continuing-education-cyberstalking-cyberbullying-training-ipredator-inc.-new-york-1600x550


Continuing Education

Cyberstalking & Cyberbullying Training

Continuing education & community training services are offered by iPredator Inc. associates and Michael Nuccitelli Psy.D., C.F.C., a New York State licensed psychologist, certified forensic consultant, founder of iPredator Inc. and author of the new Information Age Forensics construct, iPredator. Provided below is an overview of community & continuing education services available to online users and organizations. For parties, interested in retaining Dr. Nuccitelli, feel free to call or email anytime. He is available 7 days a week and available by phone 9:00am-11:00pm EST. Provided here is a contact infornation image to download and save and a brief introduction from Dr. Nuccitelli.

continuing-education-cyberstalking-cyberbullying-training-ipredator-inc.-new-york-592x300

My name is Michael Nuccitelli Psy.D., C.F.C. and a New York State licensed psychologist, certified forensic consultant and author of the new Information Age Forensics construct called iPredator. I am writing to introduce myself and announce my availability to participate in both online and offline speaking engagements, continuing education and training services.

My forensics construct, iPredator, was the feature journal article in the 2011 winter issue of the Forensic Examiner published by the American College of Forensic Examiners Institute along with additional educational articles on cyberbullying and various internet safety topics. I have extensive clinical, educational, investigative and media experience adept at discussing the following issues: cyberbullying, cybercrime, digital forensic psychology, cyberstalking, cyber harassment, online sexual predation, cyber terrorism, internet addiction, dark psychology (authored construct), forensic/criminal psychology, internet safety, cyber attack prevention, internet culture and a wide variety of psychological themed topics.

Depending on the arena of services requested, fees for services are variable and discussed at the time of negotiation. As the mission of iPredator Inc. is to increase community awareness on internet safety, I also offer trainings, at no charge, based on the professional organization and population served. For those organizations who request offline trainings and I have agreed to conduct at no cost, traveling, lodging and training preparation expenses are the sponsoring organization’s responsibility.

As I have authored 26 internet safety and cyber attack assessments, all training includes both the specific topic and overview of the internet safety instrument if requested and relevant to the topic discussed. In trainings where my instrument is used, the fee for instrument ownership is waived and given to the host organization or professional firm. The central theme in the majority of the training services offered is my construct, iPredator. A brief definition of my construct, iPredator is as follows:

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

continuing-education-cyberstalking-cyberbullying-training-ipredator-inc.-new-york-841x417

iPredator Profiling & Cyber Criminal Psychology

Hundreds of hours went into the research and design of my iPredator construct, IISC & IPI Collection tools and all products & services offered. Regarding the IISC & IPI Collection, I specifically designed them for the primary purpose of being used as data collection and education tools. Although an enormous amount of time went into their creation and development and confident of their diagnostic capacities, I did not run them through clinical trials or validity examinations as commonly conducted with psychometric testing instruments. All iPredator Inc. consultants & myself do not falsely claim or advertise any of the checklists or inventories as being psychometric instruments with extensive reliability & validity verification analysis.

However, I am confident the checklists & inventories were thoroughly researched and created leading to useful tools used by information security organizations, educational systems, professionals, professional organizations and families. As all humanity is the first generation of the Information Age, I am confident all my authored products & services will be amended, for years to come, as behavioral healthcare, law enforcement & the social sciences learn more about the impact iPredators have on the health of society.

The primary difference between the IISC & IPI assessments is the IISC tools are all checklists in statement form, whereas the IPI inventories are in question form. The IISC tools are best suited for consumers and organizations who want to verify and confirm that internet safety, cyber security, stable psychological functioning and iPredator protection strategies and tactics are in place for themselves, their business or the subject they are assessing.

The IPI tools are geared toward consumers seeking to inquire and/or assess as opposed to verifying internet safety, cyber security, stable psychological functioning and iPredator protection strategies and tactics. The IPI tools are formatted as questions and geared more towards initiating dialogue with other online users as opposed to confirming their practices are in place.

Below I have included a brief description of all 26 internet safety tools for review. I have also included a brief description of my recently published tool called the Internet Addiction Risk Checklist (IARC.) As I developed the IARC for the entire community and made it public domain, the PDF link for download is provided as well. The IARC presentation is an example of my work and similar to the tools I offer for purchase.

IISC & IPI Collection Overview

All of the iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools (13 Checklists & 1 Interview) are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) weaknesses. The IPI tools (12 Inventories) are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) vulnerabilities. The list of 26 tools is as follows:

Internet Safety Checklist Collection (IISC)

The IISC Collection is 14 checklists designed to verify and confirm an ICT user’s knowledge, awareness, vulnerability and preparedness of falling prey to a cyber-attack. Dr. Michael Nuccitelli, Chief Executive Officer of iPredator Inc., designed the IISC Collection and is a New York State licensed psychologist and certified forensic consultant.

After four years of extensive research and investigation into the criminological, forensic and psychological aspects of humanities interface with Information and Communications Technology (ICT), the IISC Collection is the first step in iPredator Inc.’s mission to stop nefarious, abusive and criminal online users from victimizing children and citizens of the global Internet community. Dr. Nuccitelli and his colleagues seek to educate and protect ICT users against cyberbullies, cyber harassers, cyberstalkers, cyber criminals, cyber terrorist, internet trolls, online sexual predators and those engaged in corporate disparagement and Internet defamation.

The IISC Collection are fourteen 75-330 statement checklists designed to verify a child, adult, or business’s ICT protection preparedness, ICT vulnerability and Internet prevention safety measures are effective (i.e. PISC, PCSC, TISC, AISC.)

To verify and confirm the preparedness, vulnerability and capacity to endure from iPredator attacks for children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools investigating the typologies of iPredator including: cyber bullying (target and offender), cyber stalking, cybercrime and online sexual predators (i.e. CBAC, CBTC, CSPC, OPPC, CCPC.)

To assess preparedness, prevention measures and the capacity to prevail from iPredator attacks on business’s regarding cybercrime, digital reputation, corporate disparagement and internet defamation issues, Dr. Nuccitelli developed data collection and diagnostic tools for corporate entities (i.e. BISC, DRPC.)

To compile data and educate students, clients or patients regarding their Internet protection preparedness, vulnerability, Internet safety prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic tools for educators and behavioral healthcare professionals (i.e. EISC, ISCP.)

iPredator Probability Inventory Collection (IPI)

The IPI Collection is 12 inventories that examine the knowledge, awareness, vulnerability and risk potential of falling prey to a cyber-attack. Dr. Michael Nuccitelli, Chief Executive Officer of iPredator Inc., designed the IPI Assessment Collection and is a New York State licensed psychologist and certified forensic consultant. Unlike the iPredator Internet Safety Checklist Collection (IISC) available to take online at the website or purchase, the IPI Assessment Collection are 12 inventories that are 110-330 questions each and are specific to 11 of the 20 factors Dr. Nuccitelli created to define all iPredators.

The 12 IPI Collection inventories are best used when assessing or evaluating an ICT user or business and when seeking to engage an ICT user in a dialogue about their online activities. The iPredator Checklist Collection (IISC) are similar in construct to the IPI Collection, but are more suited to data collection, investigation and education of ICT users, businesses and pursuit of potential assailants. The IPI Collection is twelve 110-330 item four choice diagnostic inventories designed to assess and/or educate a child, adult, or business’s online protection preparedness, ICT vulnerability, Internet prevention safety measures, online user risk potential and activities, iPredator awareness and iPredator attacks for children, adolescents and adults (i.e. IPI-P, IPI-330, IPI-T, IPI-A.)

To assess and/or educate preparedness, vulnerability, Internet prevention safety measures and the capacity to prevail from iPredator attacks of children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools specific to the typologies of iPredator including: cyber bullying (target and offender,) cyber stalking, cybercrime and online sexual predators (i.e. IPI-CB, IPI-CBA, IPI-CS, IPI-C, IPI-IP.)

To assess and/or educate preparedness, prevention measures and the capacity to prevail from iPredator attacks on business regarding cybercrime, corporate disparagement and Internet libel issues, Dr. Nuccitelli developed a diagnostic tool for corporate entities. A brief description of this inventory is listed below (i.e. IPI-B.)

To assess, compile data and educate students, clients or patients regarding Internet protection preparedness, vulnerable risk potential, Internet safety prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic and educational tools for educators and behavioral healthcare professionals (i.e. IPI-E, IPI-PSY.)

IISC COLLECTION

continuing-education-cyberstalking-cyberbullying-training-ipredator-inc.-new-york-908x434

AISC

Adult Internet Safety Checklist

The Adult Internet Safety Checklist is a 100-item checklist designed for an adult ICT user to verify, confirm and examine their ICT safety and security practices, online vulnerability, risk potential and cyber-attack awareness. The AISC is also designed to investigate an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by iPredators based on their ICT activities and level of cautious approach.

BISC

Business Internet Safety Checklist

The Business Internet Safety Checklist (BISC) is a 100-item checklist designed for a business to verify, upgrade or monitor their ICT safety and security practices. The BISC is a data collection tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors.

CBAC

Cyber Bullying Abuser Checklist

The Cyber Bully Abuser Checklist is a 75-item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent, adolescent or young adult’s vulnerability and risk potential of being a cyber bully and/or engaging in cyber victimization of others. The goal of the CBAC is to investigate & educate children on their vulnerability and risk potential of engaging in teasing, taunting, harassment and disparagement other children using ICT.

CBTC

Cyber Bullying Target Checklist

The Cyber Bully Target Checklist is a 75-item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent, adolescent or young adult’s vulnerability and risk potential of being targeted by a cyber bully. The goal of the CBTC is to investigate & educate children on their vulnerability and risk potential of being targeted by a cyber bully engaged in teasing, taunting, harassment and disparagement of a target child using ICT.

CCPC

Cyber Crime Protection Checklist

The Cyber Crime Protection Checklist is a 100-item checklist designed for an ICT user, their loved ones or business to assess their vulnerability and risk potential of being targeted. The CCPC assesses the probability of being disparaged, stolen from or infiltrated by iPredators, cyber terrorist or nefarious corporate competitors engaged in cyber criminal and/or cyber warfare activities. The CCPC also investigates personal and/or corporate vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors.

CSII

Cyber Stalker Identification Interview

The Cyber Stalker Identification Interview (CSII) is a 75 question diagnostic and data collection tool designed to achieve a three-fold purpose. The three functions include I. Assess the vulnerability and preparedness of a child, adolescent, adult, business or public figure of being cyber stalked and/or cyber harassed. II. Assist law enforcement, legal professionals, parents, adults and businesses in collecting data on the identity of an unknown cyber stalker. III. Assess the extent and skills of the cyber stalker’s tactics and the target’s ICT weaknesses and high-risk behaviors the cyber stalker is attacking.

CSPC

Cyber Stalking Prevention Checklist

The Cyber Stalking Prevention Checklist is a 100-item data collection, diagnostic and educational tool designed to validate and confirm the preparedness of an ICT user, business or organization of being cyber stalked and/or cyber harassed. The CSPC investigates personal and/or corporate vulnerability of being targeted, disparaged, harassed, monitored or infiltrated by cyber criminals, cyber terrorist, cyber stalkers, disgruntled ex-partners, disgruntled past employees/customers or nefarious corporate competitors.

DRPC

Digital Reputation Protection Checklist

The Digital Reputation Protection Checklist is a 100-item checklist designed for an ICT user and/or their business to monitor, protect and manage their digital reputation. The DRPC is a data collection & assessment tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors. The DRPC focuses on the ICT user and the business’s cyber-security breach potential, digital reputation acumen and capacity to successfully institute online reputation prevention and protection strategies.

EISC

Educator’s Internet Safety Checklist

The Educator’s Internet Safety Checklist is a 330- item data collection, diagnostic and informational tool for educators regarding a student’s preparedness and prevention of being cyber bullied, cyber harassed, cyber stalked, sexually solicited and/or victimized by iPredators. In addition to being a data collection tool and general educational template, the EISC can also be used as an adjunct to classroom projects, prevention education plans and educator training seminars on Internet safety.

ISCP

Internet Safety Checklist-Psychology

The Internet Safety Checklist Psychology is a 330- item data collection and diagnostic tool for psychiatrists, psychologists, social workers and behavioral healthcare professionals. The goal of the ISCP is to verify a child, adolescent or adult’s online preparedness and vulnerability of being cyber bullied, cyber stalked, sexually solicited, stolen from and/or victimized by iPredators. The ISCP can be used as an adjunct to individual and group therapy, prevention education training, an adjunct to intake assessments and behavioral healthcare training.

OPPC

Online Predator Prevention Checklist

The Online Predator Prevention Checklist is a 100-item data collection & educational tool designed to educate and investigate a child, adolescent or young adult’s vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. The OPPC investigates areas developmentally relevant to a child and young adult, ages 11-21, which can increase their levels of vulnerability. These areas include sexuality, intimate partnerships, curiosity and motivation for peer group acceptance.

PCSC

Parent Cyber Safety Checklist

The Parent Cyber Safety Checklist is a 330-item education, assessment and data collection checklist designed for parents and primary caregivers on pre-pubescent and adolescent Internet safety and responsible ICT usage. The PCSC is constructed for parents and primary caregivers to verify and confirm their child’s Internet safety and cyber security practices are valid in preventing a cyber-attack by an iPredator.

PISC

Pediatric Internet Safety Checklist

The Pediatric Internet Safety Checklist is a 100-item education, assessment and data collection tool designed for parents, educators and pediatric professionals on pre-pubescent and adolescent Internet safety and responsible ICT usage. The PISC queries and explores areas developmentally relevant to an early adolescent, adolescent and young adult, ages 11-21. The goal of the PISC is to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyber stalking, cyber harassment, cyber bullying or trolling for a target to sexually victimize.

TISC

Teen Internet Safety Checklist

The Teen Internet Safety Checklist (TISC) is a 100-item education, assessment and data collection tool designed for teachers, educators and pediatric professionals related to pre-pubescent and adolescent Internet safety and responsible ICT usage. The TISC is formatted in a manner allowing the adolescent, an adult or both parties to complete the checklist. The TISC queries and explores areas developmentally relevant to an early adolescent, adolescent and young adult, ages 11-21.

IPI COLLECTION

ipredator-inc.-continuing-education-cyberstalking-cyberbullying-cybercriminal-psychology-training-600x600

IPI-330

iPredator Probability Inventory-330

The iPredator Probability Inventory-330 is a 330 question diagnostic, education, assessment and data collection tool designed to investigate a 6-21 year-old child, adolescent or young adult regarding their online victimization risk potential, cyber-attack awareness and support system involvement. The IPI-330 focuses on a child and/or students relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their ICT activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

IPI-A

iPredator Probability Inventory-Adult

The iPredator Probability Inventory-Adult is a 110-question diagnostic, education, assessment and data collection tool designed to investigate an adult’s preparedness, vulnerability, risk potential and cyber-attack awareness. The IPI-A is also designed to assess an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by iPredators based on their online activities and level of cautious approach.

IPI-B

iPredator Probability Inventory-Business

The iPredator Probability Inventory-Business is a 110-question diagnostic, education, assessment and data collection tool designed to assess a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by iPredators or nefarious corporate competitors. Related to cybercrime specific areas, the IPI-B assesses a business’s cyber-security breach potential, digital reputation acumen and capacity to institute Internet safety and cyber security strategies.

IPI-C

iPredator Probability Inventory-Cybercrime

The iPredator Probability Inventory- Cybercrime is a 110-question diagnostic, education, assessment and data collection tool designed to assess and investigate an adult or business’s probability of being targeted, disparaged, stolen from or infiltrated by iPredators or nefarious corporate competitors engaged in cyber criminal activities. The IPI-C focuses on the adult or business’s relationship to ICT, their knowledge base of malevolent and nefarious users and environmental aspects influencing their ICT activities and practices.

IPI-CB

iPredator Probability Inventory-Cyber Bully

The iPredator Probability Inventory-Cyber Bully is a 110-question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online preparedness, vulnerability and risk potential for being cyber bullied and/or harassed. Just as all the IPI Assessment Collection inventories, the IPI-CB focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their ICT activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

IPI-CBA

iPredator Probability Inventory-Cyber Bully Abuser

The iPredator Probability Inventory-Cyber Bully Abuser is a 110-question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online probability and potential to intimidate, humiliate and taunt other children engaging in online harassment and cyber bullying. The IPI-CBA focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their ICT activities and their practice of the behavioral actions necessary for non-adversarial and appropriate online activities.

IPI-CS

iPredator Probability Inventory-Cyber Stalking

The iPredator Probability Inventory- Cyber Stalking is a 110-question diagnostic, education, assessment and data collection tool designed to assess the probability and preparedness of a young adult, adult or public figure of being cyber stalked. In addition to cyber stalking, the IPI-CS investigates the subject’s potential of being cyber harassed by an ex-partner, ex-associate, fan, nefarious corporate entity or pathologically driven ICT user. The IPI-CS focuses on the subject’s relationship to ICT, their knowledge base about iPredators and environmental aspects influencing their ICT activities.

IPI-E

iPredator Probability Inventory-Educator

The iPredator Probability Inventory-Educator is a 330-question data collection, diagnostic and informational tool for educators regarding a student’s online risk potential and vulnerability of being targeted, cyber bullied, cyber stalked, sexually solicited and/or victimized by iPredators. The IPI-E is also used as an adjunct to classroom projects, prevention education plans and educator training seminars on Internet safety.

IPI-IP

iPredator Probability Inventory-Internet Predator

The iPredator Probability Inventory-Internet Predator is a 110-question data collection, diagnostic and educational tool designed to assess a child, adolescent or young adult’s preparedness, vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. The IPI-IP focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their ICT activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

IPI-P

iPredator Probability Inventory-Pediatric

The iPredator Probability Inventory-Pediatric is a 110-question diagnostic, education, assessment and data collection tool designed to investigate a child, adolescent or young adult regarding their online victimization risk potential, cyber-attack awareness and support system involvement. The IPI-P focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their ICT activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

IPI-PSY

iPredator Probability Inventory-Psychologist

The iPredator Probability Inventory- Psychologist is a 330 question data collection, educational and diagnostic tool for psychiatrists, psychologists, social workers and behavioral healthcare professionals regarding a child, adolescent or adult’s ICT preparedness, probability and vulnerability of being cyber bullied, cyber stalked, sexually solicited, stolen from and/or targeted by iPredators. The IPI-PSY can also be used as an adjunct to individual and group therapy, prevention education training, an adjunct to intake assessments and behavioral healthcare training.

IPI-T

iPredator Probability Inventory-Teen

The iPredator Probability Inventory-Teen is a 110-statement diagnostic, education, assessment and data collection tool designed to investigate an adolescent or young adult’s online preparedness, vulnerability and risk potential of being targeted by an iPredator. The IPI-T focuses on the adolescent’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their ICT activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

IATC

Internet Addiction Risk Checklist

The Internet Addiction Risk Checklist (IARC) is a 100- item risk assessment designed to investigate if an Information and Communications Technology (ICT) user is engaging in pathological use of the internet and ICT. The checklist statements have been categorized into cognitive, affective, behavioral and perceptual sections all themed surrounding the compulsive dependent use of digital devices. The IARC can be taken as a self-assessment and when assessing others. Although the IARC is a general assessment for pathological ICT usage, supplement items have been added to focus on the areas of Cyber Sex, Cyber Relationship, Gaming & Online Commerce, Information Implosion & Dark Side ICT usage. Internet Addiction Risk Checklist Download: https://www.ipredator.co/wp-content/uploads/internet-addiction-risk-checklist-2013-ipredator.pdf.

continuing-education-cyberstalking-cyberbullying-internet-safety-training-600x600

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. If you have questions, feel free to call iPredator Inc. anytime at (347) 871-2416 in New York or by sending correspondence using this website’s contact page by clicking on this link: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

HOME-BUTTON-IPREDATOR-INTERNET-SAFETY-IMAGE

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
US
Phone: 347-871-2416

Pin It on Pinterest

Share This