Cyber Bullying Prevention, Education & Information
Welcome to iPredator Inc.’s Cyber Bullying prevention, education & information page. Cyber bullying is one typology included in the concept of iPredator, which is a theoretical construct developed by New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli. As Information and Communications Technology (ICT) becomes more widespread, cyber bullying prevention, education and protection are areas requiring immediate attention. The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace and Information and Communications Technology. The definition and motivations of iPredator and Cyberbullying is as follows:
iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish all online users who engage in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyber bully, cyber stalker, cyber criminal, online sexual predator, Internet troll or cyber terrorist, they fall within the scope of iPredator. Within this construct, Cyber Harassment is the adult form of Cyber Bullying and used when the perpetrator is an adult. There are three criteria used to define an iPredator including:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth to engage in criminal or deviant acts or to profile, identify, locate, stalk and engage a target.
When an offender profile includes these three characteristics, they meet the definition of iPredator. A fourth criterion, not included in the triad defining an iPredator, is what I have termed iPredator Victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop a sense and/or skill of being able to experience an intuition to know what online user will be a successful target.
In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.
Internet Safety – Cyberbullying – Bullying
Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.
Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of Information and Communications Technology, that humanity often fails to fathom leading some online users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.
Cyber Bullying: Like classic bullying, cyber bullying is harmful, repeated and hostile behavior intended to taunt, deprecate & defame a targeted child. Cyber bullying describes threatening or disparaging information against a target child delivered through Information and Communications Technology (ICT.) Unlike classic bullying, cyber bullying includes a phenomenon called Cyber Bullying by proxy.
Cyber bullying by proxy occurs when a cyber bully encourages or persuades others to engage in deprecating and harassing a target child. Cyber bullying by proxy is a dangerous form of cyber bullying because adults may become the accomplices to the cyber bully involved in the harassment and do not know they are dealing with a child or someone they may know. A cyber bully is usually driven by a need for peer acceptance, but may engage in these maladaptive behaviors out of ignorance of the distress they cause a target child, or the most malevolent form, feels minimal remorse for the harm they are inflicting upon the target child.
Cyber Bullying is one category of iPredator that will continue to grow with the expansion of Information and Communications Technology. Feel free to visit the iPredator Resource Links & Library filled with an enormous amount of information compiled by Dr. Nuccitelli and his colleagues.
Related to Cyber Bullying, Dr. Nuccitelli has developed the Cyber Bulling Target Checklist (CBTC) and Cyber Bullying Abuser Checklist (CBAC) to purchase as an abridged version of the full assessment. The Cyber Bulling Target Checklist (CBTC,) Cyber Bullying Abuser Checklist (CBAC,) iPredator Probability Inventory – Cyber Bully (IPI-CB) and iPredator Probability Inventory – Cyber Bully Abuser (IPI-CBA) can be purchased, which will give you the questions, answers, scoring key and factor descriptions to use for education, investigation, data collection and assessment purposes.
iPredator also offers iPredator Protected that is an advisory based membership that provides members direct contact to Dr. Nuccitelli, his consultants and regional experts from many geographic locations. If the member, their loved ones or business is confronted, with issues of cyber bullying, cyber stalking, cyber crime, cyber terrorism or online sexual predation, Dr. Nuccitelli and his team of expert consultants are one phone call away. As website content continues to be added, please visit the site for additions to the Resource Links & Library and articles authored by Dr. Nuccitelli and iPredator Team members.
iPredator was founded in September 2011 to provide educational and advisory products & services to consumers and organizations on Cyber Bullying, Cyber Harassment, Cyber Stalking, Cyber Crime, Internet Defamation, Cyber Terrorism, Online Sexual Predators and the new field they are developing termed, Information and Communications Technology (ICT) Psychology. Created by a NYS licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli, their goal is to reduce victimization, theft and disparagement from online assailants.
In addition to assisting citizens, iPredator mission is to initiate a national educational & awareness campaign with the help of private, state, and federal agencies. iPredator’s criminal psychology & forensics blog can be viewed at www.DarkPsychology.co and our website, www.iPredator.co, offers site visitors an enormous database on Cyber Criminal Psychology, Internet Safety and iPredators. Although iPredator has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.
- Facebook: The iPredator
- Google +: The iPredator
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
For online users seeking Internet and cyber attack protection, feel free to read about iPredator’s innovative advisory based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator offers a unique assessment service called the iPredator Facebook Safety Analysis.
In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 13 checklists (IISC Collection) that can be taken online and 26 checklists and inventories (IISC & IPI Collection) that can be purchased. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, education and prevention education (IISC & IPI Collection Overview.)
by Michael Nuccitelli, Psy.D.