Meaning of profiling of cybercriminals in the security context

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Downloads (Pure)


In this article, the author analyzes the criminological aspects of profiling of cybercriminals. The development and trends of crime are affected by both the globalization process and the development of information technology. All over the world, crime, disorder and riots are causing more and more troubles and worries for people. Nowadays, cybercrime or criminal offenses committed in the Internet environment take a stable position in the overall mass of criminal offenses. Cyberspace is easy to use to harm an individual, a group of people, or a country as a whole. The role of profiling cybercriminals is determined by the tasks of law enforcement authorities. The profile of cybercriminal combines the personal traits of cybercriminal, behavioural patterns, and demographic data based on cybercrime characteristics.
Original languageEnglish
Title of host publicationSHS Web of Conferences
Subtitle of host publication7th International Interdisciplinary Scientific Conference SOCIETY. HEALTH. WELFARE
EditorsU. Berkis, L. Vilka
PublisherEDP Sciences
Number of pages15
ISBN (Print)978-2-7598-9081-1
Publication statusPublished - 25 Nov 2019
Event7th International Interdisciplinary Scientific Conference "Society. Health. Welfare": Contemporary Social Dynamics and Welfare: Urban and Rural Development Perspectives - Riga, Latvia
Duration: 10 Oct 201812 Oct 2018
Conference number: 7

Publication series

NameSHS Web of Conferences


Conference7th International Interdisciplinary Scientific Conference "Society. Health. Welfare"
Internet address


  • cybercrime,
  • criminality
  • cybercriminal
  • criminal profiling
  • profiling cybercriminal

Field of Science*

  • 5.5 Law

Publication Type*

  • 3.2. Articles or chapters in other proceedings other than those included in 3.1., with an ISBN or ISSN code


Dive into the research topics of 'Meaning of profiling of cybercriminals in the security context'. Together they form a unique fingerprint.

Cite this