[IPI] and [IISC] Internet Safety Tools
Tool Purchases Include No Cost
Training & Consultation
All iPredator Inc.’s internet safety tools are designed for diagnostics, data collection, investigation and education. Authored by Dr. Nuccitelli and a close group of fellow associates, over the course of 10 months and several thousand hours, each tool targets a specific group of online aggressors and targeted victims. Given the rapid growth of online assailants and as surprising as it may seem, these tools still stand alone as the only comprehensive, extensive and multi-functional assessments in the nation.
Although consumers must agree to a non-replication and commercial distribution license agreement, iPredator Inc. will work with, at no cost, assisting consumers in developing their own products and services commercial tools. iPredator Inc. is receptive to professional and organizational affiliations for the purposes of marketing and selling the IPI and IISC tools.
Interested parties who contact iPredator Inc., speak with Dr. Nuccitelli or an iPredator Inc. associate and confirm tool usage will not serve nefarious or deceptive endeavors may have their purchase(s) significantly discounted. Discounts [25%-50%] are always guaranteed if the consumer is actively engaged in helping to stop the growth of cyber aggression, deception and harm.
Please note that the IPI and IISC Collections were painstaking designed, but have not been validated via research methodology. Despite not being clinically confirmed as reliable and valid, iPredator Inc. is confident our tools are very effective. If verification is sought to those seeking to purchase a set of tools, iPredator Inc. can arrange contact with national forensic and educational organizations to verify their effectiveness.
Given iPredator Inc. is comprised of professionals, academics, community advocates, proactive citizens and information security professionals and not “retail or e-commerce savvy”, all revenue generation strategies, investment suggestions and seed funding opportunities are welcomed. Feel free to review, download and disseminate iPredator Inc.’s Executive Summary, Business Plan and Seed Funding Proposal by scrolling to the base of this site’s Executive Summary page to download the PDF files. Suggestions and interested parties are requested to call  871-2416 or email iPredator founder, Dr. Nuccitelli at email@example.com.
IPREDATOR INTERNET SAFETY CHECKLISTS
[product_category category=”checklist” per_page=”99″ columns=”4″ orderby=”title” order=”asc”]
Note: The iPredator Internet Safety Checklists (IISC) are available for purchase in both the full file version (IISC) and abridged version (IISC-ABR.) The full version checklists are the same tools, but also include a considerable amount of additional information and services for using the checklists for education, investigation, training and data collection. The abridged versions (IISC-ABR) have the entire tool for administration and correct scoring templates. Unlike the full version with scoring categories included, score comparison is reviewed here: http://www.ipredator.co/products/scoring-keys/
Internet Safety Checklists Abridged Page: http://www.ipredator.co/products/checklists-abr/
IPREDATOR PROBABILITY INVENTORIES (IPI)
[product_category category=”inventory” per_page=”99″ columns=”4″ orderby=”title” order=”asc”]
A brief overview is provided below on iPredator Inc., iPredator construct, Michael Nuccitelli Psy.D. and the IPI & IISC Assessments. If you have any questions regarding iPredator Inc. products and services, please contact Dr. Nuccitelli directly at (347) 871-2416 or via email at firstname.lastname@example.org
iPredator Inc. is a NYS based Information Age Forensics company (#TF-2989198) founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and the new field he is pioneering called Information Age Forensics.
Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli, Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. The central theme to all iPredator Inc. products and services is Dr. Nuccitelli’s theoretical construct, iPredator. To verify his construct is broadly accepted, feel free to click on the ACFEI national press release link here:
ACFEI Announces Commitment to Technological Predator Forensic Education 11/12/12: http://www.prweb.com/releases/robertoblock/ipredator/prweb10120698.htm
In addition to assisting citizens, their mission is to initiate a national sustained educational & awareness campaign with the help of private, state and federal agencies. Dr. Nuccitelli’s criminal psychology & forensics blog can be viewed at darkpsychology.co and this website, www.ipredator.co, offers site visitors an enormous database on Cyber Criminal Psychology, Internet Safety and Information Age Predators.
MICHAEL NUCCITELLI, PSY.D., C.F.C.
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute (Identification # 103110.) As author of the theoretical construct iPredator, Dr. Michael Nuccitelli is a cyberbullying, internet safety, cybercrime, online predator and forensic psychology educator & consultant.
iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in an abstract electronic universe.
Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.
IPREDATOR GOOGLE PLUS LINKS
[VISIT, JOIN & SHARING APPRECIATED]
- Google + Profile | Dr. Nuccitelli
- Google + Page | iPredator
- Google + Page | Dark Psychology
- Google + Page | Dr. Internet Safety
- Google + Community | iPredator
- Google + Community | Dark Psychology
IISC & IPI CYBER ATTACK RISK ASSESSMENTS & EDUCATIONAL TOOLS
Inventories [IPI] Designed to Inquire
Checklists [IISC] Designed to Verify
The IISC & IPI cyber attack risk assessments & educational tools are 26 checklists and inventories authored by Michael Nuccitelli, Psy.D., a NYS licensed psychologist and certified forensic consultant. The IPI & IISC Collections were designed after 100’s of hours researching and constructing his Information Age Predator construct, iPredator. As of Q4 2014, Dr. Nuccitelli’s market research has concluded there are no known nationally marketed cyber-attack risk assessments. In essence, the IISC & IPI assessments are new to the Internet Safety product market and function as both assessment & educational tools creating a broad based market appeal.
In addition to being designed as education, training, investigation and diagnostic tools, Dr. Nuccitelli has concluded that being translated in languages other than English will expand the consumer target market to all industrialized nations globally. The primary difference between the IISC & IPI assessments is the IISC tools are all checklists in statement form, whereas the IPI inventories are in question form.
The IISC tools are best suited for consumers who want to verify and confirm that internet safety, cyber security, stable psychological functioning and iPredator protection strategies and tactics are in place for themselves, their business or the subject they are assessing.
The IPI tools are geared toward consumers seeking to inquire and/or assess as opposed to verifying internet safety, cyber security, stable psychological functioning and iPredator protection strategies and tactics. The IPI tools are formatted as questions and geared more towards initiating dialogue with other online users as opposed to confirming their practices are in place. The licensing agreement consumers accept before purchase restricts replication and sale of all assessments. Dr. Nuccitelli designed all 39 internet safety tools to be used as assessment, investigation and educational tools.
IISC & IPI BRIEF DESCRIPTIONS
ICT = INFORMATION AND COMMUNICATIONS TECHNOLOGY
1. Business Internet Safety Checklist (BISC): The Business Internet Safety Checklist (BISC) is a 100-item checklist designed for a business to verify, upgrade or monitor their ICT safety and security practices. The BISC is a data collection tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors.
2. Cyber Stalker Identification Interview (CSII): The Cyber Stalker Identification Interview (CSII) is a 75 question diagnostic and data collection tool designed to achieve a three-fold purpose. The three functions include A. Assess the vulnerability and preparedness of a child, adolescent, adult, business or public figure of being cyber stalked and/or cyber harassed. B. Assist law enforcement, legal professionals, parents, adults and businesses in collecting data on the identity of an unknown cyber stalker. C. Assess the extent and skills of the cyber stalker’s tactics and the target’s ICT weaknesses and high-risk behaviors the cyber stalker is attacking.
3. Teen Internet Safety Checklist (TISC): The Teen Internet Safety Checklist (TISC) is a 100-item education, assessment and data collection tool designed for teachers, educators and pediatric professionals related to pre-pubescent and adolescent Internet safety and responsible ICT usage. The TISC is formatted in a manner allowing the adolescent, an adult or both parties to complete the checklist. The TISC queries and explores areas developmentally relevant to an early adolescent, adolescent and young adult, ages 11-21.
4. Cyber Bully Target Checklist (CBTC): The Cyber Bully Target Checklist is a 75 item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent, adolescent or young adult’s vulnerability and risk potential of being targeted by a cyber bully. The CBTC queries and explores areas developmentally relevant to school aged children. The goal of the CBTC is to investigate & educate children on their vulnerability and risk potential of being targeted by a cyber bully engaged in teasing, taunting, harassment and disparagement of a target child using ICT.
5. Cyber Bully Abuser Checklist (CBAC): The Cyber Bully Abuser Checklist is a 75 item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent, adolescent or young adult’s vulnerability and risk potential of being a cyber bully and/or engaging in cyber victimization of others. The CBAC queries and explores areas developmentally relevant to school aged children. The goal of the CBAC is to investigate & educate children on their vulnerability and risk potential of engaging in teasing, taunting, harassment and disparagement other children using ICT.
- Cyber Bullying Abuser Checklist (CBAC)
- Cyber Bullying Abuser Checklist (CBAC-ABR)
6. Online Predator Prevention Checklist (OPPC): The Online Predator Prevention Checklist is a 100-item data collection & educational tool designed to educate and investigate a child, adolescent or young adult’s vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. The OPPC investigates areas developmentally relevant to a child and young adult, ages 11-21, which can increase their levels of vulnerability. These areas include sexuality, intimate partnerships, curiosity and motivation for peer group acceptance.
7. Digital Reputation Protection Checklist (DRPC): The Digital Reputation Protection Checklist is a 100-item checklist designed for an ICT user and/or their business to monitor, protect and manage their digital reputation. The DRPC is a data collection & assessment tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors. The DRPC focuses on the ICT user and the business’s cyber-security breach potential, digital reputation acumen and capacity to successfully institute online reputation prevention and protection strategies.
8. Cyber Crime Protection Checklist (CCPC): The Cyber Crime Protection Checklist is a 100-item checklist designed for an ICT user, their loved ones or business to assess their vulnerability and risk potential of being targeted. The CCPC assesses the probability of being disparaged, stolen from or infiltrated by iPredators, cyber terrorist or nefarious corporate competitors engaged in cyber criminal and/or cyber warfare activities. The CCPC also investigates personal and/or corporate vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors.
9. Adult Internet Safety Checklist (AISC): The Adult Internet Safety Checklist is a 100-item checklist designed for an adult ICT user to verify, confirm and examine their ICT safety and security practices, online vulnerability, risk potential and cyber-attack awareness. The AISC is also designed to investigate an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by iPredators based on their ICT activities and level of cautious approach.
10. Cyber Stalking Prevention Checklist (CSPC): The Cyber Stalking Prevention Checklist is a 100-item data collection, diagnostic and educational tool designed to validate and confirm the preparedness of an ICT user, business or organization of being cyber stalked and/or cyber harassed. The CSPC investigates personal and/or corporate vulnerability of being targeted, disparaged, harassed, monitored or infiltrated by cyber criminals, cyber terrorist, cyber stalkers, disgruntled ex-partners, disgruntled past employees/customers or nefarious corporate competitors.
- Cyber Stalking Prevention Checklist (CSPC)
- Cyber Stalking Prevention Checklist (CSPC-ABR)