share
google Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  twitter Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  facebook Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  linkedin Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  tumblr Cyber Attack Risk Assessments | Internet Safety Tools | iPredator


IPREDATOR INC.

CYBER ATTACK RISK ASSESSMENTS

INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENTS IPREDATOR INC IPREDATOR IMAGE Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

Risk Assessments Overview

Cyber Attack Risk Assessments: In September 2011, Dr. Nuccitelli established iPredator Inc. offering the private & public sectors educational and advisory services regarding internet predators, cybercrime & digital forensic psychology. In Q3 2013, Dr. Nuccitelli and iPredator Inc. formally launched this optimized website offering site visitors an incredible amount of information, education, online risk assessments and advisory services on Internet Safety, Dangers of the Internet, Criminal & Forensic Psychology and his new theoretical construct he has termed iPredator. Concurrent with the iPredator Inc. website, Dr. Nuccitelli also regularly updates their Forensic & Criminal Psychology Blog, Dark Psychology, and their Internet Safety Blog, Dr. Internet Safety.

Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation to attorneys and court systems.

Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, digital forensic psychology, psychiatric & psychological disorders and developmental psychology. He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media.

As Chief Executive Officer, Dr. Nuccitelli became interested in the psychology and profiling of those who use Information and Communications Technology to abuse, steal, taunt and victimize others online in 2009. In 2012, Dr. Nuccitelli and his colleagues grew even more determined to develop victimization prevention & intervention strategies for vulnerable online users. Within their professional network, iPredator Inc. has contact with education, investigation, legal, law enforcement and information technology experts.

CYBER ATTACK RISK ASSESSMENTS INTERNET SAFETY ONLINE SEXUAL PREDATOR PREVENTION CYBERBULLYING PREVENTION IPREDATOR IMAGE e1383013466379 Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

Information Age Diagnostic, Investigation, Education, Screening & Interpersonal Discussion Tools designed to protect, prevent & prevail over iPredators. iPredator Inc.’s release of the 2013 iPredator Inc. Collection is the first step in their mission to slow the rapid growth of Information and Communications Technology (ICT) becoming the new dimension for unfettered malevolent and nefarious activities.

The Information Age is a societal paradigm and period beginning in the last quarter of the 20th century and presently thriving in the second decade of the 21st century. The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT). In a mere four decades, ICT and it’s importance to humanity have led many to surmise that the planet and its human inhabitants are amidst an Information Revolution.

Mobile device technology, telecommunications, social media & cyberspace are just a few examples of humanities newest frontiers. In all of these arenas, they deal with the new intrapersonal and interpersonal dynamics of how humankind obtains exchanges and disseminates information. As humanity is at the beginning of the Information Age and with no manner to forecast its longevity or impact, historians will one day look back upon our generation and define the 21st century as when Information and Communications Technology (ICT) had its origin.

Despite the incredible benefits to humanity, ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the sociopath, deviant, narcissist or classic criminal, but part of a new generation that will be permanent fixtures to humanity for centuries to follow. In order to effectively educate, evaluate, investigate or advise any ICT user on Internet safety, whether they are a child, adult, group or business, it is paramount to grasp the basic concepts and terms vital understanding the dark side of cyberspace.

The importance of ICT and the Internet to humankind is different to everyone and as unique as a fingerprint. For some, ICT and the Internet are nothing more than tools of convenience for conducting mundane tasks. For others, their social, scholastic, business and/or financial affairs disclosed online are crucial to their life functioning, self-esteem, self-worth, success and perceptual world.

 Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

As ICT, social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. At present, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.

iPredator Inc. is a NYS based Information Age Forensics company (#TF-2989198) founded in to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and the new field they are pioneering called Information Age Forensics.

Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. The central theme to all iPredator Inc. products and services is Dr. Nuccitelli’s Information Age theoretical construct, iPredator. A brief description of iPredator is as follows:

ipredator internet safety checklist iisc ipredator inc iisc collection Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using ICT. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of Information and Communications Technology (ICT) to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

When an offender profile includes these three characteristics, they meet the definition of iPredator. A fourth criterion, not included in the triad defining an iPredator, is what has been termed iPredator Victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop a sense and/or skill of being able to experience an intuition to know what online user will be a successful target.

In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.

Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.

CYBERSTEALTH CYBERBULLYING CYBERBULLYING FACTS CYBERBULLYING PREVENTION IPREDATOR Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of Information and Communications Technology, that humanity often fails to fathom leading some online users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT.) These benefits include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.

NOTE TO INTERNET SAFETY TOOL CONSUMERS

All iPredator Inc.’s internet safety tools are designed for diagnostics, data collection, investigation and education. Authored by Dr. Nuccitelli and a close group of fellow associates, over the course of 10 months and several thousand hours, each tool targets a specific group of online aggressors and targeted victims. Given the rapid growth of online assailants and as surprising as it may seem, these tools still stand alone as the only comprehensive, extensive and multi-functional assessments in the nation.

Although consumers must agree to a non-replication and commercial distribution license agreement, iPredator Inc. will work with, at no cost, assisting consumers in developing their own products and services commercial tools. iPredator Inc. is receptive to professional and organizational affiliations for the purposes of marketing and selling the IPI and IISC tools.

Interested parties who contact iPredator Inc., speak with Dr. Nuccitelli or an iPredator Inc. associate and confirm tool usage will not serve nefarious or deceptive endeavors may have their purchase(s) significantly discounted. Discounts [25%-50%] are always guaranteed if the consumer is actively engaged in helping to stop the growth of cyber aggression, deception and harm.

Please note that the IPI and IISC Collections were painstaking designed, but have not been validated via research methodology. Despite not being clinically confirmed as reliable and valid, iPredator Inc. is confident our tools are very effective. If verification is sought to those seeking to purchase a set of tools, iPredator Inc. can arrange contact with national forensic and educational organizations to verify their effectiveness.

Given iPredator Inc. is comprised of professionals, academics, community advocates, proactive citizens and information security professionals and not “retail or e-commerce savvy”, all revenue generation strategies, investment suggestions and seed funding opportunities are welcomed. Feel free to review, download and disseminate iPredator Inc.’s Executive Summary, Business Plan and Seed Funding Proposal by scrolling to the base of this site’s Executive Summary page to download the PDF files. Suggestions and interested parties are requested to call [347] 871-2416 or email iPredator founder, Dr. Nuccitelli at drnucc@ipredatorinc.com.

CONNECT THE DISCONNECTED ENGAGE THE DISENGAGED INFORMATION AGE WELLNEES IPREDATOR IMAGE Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

IISC & IPI COLLECTION OVERVIEW

All of the iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools (13 Checklists & 1 Interview) are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) weaknesses. The IPI tools (12 Inventories) are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) vulnerabilities. The list of 26 tools is as follows:

After four years of extensive research and investigation into the criminological, forensic and psychological aspects of humanities interface with Information and Communications Technology (ICT), the IISC Collection is the first step in iPredator Inc.’s mission to stop nefarious, abusive and criminal online users from victimizing children and citizens of the global Internet community.

Dr. Nuccitelli and his colleagues seek to educate and protect ICT users against cyber bullies, cyber harassers, cyber stalkers, cyber criminals, cyber terrorist, Internet trolls, online sexual predators and those engaged in corporate disparagement and Internet defamation.

The IISC Collection are fourteen 75-330 statement checklists designed to verify a child, adult, or business’s ICT protection preparedness, ICT vulnerability and Internet prevention safety measures are effective (i.e. PISC, PCSC, TISC, AISC.)

To verify and confirm the preparedness, vulnerability and capacity to endure from iPredator attacks for children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools investigating the typologies of iPredator including: cyber bullying (target and offender), cyber stalking, cybercrime and online sexual predators (i.e. CBAC, CBTC, CSPC, OPPC, CCPC.)

To assess preparedness, prevention measures and the capacity to prevail from iPredator attacks on business’s regarding cybercrime, digital reputation, corporate disparagement and internet defamation issues, Dr. Nuccitelli developed data collection and diagnostic tools for corporate entities (i.e. BISC, DRPC.)

To compile data and educate students, clients or patients regarding their Internet protection preparedness, vulnerability, Internet safety prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic tools for educators and behavioral healthcare professionals (i.e. EISC, ISCP.)

CYBER HARASSMENT ONLINE HARASSMENT IPREDATOR IMAGE Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

The IPI Collection is 12 inventories available to purchase the ownership license at iPredator Inc.’s website, www.iPredatorInc.com & at www.iPredator.co. These inventories examine the knowledge, awareness, vulnerability and risk potential of falling prey to a cyber-attack. Dr. Michael Nuccitelli, Chief Executive Officer of iPredator Inc., designed the IPI Assessment Collection and is a New York State licensed psychologist and certified forensic consultant. Unlike the iPredator Internet Safety Checklist Collection (IISC) available to purchase, the IPI Assessment Collection are 12 inventories that are 110-330 questions each and are specific to 11 of the 20 factors Dr. Nuccitelli created to define all iPredators.

information age forensics ipredator Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

The 12 IPI Collection inventories are best used when assessing or evaluating an ICT user or business and when seeking to engage an ICT user in a dialogue about their online activities. The iPredator Checklist Collection (IISC) are similar in construct to the IPI Collection, but are more suited to data collection, investigation and education of ICT users, businesses and pursuit of potential assailants.

The IPI Collection is twelve 110-330 item four choice diagnostic inventories designed to assess and/or educate a child, adult, or business’s online protection preparedness, ICT vulnerability, Internet prevention safety measures, online user risk potential and activities, iPredator awareness and iPredator attacks for children, adolescents and adults (i.e. IPI-P, IPI-330, IPI-T, IPI-A.)

To assess and/or educate preparedness, vulnerability, Internet prevention safety measures and the capacity to prevail from iPredator attacks of children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools specific to the typologies of iPredator including: cyber bullying (target and offender,) cyber stalking, cybercrime and online sexual predators (i.e. IPI-CB, IPI-CBA, IPI-CS, IPI-C, IPI-IP.)

To assess and/or educate preparedness, prevention measures and the capacity to prevail from iPredator attacks on business regarding cybercrime, corporate disparagement and Internet libel issues, Dr. Nuccitelli developed a diagnostic tool for corporate entities. A brief description of this inventory is listed below (i.e. IPI-B.)

To assess, compile data and educate students, clients or patients regarding Internet protection preparedness, vulnerable risk potential, Internet safety prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic and educational tools for educators and behavioral healthcare professionals (i.e. IPI-E, IPI-PSY.)

ipredator internet safety checklist collection iisc Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

Note to Reader: Hundreds of hours went into the research and design of Dr. Nuccitelli’s iPredator construct, IISC & IPI Collection tools and all products & services offered by iPredator Inc. Regarding the IISC & IPI Collection, Dr. Nuccitelli specifically designed them for the primary purpose of being used as data collection and education tools. Although he spent an enormous amount of time in their creation and development and feels confident of their diagnostic capacities, he did not run them through clinical trials or validity examinations as commonly conducted with psychometric testing instruments.

Dr. Nuccitelli & iPredator Inc. do not falsely claim or advertise any of their checklists or inventories as being psychometric instruments with extensive reliability & validity verification analysis.

However, Dr. Nuccitelli is confident his checklists & inventories were thoroughly researched and created leading to useful tools used by information security organizations, educational systems, professionals, professional organizations and families. As he and all humanity are the first generation of the Information Age, Dr. Nuccitelli is also confident all his products & services will be amended, for years to come, as behavioral healthcare, law enforcement & the social sciences learn more about the impact iPredators have on the health of society. A brief definition of the 26 tools are presented in the following pages.

 

HOMEPAGE BUTTON IPREDATOR INTERNET SAFETY IMAGE Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

PAGE NUMBER ONE IPREDATOR INTERNET SAFETY BUTTON IMAGE Cyber Attack Risk Assessments | Internet Safety Tools | iPredator

IPREDATOR PRINT PDF BUTTON1 Cyber Attack Risk Assessments | Internet Safety Tools | iPredator
share
google Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  twitter Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  facebook Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  linkedin Cyber Attack Risk Assessments | Internet Safety Tools | iPredator  tumblr Cyber Attack Risk Assessments | Internet Safety Tools | iPredator