Google+Tweet about this on TwitterShare on FacebookPin on PinterestShare on LinkedInshare on TumblrPrint this pageEmail to someone

Cyber Attack Risk Assessments

Internet Safety Tools

a-cyber-attack-risk-assessments-internet-trolls-cyber-harassment-online-harassment-cyberbullying-internet-safety-ipredator-image

Internet Safety Tool Overview

Cyber Attack Risk Assessments: In September 2011, Dr. Nuccitelli established iPredator Inc. offering the private & public sectors educational and advisory services regarding internet predators, cybercrime & digital forensic psychology. In Q3 2013, Dr. Nuccitelli and iPredator Inc. formally launched this optimized website offering site visitors an incredible amount of information, education, online risk assessments and advisory services on Internet Safety, Dangers of the Internet, Criminal & Forensic Psychology and his new theoretical construct he has termed iPredator. Concurrent with the iPredator Inc. website, Dr. Nuccitelli also regularly updates their Forensic & Criminal Psychology Blog, Dark Psychology, and their Internet Safety Blog, Dr. Internet Safety.

Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation to attorneys and court systems.

Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, digital forensic psychology, psychiatric & psychological disorders and developmental psychology. He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media.

As Chief Executive Officer, Dr. Nuccitelli became interested in the psychology and profiling of those who use Information and Communications Technology to abuse, steal, taunt and victimize others online in 2009. In 2012, Dr. Nuccitelli and his colleagues grew even more determined to develop victimization prevention & intervention strategies for vulnerable online users. Within their professional network, iPredator Inc. has contact with education, investigation, legal, law enforcement and information technology experts.

an-educators-internet-safety-checklist-abridged-internet-safety-tool-and-ipredator-image

Information Age Diagnostic, Investigation, Education, Screening & Interpersonal Discussion Tools designed to protect, prevent & prevail over iPredators. iPredator Inc.’s release of the 2013 iPredator Inc. Collection is the first step in their mission to slow the rapid growth of Information and Communications Technology (ICT) becoming the new dimension for unfettered malevolent and nefarious activities.

The Information Age is a societal paradigm and period beginning in the last quarter of the 20th century and presently thriving in the second decade of the 21st century. The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT). In a mere four decades, ICT and it’s importance to humanity have led many to surmise that the planet and its human inhabitants are amidst an Information Revolution.

Mobile device technology, telecommunications, social media & cyberspace are just a few examples of humanities newest frontiers. In all of these arenas, they deal with the new intrapersonal and interpersonal dynamics of how humankind obtains exchanges and disseminates information. As humanity is at the beginning of the Information Age and with no manner to forecast its longevity or impact, historians will one day look back upon our generation and define the 21st century as when Information and Communications Technology (ICT) had its origin.

Despite the incredible benefits to humanity, ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the sociopath, deviant, narcissist or classic criminal, but part of a new generation that will be permanent fixtures to humanity for centuries to follow. In order to effectively educate, evaluate, investigate or advise any ICT user on Internet safety, whether they are a child, adult, group or business, it is paramount to grasp the basic concepts and terms vital understanding the dark side of cyberspace.

The importance of ICT and the Internet to humankind is different to everyone and as unique as a fingerprint. For some, ICT and the Internet are nothing more than tools of convenience for conducting mundane tasks. For others, their social, scholastic, business and/or financial affairs disclosed online are crucial to their life functioning, self-esteem, self-worth, success and perceptual world.

ipredator-dr-internet-safety-tools-internet-safety-cyber-attack-risk-assessment

As ICT, social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. At present, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.

iPredator Inc. is a NYS based Information Age Forensics company (#TF-2989198) founded in to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and the new field they are pioneering called Information Age Forensics.

Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. The central theme to all iPredator Inc. products and services is Dr. Nuccitelli’s Information Age theoretical construct, iPredator. A brief description of iPredator is as follows:

ipredator-dr-internet-safety-tools-internet-safety-cyber-attack-risk-assessment

iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using ICT. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of Information and Communications Technology (ICT) to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

When an offender profile includes these three characteristics, they meet the definition of iPredator. A fourth criterion, not included in the triad defining an iPredator, is what has been termed iPredator Victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop a sense and/or skill of being able to experience an intuition to know what online user will be a successful target.

In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.

Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.

a cyberbullying facts-cyberbullying prevention education and ipredator image

Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of Information and Communications Technology, that humanity often fails to fathom leading some online users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT.) These benefits include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.

NOTE TO INTERNET SAFETY TOOL CONSUMERS

All iPredator Inc.’s internet safety tools are designed for diagnostics, data collection, investigation and education. Authored by Dr. Nuccitelli and a close group of fellow associates, over the course of 10 months and several thousand hours, each tool targets a specific group of online aggressors and targeted victims. Given the rapid growth of online assailants and as surprising as it may seem, these tools still stand alone as the only comprehensive, extensive and multi-functional assessments in the nation.

Although consumers must agree to a non-replication and commercial distribution license agreement, iPredator Inc. will work with, at no cost, assisting consumers in developing their own products and services commercial tools. iPredator Inc. is receptive to professional and organizational affiliations for the purposes of marketing and selling the IPI and IISC tools.

Interested parties who contact iPredator Inc., speak with Dr. Nuccitelli or an iPredator Inc. associate and confirm tool usage will not serve nefarious or deceptive endeavors may have their purchase(s) significantly discounted. Discounts [25%-50%] are always guaranteed if the consumer is actively engaged in helping to stop the growth of cyber aggression, deception and harm.

Please note that the IPI and IISC Collections were painstaking designed, but have not been validated via research methodology. Despite not being clinically confirmed as reliable and valid, iPredator Inc. is confident our tools are very effective. If verification is sought to those seeking to purchase a set of tools, iPredator Inc. can arrange contact with national forensic and educational organizations to verify their effectiveness.

Given iPredator Inc. is comprised of professionals, academics, community advocates, proactive citizens and information security professionals and not “retail or e-commerce savvy”, all revenue generation strategies, investment suggestions and seed funding opportunities are welcomed. Feel free to review, download and disseminate iPredator Inc.’s Executive Summary, Business Plan and Seed Funding Proposal by scrolling to the base of this site’s Executive Summary page to download the PDF files. Suggestions and interested parties are requested to call [347] 871-2416 or email iPredator founder, Dr. Nuccitelli at drnucc@ipredatorinc.com.

an-information-age-wellness-connect-the-disconnected-information-age-health-internet-safety-ipredator-image

IISC & IPI COLLECTION OVERVIEW

All of the iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools (13 Checklists & 1 Interview) are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) weaknesses. The IPI tools (12 Inventories) are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) vulnerabilities. The list of 26 tools is as follows:

After four years of extensive research and investigation into the criminological, forensic and psychological aspects of humanities interface with Information and Communications Technology (ICT), the IISC Collection is the first step in iPredator Inc.’s mission to stop nefarious, abusive and criminal online users from victimizing children and citizens of the global Internet community.

Dr. Nuccitelli and his colleagues seek to educate and protect ICT users against cyber bullies, cyber harassers, cyber stalkers, cyber criminals, cyber terrorist, Internet trolls, online sexual predators and those engaged in corporate disparagement and Internet defamation.

The IISC Collection are fourteen 75-330 statement checklists designed to verify a child, adult, or business’s ICT protection preparedness, ICT vulnerability and Internet prevention safety measures are effective (i.e. PISC, PCSC, TISC, AISC.)

To verify and confirm the preparedness, vulnerability and capacity to endure from iPredator attacks for children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools investigating the typologies of iPredator including: cyber bullying (target and offender), cyber stalking, cybercrime and online sexual predators (i.e. CBAC, CBTC, CSPC, OPPC, CCPC.)

To assess preparedness, prevention measures and the capacity to prevail from iPredator attacks on business’s regarding cybercrime, digital reputation, corporate disparagement and internet defamation issues, Dr. Nuccitelli developed data collection and diagnostic tools for corporate entities (i.e. BISC, DRPC.)

To compile data and educate students, clients or patients regarding their Internet protection preparedness, vulnerability, Internet safety prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic tools for educators and behavioral healthcare professionals (i.e. EISC, ISCP.)

CYBER HARASSMENT-ONLINE HARASSMENT-IPREDATOR-IMAGE

The IPI Collection is 12 inventories available to purchase the ownership license at iPredator Inc.’s website, www.iPredatorInc.com & at www.iPredator.co. These inventories examine the knowledge, awareness, vulnerability and risk potential of falling prey to a cyber-attack. Dr. Michael Nuccitelli, Chief Executive Officer of iPredator Inc., designed the IPI Assessment Collection and is a New York State licensed psychologist and certified forensic consultant. Unlike the iPredator Internet Safety Checklist Collection (IISC) available to purchase, the IPI Assessment Collection are 12 inventories that are 110-330 questions each and are specific to 11 of the 20 factors Dr. Nuccitelli created to define all iPredators.

cyberstealth-narcissism-deception-ipredator-dark-psychology-michael-nuccitelli-psyd

The 12 IPI Collection inventories are best used when assessing or evaluating an ICT user or business and when seeking to engage an ICT user in a dialogue about their online activities. The iPredator Checklist Collection (IISC) are similar in construct to the IPI Collection, but are more suited to data collection, investigation and education of ICT users, businesses and pursuit of potential assailants.

The IPI Collection is twelve 110-330 item four choice diagnostic inventories designed to assess and/or educate a child, adult, or business’s online protection preparedness, ICT vulnerability, Internet prevention safety measures, online user risk potential and activities, iPredator awareness and iPredator attacks for children, adolescents and adults (i.e. IPI-P, IPI-330, IPI-T, IPI-A.)

To assess and/or educate preparedness, vulnerability, Internet prevention safety measures and the capacity to prevail from iPredator attacks of children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools specific to the typologies of iPredator including: cyber bullying (target and offender,) cyber stalking, cybercrime and online sexual predators (i.e. IPI-CB, IPI-CBA, IPI-CS, IPI-C, IPI-IP.)

To assess and/or educate preparedness, prevention measures and the capacity to prevail from iPredator attacks on business regarding cybercrime, corporate disparagement and Internet libel issues, Dr. Nuccitelli developed a diagnostic tool for corporate entities. A brief description of this inventory is listed below (i.e. IPI-B.)

To assess, compile data and educate students, clients or patients regarding Internet protection preparedness, vulnerable risk potential, Internet safety prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic and educational tools for educators and behavioral healthcare professionals (i.e. IPI-E, IPI-PSY.)

cyber-psychology-internet-psychology-digital-forensics-ipredator-michael-nuccitelli

Note to Reader: Hundreds of hours went into the research and design of Dr. Nuccitelli’s iPredator construct, IISC & IPI Collection tools and all products & services offered by iPredator Inc. Regarding the IISC & IPI Collection, Dr. Nuccitelli specifically designed them for the primary purpose of being used as data collection and education tools. Although he spent an enormous amount of time in their creation and development and feels confident of their diagnostic capacities, he did not run them through clinical trials or validity examinations as commonly conducted with psychometric testing instruments.

Dr. Nuccitelli & iPredator Inc. do not falsely claim or advertise any of their checklists or inventories as being psychometric instruments with extensive reliability & validity verification analysis.

However, Dr. Nuccitelli is confident his checklists & inventories were thoroughly researched and created leading to useful tools used by information security organizations, educational systems, professionals, professional organizations and families. As he and all humanity are the first generation of the Information Age, Dr. Nuccitelli is also confident all his products & services will be amended, for years to come, as behavioral healthcare, law enforcement & the social sciences learn more about the impact iPredators have on the health of society. A brief definition of the 26 tools are presented in the following pages.

INTERNET SAFETY CHECKLIST COLLECTION

[BISC] Business Internet Safety Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Business Internet Safety Checklist

[BISC]

Business Internet Safety Checklist (BISC): The Business Internet Safety Checklist (BISC) is a 100-item checklist designed for a business to verify, upgrade or monitor their Information and Communications Technology (ICT) safety and security practices. The BISC is a data collection tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors. Related to cybercrime specific areas, the BISC focuses the business on their cyber-security breach potential, digital reputation acumen and capacity to institute internet safety and cyber security strategies.

With the rapid growth and expansion of Information and Communications Technology (ICT), all businesses will be required to allocate a portion of their operating budget to both cyber security and digital reputation management. It is recommended to complete the BISC on a quarterly basis if corporate competitors or internal employee sabotage are suspected of engaging in online disparagement and/or internet defamation to the online reputation or brand(s) of the business. The BISC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[CSII] Cyber Stalker Identification Interview-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Cyber Stalker Identification Interview

[CSII]

Cyber Stalker Identification Interview (CSII): The Cyber Stalker Identification Interview (CSII) is a 75 question diagnostic and data collection tool designed to achieve a three-fold purpose. The three functions include:

A. Assess the vulnerability and preparedness of a child, adolescent, adult, business or public figure of being cyber stalked and/or cyber harassed.

B. Assist law enforcement, legal professionals, parents, adults and businesses in collecting data on the identity of an unknown cyber stalker.

C. Assess the extent and skills of the cyber stalker’s tactics and the target’s Information and Communications Technology (ICT) weaknesses and high-risk behaviors the cyber stalker is attacking. For purposes of the target vulnerability estimate the CSII has been designed to investigate, the CSII combines aspects of cyber stalking, cyber harassment and cyberbullying if the target is a minor.

The CSII can also be used as a data collection template to present to authorities if a target is actively being cyberstalked. The CSII is particularly helpful to employees and consultants in charge of protecting public figures, celebrities and high profile groups at high risk for been cyber stalked given their public exposure. The CSII also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[TISC] Teen Internet Safety Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Teen Internet Safety Checklist

[TISC]

Teen Internet Safety Checklist (TISC): The Teen Internet Safety Checklist (TISC) is a 100-item education, assessment and data collection tool designed for teachers, educators and pediatric professionals related to pre-pubescent and adolescent Internet safety and responsible Information and Communications Technology (ICT) usage. The TISC is formatted in a manner allowing the adolescent, an adult or both parties to complete the checklist. The TISC queries and explores areas developmentally relevant to an early adolescent, adolescent and young adult, ages 11-21.

These areas include sexuality, intimate partnerships and perceived peer group acceptance in relationship to their internet safety practices. The goal of the TISC is to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyber stalking, cyber harassment, cyber bullying or trolling for a target to sexually victimize.

In addition to a data collection and educational tool, the TISC has been designed to allow teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children and teens on their Information and Communications Technology (ICT) practices. The factors most problematic to children and teens include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. The TISC investigates these areas problematic to all children and adolescents. The TISC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[CBTC] Cyber Bullying Target Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Cyber Bully Target Checklist

[CBTC]

Cyber Bully Target Checklist (CBTC): The Cyber Bully Target Checklist is a 75-item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent, adolescent or young adult’s vulnerability and risk potential of being targeted by a cyber bully. The CBTC queries and explores areas developmentally relevant to school aged children. The goal of the CBTC is to investigate & educate children on their vulnerability and risk potential of being targeted by a cyberbully engaged in teasing, taunting, harassment and disparagement of a target child using Information and Communications Technology (ICT).

In addition to an education, assessment and data collection tool, the CBTC has been designed to allow teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children on their Information and Communications Technology (ICT) practices.

The CBTC combines common factors causing children and young adults to be teased, harassed and targeted by others motivated by their need for peer acceptance and feelings of domination, power and control. The CBTC can also be used to educate children and classes of students on cyberbullying prevention and intervention. Furthermore, the CBTC is helpful educating children on bullying/cyber bullying bystander dynamics and cyberbullying abuser recognition skills building. The CBTC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[CBAC] Cyber Bullying Abuser Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Cyber Bullying Abuser Checklist

[CBAC]

Cyber Bully Abuser Checklist (CBAC): The Cyber Bully Abuser Checklist is a 75 item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent, adolescent or young adult’s vulnerability and risk potential of being a cyber bully and/or engaging in cyber victimization of others.

The CBAC queries and explores areas developmentally relevant to school aged children. The goal of the CBAC is to investigate & educate children on their vulnerability and risk potential of engaging in teasing, taunting, harassment and disparagement other children using Information and Communications Technology (ICT). In addition to an education, assessment and data collection tool, the CBAC has been designed to allow teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children on their Information and Communications Technology (ICT) practices.

The CBAC combines common factors causing children and young adults to tease, harass and target other children motivated by their need for peer acceptance and feelings of domination, power and control. The CBAC can also be used to educate children and classes of students on cyberbullying prevention and intervention. Furthermore, the CBAC is helpful educating children on bullying/cyber bullying bystander dynamics and cyberbullying target recognition skills building. The CBAC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[OPPC] Online Predator Prevention Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Online Predator Prevention Checklist

[OPPC]

Online Predator Prevention Checklist (OPPC): The Online Predator Prevention Checklist is a 100-item data collection & educational tool designed to educate and investigate a child, adolescent or young adult’s vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. The OPPC investigates areas developmentally relevant to a child and young adult, ages 11-21, which can increase their levels of vulnerability. These areas include sexuality, intimate partnerships, curiosity and motivation for peer group acceptance.

A parent, primary care giver, educator or pediatric professional completes the OPPC, or if developmentally appropriate, cane be completed in tandem with the subject child. In addition to being a data collection & educational tool, the OPPC can also be used as an adjunct to allow teachers, educators and pediatric professionals interview, collect data and engage in a dialogue with children on their Information and Communications Technology (ICT) practices.

The OPPC combines common factors causing children to be sexually solicited, harassed and targeted by online sexual predators. The factors most problematic for children the OPPC explores include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. Furthermore, the OPPC takes into consideration the reality that most pediatric sexual victimization occurs by offenders they are familiar with, close in age and often manipulated into consenting to sexual activities. The OPPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[DRPC] Digital Reputation Protection Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Digital Reputation Protection Checklist

[DRPC]

Digital Reputation Protection Checklist (DRPC): The Digital Reputation Protection Checklist is a 100-item checklist designed for an Information and Communications Technology user and/or their business to monitor, protect and manage their digital reputation. Digital Reputation (a.k.a. Online Reputation) is a term used to describe the reputation of an Information and Communications Technology user or business that is disseminated online, created and sustained by peers, school, work associates, loved ones, acquaintances, consumers, competitors, adversaries, online strangers and iPredators.

This information can be positive or negative and vital to the success, growth and health of an Information and Communications Technology user or business. The DRPC is a data collection & assessment tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors.

The DRPC focuses on the Information and Communications Technology user and the business’s cyber-security breach potential, digital reputation acumen and capacity to successfully institute online reputation prevention and protection strategies. With the rapid growth and expansion of Information and Communications Technology, all businesses, professionals, students and online users are now required to address both cyber security and digital reputation management. The DRPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[CCPC] Cyber Crime Protection Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Cyber Crime Protection Checklist

[CCPC]

Cyber Crime Protection Checklist (CCPC): The Cyber Crime Protection Checklist is a 100-item checklist designed for an Information and Communications Technology user, their loved ones or business to assess their vulnerability and risk potential of being targeted. The CCPC assesses the probability of being disparaged, stolen from or infiltrated by iPredators, cyber terrorist or nefarious corporate competitors engaged in cyber criminal and/or cyber warfare activities. The CCPC also investigates personal and/or corporate vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors. Areas examined in the CCPC include identity theft potential, personal and financial information protection, ICT safety, cyber security and security breach potential.

It is recommended to complete the CCPC on a quarterly basis and more frequently if known adversaries, corporate competitors or malevolent entities are suspected of engaging in possible cyber-attacks or personal/corporate disparagement. It is also strongly encouraged for businesses, professional & organizational structures and public figures to ensure their colleagues, associates and sub-contractors practice the same level of cybercrime protection. The CCPC also addresses the growth of mobile device technology and attempts by cyber criminals to infiltrate their target’s mobile devices.

[AISC] Adult Internet Safety Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator- Image

Adult Internet Safety Checklist

[AISC]

Adult Internet Safety Checklist (AISC): The Adult Internet Safety Checklist is a 100-item checklist designed for an adult Information and Communications Technology (ICT) user to verify, confirm and examine their ICT safety and security practices, online vulnerability, risk potential and cyber attack awareness. The AISC is also designed to investigate an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by iPredators based on their Information and Communications Technology (ICT) activities and level of cautious approach. As a data collection tool, the AISC can be used to investigate an adult Information and Communications Technology user’s efforts of reducing their probability of being targeted, disparaged, stolen from or infiltrated by cyber criminals, cyberstalkers, online sexual predators or those engaged in digital reputation disparagement.

The AISC enables the respondent to examine their online and ICT interactions in relationship to iPredators and the weaknesses they can focus upon to reduce the potential of successfully being cyber attacked. With the rapid growth and expansion of information technology, all Information and Communications Technology users are required to allocate time and effort employing cyber security and digital reputation tactics. The AISC also addresses the growth of mobile device technology and attempts by cyber criminals to infiltrate their target mobile devices.

[CSPC] Cyber Stalking Prevention Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Cyber Stalking Prevention Checklist

[CSPC]

Cyber Stalking Prevention Checklist (CSPC): The Cyber Stalking Prevention Checklist is a 100-item data collection, diagnostic and educational tool designed to validate and confirm the preparedness of an Information and Communications Technology user, business or organization of being cyberstalked and/or cyber harassed. The CSPC investigates personal and/or corporate vulnerability of being targeted, disparaged, harassed, monitored or infiltrated by cyber criminals, cyber terrorist, cyber stalkers, disgruntled ex-partners, disgruntled past employees/customers or nefarious corporate competitors.

Areas examined in the CSPC include online risk behaviors, identity theft potential, personal and financial information protection, ICT safety, cyber security and cyber stalking preparedness. An adult, business, public figure or associate of a public figure age 18+ completes the CSPC. For purposes of the cyberstalking preparedness the CSPC has been designed to investigate, this checklist combines aspects of cyber stalking, cyber harassment and cyber bullying if the subject queried is a minor.

The CSPC can also be used, as a data collection instrument to present to authorities if an Information and Communications Technology user is actively being cyber stalked or cyber harassed. The CSPC has been designed with the knowledge that cyberstalking is both a methodology used by assailants and a typology of offender who engages in the behavior of cyberstalking. The CSPC also addresses the growth of mobile device technology and attempts by cyber stalkers to infiltrate their target’s mobile devices.

[EISC] Educator’s Internet Safety Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Educator’s Internet Safety Checklist

[EISC]

Educator’s Internet Safety Checklist (EISC): The Educator’s Internet Safety Checklist is a 330- item data collection, diagnostic and informational tool for educators regarding a student’s preparedness and prevention of being cyber bullied, cyber harassed, cyber stalked, sexually solicited and/or victimized by iPredators. In addition to being a data collection tool and general educational template, the EISC can also be used as an adjunct to classroom projects, prevention education plans and educator training seminars on Internet safety. The EISC is designed for educators and educational institutions working with children, adolescents and young adults ages 9-21.

The goal of the EISC is to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment, cyber bullying or trolling for a target to sexually victimize. In addition to an educational tool, the EISC has been designed to allow teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children on their Information and Communications Technology (ICT) practices. The factors most problematic for children include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. The EISC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[PISC] Pediatric Internet Safety Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Pediatric Internet Safety Checklist

[PISC]

Pediatric Internet Safety Checklist (PISC): The Pediatric Internet Safety Checklist is a 100-item education, assessment and data collection tool designed for parents, educators and pediatric professionals on pre-pubescent and adolescent internet safety and responsible Information and Communications Technology (ICT) usage. The PISC queries and explores areas developmentally relevant to an early adolescent, adolescent and young adult, ages 11-21. The goal of the PISC is to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyber stalking, cyber harassment, cyberbullying or trolling for a target to sexually victimize.

In addition to an educational tool, the PISC has been designed to allow parents, teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children on their Information and Communications Technology (ICT) practices. The PISC combines common factors causing children to be cyber bullied, harassed and targeted by online sexual predators. The factors most problematic for children include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. The PISC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[ISCP] Internet Safety Checklist-Psychology-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

Internet Safety Checklist-Psychology

[ISCP]

Internet Safety Checklist Psychology (ISCP): The Internet Safety Checklist Psychology is a 330- item checklist data collection and diagnostic tool for psychiatrists, psychologists, social workers and behavioral healthcare professionals. The goal of the ISCP is to verify a child, adolescent or adult’s online preparedness and vulnerability of being cyber bullied, cyber stalked, sexually solicited, stolen from and/or victimized by iPredators. The ISCP can be used as an adjunct to individual and group therapy, prevention education training, an adjunct to intake assessments and behavioral healthcare training.

The ISCP is designed for children, adolescents and adults ages 11+. Given the rapid growth of Information and Communications Technology and social media, the ISCP is vital to behavioral healthcare professionals in their diagnosis, treatment and discharge planning of clients or patients seeking mental health and/or substance abuse treatment.

In addition to a data collection tool, the ISCP has been designed to allow behavioral healthcare professionals to engage in a dialogue with clients on their Information and Communications Technology (ICT) practices. The factors most problematic for Information and Communications Technology users involved with behavioral healthcare include inappropriate personal information disclosure, high-risk ICT behaviors, minimal iPredator awareness and psychiatric/psychological states that adversely affect their online activities. The ISPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

[PCSC] Parent Cyber Safety Checklist-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator- Image

Parent Cyber Safety Checklist

[PCSC]

Parent Cyber Safety Checklist (PCSC): The Parent Cyber Safety Checklist is a 330-item education, assessment and data collection checklist designed for parents and primary caregivers on pre-pubescent and adolescent Internet safety and responsible Information and Communications Technology (ICT) usage. The PCSC is constructed for parents and primary caregivers to verify and confirm their child’s internet safety and cyber security practices are valid in preventing a cyber-attack by an iPredator. The PCSC also helps to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyber stalking, cyber harassment, cyber bullying or trolling for a target to sexually victimize. In addition to an educational tool, the PCSC has been designed to allow parents, teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children on their Information and Communications Technology (ICT) practices.

The PCSC combines common factors causing children to be cyber bullied, harassed and targeted by online sexual predators. The factors most problematic for children include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. Based on a parent’s internet safety familial endeavors, the PCSC can also be used along with their child and the entire family during family discussions on cyber security. The ISPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

cyber-psychology-internet-psychology-digital-forensics-ipredator-michael-nuccitelli

IPI Assessment Collection

The IPI Assessment Collection is twelve 110-330 item four choice diagnostic inventories designed to assess and/or educate a child, adult, or business’s online protection preparedness, ICT vulnerability, Internet prevention safety measures, online user risk potential and activities, iPredator awareness and Predator attacks for children, adolescents and adults. A brief description of these inventories are listed below (IPI-P, IPI-330, IPI-T, IPI-A.)

To assess and/or educate preparedness, vulnerability, Internet prevention safety measures and the capacity to prevail from iPredator attacks of children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools specific to the typologies of iPredator including: cyber bullying (target and offender,) cyber stalking, cybercrime and online sexual predators. A brief description of these inventories are listed below (IPI-CB, IPI-CBA, IPI-CS, IPI-C, IPI-IP.)

To assess and/or educate preparedness, prevention measures and the capacity to prevail from iPredator attacks on business regarding cybercrime, corporate disparagement and Internet libel issues, Dr. Nuccitelli developed a diagnostic tool for corporate entities. A brief description of this inventory is listed below (IPI-B.)

To assess, compile data and educate students, clients or patients regarding Internet protection preparedness, vulnerable risk potential, internet safety prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic and educational tools for educators and behavioral healthcare professionals. A brief description of these inventories are listed below (IPI-E, IPI-PSY.)

iPredator Probability Inventory-Pediatric [IPI-P]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Pediatric

[IPI-P]

iPredator Probability Inventory-Pediatric (IPI-P): The iPredator Probability Inventory-Pediatric is a 110 question diagnostic, education, assessment and data collection tool designed to investigate a child, adolescent or young adult regarding their online victimization risk potential, cyber attack awareness and support system involvement. Just as all the IPI Assessment Collection inventories, the IPI-P focuses on the child’s relationship to Information and Communications Technology, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

A parent, family member or pediatric professional completes the IPI-P. Once completed, the IPI score ranging from 0-110 represents the child, adolescent or young adult’s preparedness, vulnerability and risk potential of being targeted by an iPredator engaged in cyber bullying, cybercrime, cyber stalking, cyber harassment or trolling for targets to sexually victimize.

The IPI-P investigates these areas problematic to all Information Age children and adolescents. The long-form version of the IPI-P is the IPI-330 and designed for those seeking an exhaustive diagnostic tool with additional elements. The IPI-P also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Teen [IPI-T]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Teen

[IPI-T]

iPredator Probability Inventory-Teen (IPI-T): The iPredator Probability Inventory-Teen is a 110 statement diagnostic, education, assessment and data collection tool designed to investigate an adolescent or young adult’s online preparedness, vulnerability and risk potential of being targeted by an iPredator. This diagnostic tool is similar to the IPI-P & IPI-330, but queries areas developmentally relevant to an adolescent or young adult involving sexuality, intimate partnerships and perceived peer group acceptance.

Just as all the IPI Assessment Collection inventories, the IPI-T focuses on the adolescent’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

The IPI-T is completed by an adolescent or young adult ages 13-21, but can also be used by adults and educators for educational and data collection purposes. Once completed, the IPI score, ranging from 0-110, represents their preparedness, vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyber stalking, cyber harassment, cyber bullying or trolling for a target to sexually victimize. The IPI-T investigates the areas problematic to all Information Age children and adolescents. Furthermore, the IPI-T also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Adult [IPI-A]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Adult

[IPI-A]

iPredator Probability Inventory-Adult (IPI-A): The iPredator Probability Inventory-Adult is a 110 question diagnostic, education, assessment and data collection tool designed to investigate an adult’s preparedness, vulnerability, risk potential and cyber attack awareness. The IPI-A is also designed to assess an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by iPredators based on their online activities and level of cautious approach.

Just as all the IPI Assessment Collection inventories, the IPI-A focuses on the adult’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked. The IPI-A is completed by an adult age 18+.

Once completed, the IPI score, ranging from 0-110, represents an adults vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyber stalking, cyber harassment or trolling for targets to sexually victimize. The IPI-A is also helpful to adults who are endeavoring to learn and institute effective Internet safety practices. For adults seeking to evaluate their preparedness and vulnerability of an iPredator attack, the IPI-A was constructed to address these areas. The IPI-A also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Cybercrime [IPI-C]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Cybercrime

[IPI-C]

iPredator Probability Inventory-Cybercrime (IPI-C): The iPredator Probability Inventory- Cybercrime is a 110 statement diagnostic, education, assessment and data collection tool designed to assess and investigate an adult or business’s probability of being targeted, disparaged, stolen from or infiltrated by iPredators or nefarious corporate competitors engaged in cyber criminal activities. An adult age 18+, business owner or corporate associate familiar with the business’s health and safety completes the IPI-C.

Just as all the IPI Assessment Collection inventories, the IPI-C focuses on the adult or business’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety, cybercrime prevention and preparedness if cyber attacked.

Once completed, the IPI score, ranging from 0-110, represents the vulnerability, preparedness and risk potential of the adult or business being targeted by an iPredator engaged in cybercrime. Areas focused on in the IPI-C include identity theft, personal and financial information protection, ICT safety and cyber security. In addition to a diagnostic and data collection tool, the IPI-C can also be used to assist an Information and Communications Technology user or a business to investigate their security breach weaknesses if they have been victimized by cybercrime. The IPI-C also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Cyber Stalking [IPI-CS]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Cyber Stalking

[IPI-CS]

iPredator Probability Inventory-Cyber Stalking (IPI-CS): The iPredator Probability Inventory- Cyber Stalking is a 110 question diagnostic, education, assessment and data collection tool designed to assess the probability and preparedness of a young adult, adult or public figure of being cyber stalked. In addition to cyber stalking, the IPI-CS investigates the subject’s potential of being cyber harassed by an ex-partner, ex-associate, fan, nefarious corporate entity or pathologically driven Information and Communications Technology user.

Just as all the IPI Assessment Collection inventories, the IPI-CS focuses on the subject’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked. For purposes of the probability estimate the IPI-CS has been designed to assess, this inventory combines aspects of cyberstalking, cyber harassment and habitual online personal disparagement.

An adult, public figure or associate of a public figure age 18+ completes the IPI-CS. Once completed, the IPI score, ranging from 0-110, represents the inventory respondent’s or the subject being queried preparedness, vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyber stalking, cyber harassment or cyber bullying if the subject being queried is a minor. The IPI-CS can be used as both a cyber stalking prevention tool and data collection instrument if the Information and Communications Technology user or business is presently being cyber stalked. The IPI-CS also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Cyber Bully [IPI-CB]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Cyber Bully

[IPI-CB]

iPredator Probability Inventory-Cyber Bully (IPI-CB): The iPredator Probability Inventory-Cyber Bully is a 110-question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online preparedness, vulnerability and risk potential for being cyber bullied and/or harassed. Just as all the IPI Assessment Collection inventories, the IPI-CB focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

The IPI-CB also explores parental and support system cyberbully protection and prevention tactics employed by loved ones and school officials. A parent, primary caregiver, educator or pediatric professional completes the IPI-CB for children and adolescents ages 6-17.

Once completed, the IPI score, ranging from 0-110, represents the preparedness, vulnerability and risk potential of the child becoming a cyber bully target, cyber bully abuser or cyber bully bystander. The IPI-CB can be used as both a cyber bullying prevention tool for children and a data collection instrument for parents and educators investigating cyberbullying episodes involving their child or student. The IPI-CB also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Cyber Bully Abuser [IPI-CBA]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Cyber Bully Abuser

[IPI-CBA]

iPredator Probability Inventory-Cyber Bully Abuser (IPI-CBA): The iPredator Probability Inventory-Cyber Bully Abuser is a 110 question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online probability and potential to intimidate, humiliate and taunt other children engaging in online harassment and cyber bullying. A parent, primary caregiver and school official or pediatric professional complete the IPI-CBA for children, and adolescents ages 6-17.

Just as all the IPI Assessment Collection inventories, the IPI-CBA focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for non-adversarial and appropriate online activities.

Once completed, the IPI score, ranging from 0-110, represents the vulnerability and risk potential of the child becoming a cyber bully abuser, both cyberbully target and abuser or cyberbully bystander. The IPI-CBA can be used as both a cyber bullying assessment tool for children and a data collection instrument for parents and educators investigating cyber bullying episodes involving their child or student. Similar to the IPI-CB, the IPI-CBA investigates the knowledge and understanding parents and/or educators have relevant to investigating the cyber bully abuser. The IPI-CBA also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Business [IPI-B]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Business

[IPI-B]

iPredator Probability Inventory-Business (IPI-B): The iPredator Probability Inventory-Business is a 110 questions diagnostic, education, assessment and data collection tool designed to assess a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by iPredators or nefarious corporate competitors. Related to cybercrime specific areas, the IPI-B also assesses a business’s cyber-security breach potential, digital reputation acumen and capacity to institute Internet safety and cyber security strategies. A business owner, employee or consultant familiar with the business’s Information and Communications Technology (ICT) health and safety completes the IPI-B.

Just as all the IPI Assessment Collection inventories, the IPI-B focuses on the business’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

Relevant to businesses, the IPI-B addresses and investigates the businesses understanding of digital reputation and digital reputation management. Upon completion of the IPI-B, the IPI score ranges from 0-110 and represent the vulnerability and risk potential if targeted by an iPredator or nefarious corporate competitor engaged in cyber criminal activity and/or corporate disparagement. The IPI-B is a helpful diagnostic and educational tool for employees and consultants related to the business. The IPI-B also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Educator [IPI-E]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Educator

[IPI-E]

iPredator Probability Inventory-Educator (IPI-E): The iPredator Probability Inventory-Educator is a 330 question data collection, diagnostic and informational tool for educators regarding a student’s online risk potential and vulnerability of being targeted, cyber bullied, cyber stalked, sexually solicited and/or victimized by iPredators. In addition to being a data collection tool and general screening exam, the IPI-E can also be used as an adjunct to classroom projects, prevention education plans and educator training seminars on Internet safety.

The IPI-E is designed for educators and educational institutions working with children, adolescents and young adults ages 9-21. Just as all the IPI Assessment Collection inventories, the IPI-E focuses on a child and/or students relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their online activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

Upon completion of the IPI-E, the IPI score ranges from 0-330 and represents the preparedness, probability and risk potential of the student being a targeted by an iPredator engaged in cyberbullying, cybercrime, cyberstalking, cyber harassment or trolling for targets to sexually victimize. The IPI-E is a 330-question inventory segmented into 11 categories relevant to all Information and Communications Technology users and can be conducted all at once or used in parts focusing on the educators’ goals. The IPI-E also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-Psychologist [IPI-PSY]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-Psychologist

[IPI-PSY]

iPredator Probability Inventory-Psychologist (IPI-PSY): The iPredator Probability Inventory- Psychologist is a 330 question data collection, educational and diagnostic tool for psychiatrists, psychologists, social workers and behavioral healthcare professionals regarding a child, adolescent or adult’s Information and Communications Technology (ICT) preparedness, probability and vulnerability of being cyber bullied, cyber stalked, sexually solicited, stolen from and/or targeted by iPredators. The IPI-PSY can also be used as an adjunct to individual and group therapy, prevention education training, an adjunct to intake assessments and behavioral healthcare training. The IPI-PSY is designed for children, adolescents and adults ages 9+.

Upon completion of the IPI-PSY, the IPI score ranges from 0-330 and represents the preparedness, vulnerability and risk potential of the subject being targeted by an iPredator and/or possibly being an iPredator. Just as all the IPI Assessment Collection inventories, the IPI-PSY focuses on an Information and Communications Technology user’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

The IPI-PSY questions are formatted to investigate the knowledge base, environmental aspects and behavioral actions necessary for Internet safety and preparedness if cyber attacked. The IPI-PSY is a 330-question inventory segmented into 11 categories relevant to all Information and Communications Technology users and can be conducted all at once or used in parts focusing on the behavioral healthcare professional goals or areas of assessment. The IPI-PSY also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

iPredator Probability Inventory-330 [IPI-330]-Internet Safety Tool-Cyber Attack Risk Assessment-iPredator-Image

iPredator Probability Inventory-330

[IPI-330]

iPredator Probability Inventory-330 (IPI-330): The iPredator Probability Inventory-330 is a 330 question diagnostic, education, assessment and data collection tool designed to investigate a 6-21 year-old child, adolescent or young adult regarding their online victimization risk potential, cyber attack awareness and support system involvement. A parent, educator, family member or pediatric professional completes the IPI-330. Just as all the IPI Assessment Collection inventories, the IPI-330 focuses on a child and/or students relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

Once completed, the respondent tabulates their score, ranging from 0-330 and represents the child, adolescent or young adult’s risk potential and vulnerability of being targeted by an iPredator engaged in cyber bullying, cybercrime, cyber stalking, cyber harassment or trolling for targets to sexually victimize. The short-form version of the IPI-330 is the IPI-P designed for those seeking a concise diagnostic tool that can be completed in 1/3 of the time.

As the inventory name states, the IPI-330 is a 330 question inventory segmented into 11 categories relevant to all Information and Communications Technology users and can be conducted all at once or used in parts focusing on the parent or educator’s goals and  strategies. The IPI-330 also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

an-internet-safety-test-internet-safety-tool-ipredator-image

IISC & IPI Collection Notes

All 26 tools can be used to assess and evaluate a subject, can be used as educational templates, can be used to create and design trainings, can be used in the investigation of ipredator risk and can be used to educate the media and their audiences.

Although the iPredator Probability Inventory-Educator (IPI-E), iPredator Probability Inventory-Psychologist (IPI-PSY), iPredator Probability Inventory-330 (IPI-330) in the IPI collection and the Educator’s Internet Safety Checklist (EISC), Internet Safety Checklist-Psychology (ISC-PSYCH), Parent Cyber Safety Checklist (PCSC) in the IISC collection are more expensive and 3X larger, they are all broken into distinct 30 question/statement factor categories allowing the consumer to assess and evaluate specific areas if they so desire.

As a metaphor to describe the primary difference between the two, the IISC Collection is used to verify you have all the colors and styles of clothing in your closet for every season and every occasion. The IPI Collection is used if you are not sure of the colors and styles of clothing you have and looking to find out what you may need for every season and every occasion. The IISC Collection is to verify and confirm. The IPI Collection is to investigate and inquire.

The IPI Collection is geared toward consumers seeking to inquire and/or assess, as opposed to verifying, internet safety, cyber security, stable psychological functioning and ipredator protection strategies and tactics. Most of the IPI tools are formatted as questions and geared more towards initiating dialogue with other online users as opposed to confirming their practices are in place.

The IISC tools are all checklists, in statement form and best suited for consumers who want to verify and confirm that internet safety, cyber security, stable psychological functioning and iPredator protection strategies and tactics are in place for themselves, their business or the subject they are assessing.

CYBER ATTACK RISK ASSESSMENTS

IPREDATOR-LION HEAD EMBLEM-250PX-IPREDATOR IMAGE

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalkingcybercrimeinternet defamationcyber terrorismonline sexual predation and the new field the founder is pioneering he has termed, Information Age Psychology. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

In addition to assisting citizens, their mission is to initiate a national sustained educational & awareness campaign with the help of private, state and federal agencies. Dr. Nuccitelli and iPredator Inc. colleagues and associates regular update their criminal psychology, cybercrime & forensics blog, called Dark Psychology and their Internet Safety & Information Age Predator blog called Dr. Internet Safety. The parent website, iPredator.co (a.k.a. www.iPredatorInc.com), offers site visitors an enormous database on Cyber Criminal Psychology, Internet Safety and Information Age Predators.

For online users interested in learning more about Dark Psychology & iPredator outside the website or forensic & internet safety blogs, please visit their iPredator & Dark Psychology Google + Community pages and all are welcomed to contribute. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, please email him at drnucc@ipredatorinc.com  or via phone at 347-871-2416.

an-internet-safety-test-internet-safety-tool-ipredator-image

HOME-BUTTON-IPREDATOR-INTERNET-SAFETY-IMAGE

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416
Google+Tweet about this on TwitterShare on FacebookPin on PinterestShare on LinkedInshare on TumblrPrint this pageEmail to someone