand OaksGoogle Scholar
  9. 9.
    Mena J (2003) Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann, BostonGoogle Scholar
  10. 10.
    NIS (National Intelligence Service). (2009). Current Trends in High-Tech Industry Protection, Vol. 10Google Scholar
  11. 11.
    Park KB, Bae HC (2002) Micro- and Macro- utilities of criminal profiling for crime investigations and policy evaluation. Korean J Psychol 21(1):1–24MathSciNetGoogle Scholar
  12. 12.
    Pinzzotto AJ, Finkel NJ (1990) Criminal personality profiling: An outcome and process study. Law Hum Behav 14:215–233CrossRefGoogle Scholar
  13. 13.
    Rider A (1980) “The firesetter: a psychological profile. FBI Law Enforcement Bull 49(6):12–17Google Scholar
  14. 14.
    Seifert JW (2007) Data Mining and Homeland Security: An Overview. Congressional Research Service, Washington, DCGoogle Scholar
  15. 15.
    Turvey B (2005) Criminal Profiling: An Introduction to Behavioral Evidence Analysis, 2nd edn. Elsevier Academic Press, San DiegoGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Department of Police Administration (Criminal Justice)Hannam UniversityDaejeonSouth Korea

Personalised recommendations