share
google Cyberstalking Definition | Cyberstalking Prevention | iPredatortwitter Cyberstalking Definition | Cyberstalking Prevention | iPredatorfacebook Cyberstalking Definition | Cyberstalking Prevention | iPredatorlinkedin Cyberstalking Definition | Cyberstalking Prevention | iPredatortumblr Cyberstalking Definition | Cyberstalking Prevention | iPredator



CYBERSTALKING

CYBERSTALKING INTERNET SAFETY CYBERSTALKING PREVENTION CYBERSTALKERS IPREDATOR IMAGE Cyberstalking Definition | Cyberstalking Prevention | iPredator

Cyberstalking Definition

Cyberstalking Prevention Education

Welcome to iPredator Inc.’s Cyberstalking Prevention, Education & Prevention page. Cyberstalking is one typology included in the concept of iPredator, which is a theoretical construct developed by New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli.

The typologies of iPredator include: Cyber Bullying, Cyber Harassment, Cyberstalking, Cyber Crime, Online Sexual Predation and Cyber Terrorism. Within this construct, Cyber Harassment is the adult form of Cyber Bullying and used when the perpetrator is an adult.

As Information and Communications Technology (ICT) becomes more widespread, cyberstalking prevention, education and protection are areas requiring immediate attention. The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace and Information and Communications Technology. The definition and motivations of iPredator and Cyberstalking is as follows:

iPredator Definition

iPredator: A child, adult or group who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology (ICT.) iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.

Social Media Safety iPredator Facebook Safety Assessment Baby Boomer Internet Safety iPredator Cyberstalking Definition | Cyberstalking Prevention | iPredator

iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using Information and Communications Technology (ICT.) Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth to engage in criminal or deviant acts or to profile, identify, locate, stalk and engage a target.

When an offender profile includes these three characteristics, they meet the definition of iPredator. A fourth criterion, not included in the triad defining an iPredator, is what I have termed iPredator Victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop a sense and/or skill of being able to experience an intuition to know what online user will be a successful target.

IPREDATOR BRIDGE CYBERBULLYING CYBERBULLYING FACTS CYBERBULLYING PREVENTION IPREDATOR Cyberstalking Definition | Cyberstalking Prevention | iPredator

iPredator Bridge Definition

iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. Also different from iPredator are their drives for attacking others.

For those defined in iPredator Bridge, their motivations are cloaked by moral turpitude, self-righteousness and pseudo-justified convictions. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.

ipredator protected information age forensics help ipredator inc 300x300 Cyberstalking Definition | Cyberstalking Prevention | iPredator

Within this new region, and presently without explanation, many people enter cyberspace and access ICT with their instinctual drive for self-preservation remaining dormant. Conversely, other people either quickly or gradually, conclude that ICT and cyberspace offers an environment that allows the pursuit of maladaptive and psychopathological goals undeterred by punishment.

It is within this process that the ICT user or groups of ICT users transcend into the world of iPredator. Once an iPredator, the various typologies begin their search for those they deem as vulnerable, easily accosted and not likely to mobilize the required forces leading to their apprehension and punishment.

The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.

CYERSTALKERS FEAR IDENTIFICATION PREDATOR Cyberstalking Definition | Cyberstalking Prevention | iPredator

Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.

Information Age Forensics

The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism.

In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.

Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.

HOMEPAGE BUTTON IPREDATOR INTERNET SAFETY IMAGE Cyberstalking Definition | Cyberstalking Prevention | iPredator

IPREDATOR PRINT PDF BUTTON1 Cyberstalking Definition | Cyberstalking Prevention | iPredator
share
google Cyberstalking Definition | Cyberstalking Prevention | iPredatortwitter Cyberstalking Definition | Cyberstalking Prevention | iPredatorfacebook Cyberstalking Definition | Cyberstalking Prevention | iPredatorlinkedin Cyberstalking Definition | Cyberstalking Prevention | iPredatortumblr Cyberstalking Definition | Cyberstalking Prevention | iPredator