Bullying and Cyberbullying
Welcome to iPredator Inc.’s bullying and cyberbullying prevention, education & information page. Cyberbullying is one typology included in the concept of iPredator, which is a theoretical construct developed by New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli. As Information and Communications Technology (ICT) becomes more widespread, cyber bullying prevention, education and protection are areas requiring immediate attention.
The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace and Information and Communications Technology. The definition and motivations of iPredator and Cyberbullying is as follows:
Cyberbullying: Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination.
(click image to visit page)
iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish all online users who engage in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyber bully, cyber stalker, cyber criminal, online sexual predator, Internet troll or cyber terrorist, they fall within the scope of iPredator. Within this construct, Cyber Harassment is the adult form of Cyber Bullying and used when the perpetrator is an adult. There are three criteria used to define an iPredator including:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth to engage in criminal or deviant acts or to profile, identify, locate, stalk and engage a target.
When an offender profile includes these three characteristics, they meet the definition of iPredator. A fourth criterion, not included in the triad defining an iPredator, is what I have termed iPredator Victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop a sense and/or skill of being able to experience an intuition to know what online user will be a successful target.
(click image to visit site)
In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.
Internet Safety – Cyberbullying – Bullying
Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.
Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of Information and Communications Technology, that humanity often fails to fathom leading some online users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.
Cyber Bullying: Like classic bullying, cyber bullying is harmful, repeated and hostile behavior intended to taunt, deprecate & defame a targeted child. Cyber bullying describes threatening or disparaging information against a target child delivered through Information and Communications Technology (ICT.) Unlike classic bullying, cyber bullying includes a phenomenon called Cyber Bullying by proxy.
Cyber bullying by proxy occurs when a cyber bully encourages or persuades others to engage in deprecating and harassing a target child. Cyber bullying by proxy is a dangerous form of cyber bullying because adults may become the accomplices to the cyber bully involved in the harassment and do not know they are dealing with a child or someone they may know. A cyber bully is usually driven by a need for peer acceptance, but may engage in these maladaptive behaviors out of ignorance of the distress they cause a target child, or the most malevolent form, feels minimal remorse for the harm they are inflicting upon the target child.
The Cyberbullying Triad is a term used to describe the 3 typologies of children that harm other children using Information Technology. This writer’s terms to categorize cyberbullies include the Ignorant Cyberbully, Righteous Cyberbully & Narcissistic Cyberbully. Of the three profiles, the Narcissistic Cyberbully is the most problematic having the highest probability of engaging in malevolent and nefarious online activities as an adult.
iPredator Web Page: https://www.ipredator.co/ipredator/cyber-bullying/cyberbully-triad/
Direct PDF Article Download: https://www.ipredator.co/wp-content/uploads/CYBERBULLY-TRIAD-CYBERBULLY-CONSTRUCT-IPREDATOR-INC..pdf
CYBERBULLYING TACTICS 2014
Cyberbullying continues to grow devastating both pre-pubescent and adolescent children. Unlike pre-Information Age bullying, cyberbullies and their tactics are primarily designed and instituted in the hidden realm of cyberspace. No one knows the depths Information Age children will venture in their practices to harm other children. NYS Licensed Psychologist, Dr. Michael Nuccitelli has published his 2014 Cyberbullying Tactics for review and free download.
iPredator Web Page: https://www.ipredator.co/ipredator/cyber-bullying/cyberbullying-tactics/
Direct PDF Article Download: https://www.ipredator.co/wp-content/uploads/2014-Cyberbullying-Tactics-How-Cyberbullies-Bully-iPredator.pdf
Cyberbullying facts, prevention education tips & resources are presented for download, at no cost, for parents, educators & pediatric professionals. Author of the Information Age Forensics construct, iPredator, Dr. Nuccitelli has compiled helpful information regarding both the cyberbully and cyberbully victim. Given that a significant segment of cyberbullies fit criteria for iPredator, he also presents his formal definitions for Dark Psychology, Cyberstealth, iPredator Bridge & Cyberstealth.
iPredator Web Page: https://www.ipredator.co/ipredator/cyber-bullying/cyberbullying-facts/
Direct PDF Article Download: https://www.ipredator.co/wp-content/uploads/Cyberbullying-Facts-Cyberbullying-Prevention-Education-iPredator.pdf
The Cyberbully Mind is a brief introduction to the psychodynamics of cyberbullying. Cyberbullying is defined as the use of Information and Communication Technology (ICT), by a minor, to verbally and/or physically attack another minor, who is unable or unwilling to deescalate the engagement. Given that the vast majority of this abuse occurs in cyberspace, the factors, drives and motivations for cyberbullying are explored.
iPredator Web Page: https://www.ipredator.co/ipredator/cyber-bullying/cyberbully-mind/
Direct PDF Article Download: https://www.ipredator.co/wp-content/uploads/Cyberbully-Mind-Cyberbullying-Psychodynamics-iPredator-Inc.pdf