stalking-cyberstalking-cyber-attack-exam-(ipi-cs)-cyber-risk-assessment-ipredator-inc.-new-york-1200 x 600

Cyberstalking Cyber Attack Exam

Cyber Risk Assessment

cyberstalking-cyber-attack-exam-(ipi-cs)-cyber-risk-assessment-ipredator-inc.-new-york-550 × 198

iPredator Probability Inventory-Cyberstalking

[IPI-CS]

Cyber Attack Exam | Cyberstalking Printable PDF Test: The iPredator Probability Inventory-Cyberstalking [IPI-CS]  is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The iPredator Probability Inventory-Cyberstalking [IPI-CS] assesses a child’s online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Cyberstalking [IPI-CS]  is a structured inventory for diagnostics, education, investigation and data collection.

The IPI-CS can also be used for compiling evidentiary information for law enforcement, Internet Service Providers and the legal system if the online user is being suspected of being cyberstalked. Developed by Dr. Nuccitelli, the IPI-CS was designed to help online users assess their potential of being cyberstalked.

Cyberstalking is the use of the internet and Information and Communications Technology [ICT] to taunt, tease, disparage and monitor a target victim[s]. Unlike cyber harassment, internet trolling and cyberbullying, cyberstalking requires a direct or implied physical threat within the harmful information being disseminated. The IPI-CS is a 110-question diagnostic and education tool designed to examine an online user’s cyberstalking risks & internet safety practices. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

iPredator Probability Inventory-Cyberstalking [IPI-CS] $125.00 [USD]

cyberstalking-cyber-attack-exam-(ipi-cs)-cyber-risk-assessment-ipredator-inc.-new-york-600 × 375

iPredator Probability Inventory-Cyberstalking

iPredator Probability Inventory-Cyberstalking [IPI-CS]: The iPredator Probability Inventory- Cyberstalking is a 110-question diagnostic, education, assessment and data collection tool designed to assess the probability and preparedness of a young adult, adult or public figure of being cyberstalked. In addition to cyberstalking, the IPI-CS investigates the subject’s potential of being cyber harassed by an ex-partner, ex-associate, fan, nefarious corporate entity or pathologically driven online user.

Just as all the IPI Assessment Collection inventories, the IPI-CS focuses on the subject’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their online activities and behavioral actions necessary for internet safety and preparedness if cyber attacked. For purposes of the probability estimate the IPI-CS has been designed to assess, this inventory combines aspects of cyberstalking, cyber harassment and habitual online personal disparagement.

An adult, public figure or associate of a public figure, ages 18+, completes the IPI-CS. Once completed, the IPI score, ranging from 0-110, represents the preparedness, vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment or cyberbullying, if the subject being queried is a minor.

The IPI-CS can be used as both a cyberstalking prevention tool and data collection instrument if the online user or business is presently being cyberstalked. The IPI-CS also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

cyberstalking-cyber-attack-exam-(ipi-cs)-cyber-risk-assessment-ipredator-inc.-new-york-529 × 526

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

 

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying,It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

 

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

cyberstalking-cyber-attack-exam-(ipi-cs)-cyber-risk-assessment-ipredator-inc.-new-york-600 × 338

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. If you have questions, feel free to call iPredator Inc. anytime at (347) 871-2416 in New York or by sending correspondence using this website’s contact page by clicking on this link: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

cyberstalking-cyber-attack-exam-(ipi-cs)-cyber-risk-assessment-ipredator-inc.-new-york-800 × 534

 

HOME-BUTTON-IPREDATOR-INTERNET-SAFETY-IMAGE

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
US
Phone: 347-871-2416

cyber stalking-cyber-attack-exam-(ipi-cs)-cyber-risk-assessment-ipredator-inc.-new-york-1200 x 600

Pin It on Pinterest

Share This