20 Internet Safety Tips, Facts
Online Safety Dynamics
Internet Safety Dynamics: iPredator is a global online assailant concept that was formulated by New York State licensed psychologist and forensic psychology consultant, Michael Nuccitelli, Psy.D. iPredator is a term used to describe all online users who engage in criminal, deviant or abusive behaviors using Information and Communications Technology (ICT.) Whether the offender is a cyberbully, cyberstalker, cybercriminal, online sexual predator, or cyber terrorist, they fall within the scope of iPredator.
In the article that follows, this writer presents a brief overview of the 20 factors that were used in the design of the iPredator construct and all of iPredator Inc.’s products, services and educational materials. Although ICT will continue to advance in both technology and applications, the 20 factors listed will be relevant for decades to come. In order to effectively educate, evaluate, investigate or advise any(ICT) user on Internet safety, whether they are a child, adult, group or business, it is paramount to grasp the basic concepts and terms vital to all ICT users.
The importance of ICT and the Internet to humanity is different to everyone and as unique as a fingerprint. For some, ICT and the Internet are nothing more than tools of convenience for conducting mundane tasks. For others, their social, scholastic, business and/or financial affairs disclosed online are crucial to their life functioning, self-esteem, self-worth, success and perceptual world.
As ICT, social media, virtual reality and the Information Age rapidly expands becoming more integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. At present, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within, that all ICT users and their loved ones must be vigilant about.
Note from Author: Development of the theoretical constructs of iPredator and ICT Psychology being pioneered by this writer and his colleagues took hundreds of hours to compile and aggregate. This writer and his colleagues are also firmly aware they have only scratched the surface of a new dimension a mere 20 years old called the Internet and a new cultural paradigm shift in the ways humans obtain, exchange and disseminate information.
Even after this extensive research project led to the creation of these theoretical postulates, this writer was confronted with a plethora of ever-growing questions and quandaries on the present and future importance and of ICT and cyberspace. The Information Age is creating changes in all forms of communication.
Regarding the theory of iPredator and all products, services and trainings this writer has designed to date, the terms and concepts listed below were used in their creation. This writer strongly believes these 20 facets of ICT’s interface with criminal, deviant, and abusive behaviors will be central themes for many years to come. Although ICT will continue to advance in both applications and purposes, the terms and themes presented below will always be integral to ICT safety and security practices. They are as follows:
Free Educational iPredator Inventory Links
- iPredator Probability Inventory – 330 (IPI-330)
- iPredator Probability Inventory – Adult (IPI-A)
- iPredator Probability Inventory – Business (IPI-B)
- iPredator Probability Inventory – Cyberbully (IPI-CB)
- iPredator Probability Inventory – Cyberbully Abuser (IPI-CBA)
- iPredator Probability Inventory – Cybercrime (IPI-C)
- iPredator Probability Inventory – Cyberstalking (IPI-CS)
- iPredator Probability Inventory – Educator (IPI-E)
- iPredator Probability Inventory – Internet Predator (IPI-IP)
- iPredator Probability Inventory – Pediatric (IPI-P)
- iPredator Probability Inventory – Psychologist (IPI-PSY)
- iPredator Probability Inventory – Teen (IPI-T)
Free Educational iPredator Checklist Links
- Adult Internet Safety Checklist (AISC)
- Business Internet Safety Checklist (BISC)
- Cyberbully Abuser Checklist (CBAC)
- Cyberbullying Target Checklist (CBTC)
- Cybercrime Protection Checklist (CCPC)
- Cyberstalker Identification Interview (CSII)
- Cyberstalking Prevention Checklist (CSPC)
- Digital Reputation Protection Checklist (DRPC)
- Educator Internet Safety Checklist (EISC)
- Internet Safety Checklist Psychologist (ISCP)
- Online Predator Prevention Checklist (OPPC)
- Parent Cyber Safety Checklist (PCSC)
- Pediatric Internet Safety Checklist (PISC)
- Teen Internet Safety Checklist (TISC)
1. ICT: Information and Communications Technology (ICT) is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. ICT stresses the role of unified communications and the integration of telecommunications, which enable users to create, access, store, transmit, and manipulate information.
ICT consists of all forms of, information technology, broadcast media, audio and video processing, transmission and network-based control and monitoring functions. Information and communications technology today usually mean computer-based management of data or ideas but will continue to grow with technological advancements. ICT has rapidly become one of the basic building blocks of society becoming increasingly integral as the Information Age matures.
Many countries now regard understanding ICT and mastering the basic skills and concepts of ICT as part of the core of education, alongside reading, writing and mathematics. The importance of ICT to humanity lies upon a continuum of relevance ranging from minimal impact to vital requirement regarding an ICT user’s day-to-day activities. For some, ICT and the Internet are nothing more than tools of convenience for conducting their responsibilities. For others, their social, scholastic, business and/or financial affairs disclosed online are crucial to their self-esteem, self-worth, success and perceptual world.
2. iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, abuse, victimization, stalking, theft or disparagement of others using Information and Communications Technology (ICT.) iPredators are driven by deviant sexual fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by socio-economic status or racial/national heritage. Whether the offender is a cyberbully, cyberstalker, cybercriminal, online sexual predator, Internet troll or cyber terrorist, they fall within the scope of iPredator. The three measures used to define an iPredator include:
I. A self-awareness of causing harm to others using ICT.
II. An intermittent to frequent usage of ICT to obtain, exchange and disseminate harmful information.
III. A general understanding of Cyberstealth used to locate, stalk and engage a target using ICT.
Unlike traditional human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in an abstract electronic universe.
3. ICT Psychology: Information and Communications Technology (ICT) Psychology is the study of cognitive, affective, behavioral and perceptual states in humans related to their interactions with ICT and cyberspace. ICT is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. Cyberspace is an abstract concept used to describe the non-physical terrain created by ICT.
Within this terrain, people obtain, exchange and disseminate information relevant to their needs, goals, developmental requirements and responsibilities. Although ICT defines the devices and applications used to obtain, exchange and disseminate information, ICT Psychology examines ICT in relationship to the human interactions that occur using ICT to interface with cyberspace.
ICT Psychology investigates the cognitive, affective, behavioral and perceptual motivations and drives directly employed using ICT to communicate with an abstract digital environment. ICT Psychology requires a person to interact with ICT as part of their pursuits and responsibilities and assumes these interactions act as a virtual extension of the human mind and social interactions. Just as the field of Psychology has sub-fields of specialty, ICT Psychology also has variations in scope. Whereas and examines human behavior related to cyberspace, ICT Psychology includes ICT as well.
4. Cyber Harassment: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.
Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, cyber harassment continues to flourish. Cyber harassment is the adult form of cyberbullying to a minor.
5. Cyberstalking: Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones via ICT.
Examples of psychological threats involves disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of cyberstalkers. Given the Internet is inexpensive and easy to access, distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target other ICT users and a psychiatric pathology. When Cyberstalking is a tactic, the assailant does not need to be motivated by mental illness.
6. Digital Reputation: Digital Reputation is a term used to describe the reputation of an Information and Communications Technology (ICT) user or business that is disseminated online and available to peers, superiors, loved ones and consumers. This information can be positive or negative and vital to the health, success and reputation of an ICT user or business.
Digital Reputation is created and sustained by peers, school or work associates, loved ones, acquaintances, consumers, competitors, adversaries, online strangers and iPredators. Given the widespread growth and expansion of ICT, a positive digital reputation is vital to people, communities and businesses to thrive, survive and for attainment of personal endeavors.
Digital Reputation and the growing risks confronting ICT users and businesses have become increasingly endemic due to the escalating use and significance of the Internet as a communication platform. With the ascent of social media, the formation of Digital Reputation is an increasingly common process and the practices of Digital Reputation Management has become crucial for both individuals and corporate entities. An ICT user or business’s Digital Reputation is directly correlated to their Digital Footprint. Like Digital Footprint, an ICT user’s Digital Reputation is directly correlated to the quantity, quality, accuracy and extent of personal information they post or share online available and used by other ICT users.
7. Digital Footprint: Digital Footprint is a term used to describe the trail, traces or “footprints” that children, adults and businesses leave in cyberspace from their online activities using Information and Communications Technology (ICT.) This is information that is obtained, exchanged or disseminated between ICT users. An ICT user’s Digital Footprint is created by social media information, forum registrations, e-mails, attachments, videos, digital images and other forms of communication via ICT that leave traces of personal and/or corporate information about someone and/or a business available to others online. An ICT user or business’s Digital Reputation is directly correlated to their Digital Footprint.
An ICT user or business’s Digital Reputation is created by a culmination of their Digital Footprints over a period of time. Like Digital Reputation, an ICT user’s Digital Footprint can be positive or negative and vital to the health, success and reputation of an ICT user or business. Personal information disclosed or shared online all contribute to an online user’s Digital Footprint in the age of social media. Like Digital Footprint, an ICT user’s Digital Reputation is directly correlated to the quantity, quality, accuracy and extent of personal information they post or share online available and used by other ICT users. It is for these reasons that a child, adult or business must be diligent in monitoring their Digital Footprint.
High Risk ICT
8. High Risk ICT: High Risk ICT factors are defined as actions and behaviors an Information and Communications Technology (ICT) user participates in online, which increases their probability of becoming a target of an iPredator. These actions and/or behaviors differ depending on the age, gender, environmental influences and psychological status of the online user interacting with ICT. High Risk ICT factors tend to be rooted in non-compliance, ignorance or of following proper Internet safety and iPredator protection tactics when engaged in high-risk online behaviors.
High Risk ICT factors are highly susceptible to environmental stressors and psychological dysfunction. High Risk ICT factors tend to be most problematic for children, but adults can be equally susceptible. Of the myriad of high-risk behaviors an ICT user can engage in leading to an increased risk probability of being victimized, the following six behaviors are strong predictors of online victimization for children and correlated to adult online victimization:
I. Interacting online with unknown ICT users.
II. Having unknown online users on their “buddy” or “friends” lists.
III. Interacting online with unknown ICT users engaged in topics on sexuality.
IV. Viewing or downloading pornographic or “dark” content online.
V. Behaving in a rude, harassing or abusive manner towards other ICT users.
VI. Posting or sharing personal and/or contact information available to unknown ICT users.
9. ICT Awareness: The ICT Awareness factor is defined as the level of awareness an Information and Communications Technology (ICT) user or business has related to their practice of Digital Citizenship and how they are perceived by other ICT users. This factor examines an ICT user or business’s understanding of , cyber security and how their ICT practices are translated by other ICT users. ICT Awareness is a conscious state and overture that is part of a strategy, practice and consistent sustained approach to reducing the probability of being misrepresented by others or becoming an online victim.
These strategies involve a concerted effort to understand how they are perceived by other ICT users. The ICT Awareness factor also describes the amount of information a parent, family member, support group, educator, loved one or business has accrued related toand Internet safety measures used to insulate a child, adult or business from becoming a target of an iPredator. The ICT Awareness factor includes:
I. The ICT user or business support system’s understanding of ICT & Digital Citizenship
II. An iPredator’s techniques and tactics used in Cyberstealth with ICT
III. An ICT user’s conscious efforts to engage in Digital Citizenship and Internet safety habits and
IV. An ICT user or business’s proactive self-monitoring of how they are perceived by other ICT users.
Mobile Device Technology
10. Mobile Device Technology: The Mobile Device Technology factor is defined as a collective term representing the portable genre of Information and Communications Technology (ICT) that describes the various types of mobile devices used by children, adults and businesses. Examples include cellular phones, smartphones and tablets. The factor also relates to a child, adult or business’s knowledge and application of mobile device safety.
The term, Mobile Device, is a generic term used to refer to a variety of devices that allow people to access data and information from wherever they are. This includes cell phones,and various other portable devices. The Mobile Device Technology factor also examines the child, adult or business’s understanding of how they interact with their mobile devices and how iPredators use mobile device technology to target and locate their victims.
However, mobility has far-reaching effects on the enterprise in areas such as security risk, use policies, manageability and governance. Given the rapid growth and inevitable broad expansion of mobile device technology, this area will become increasingly more relevant regarding all ICT users practicing cautious and proactive. Given the fast pace nature of human civilization, mobile device technology will become mandatory requirements for anyone seeking to connect with their loved ones, colleagues, peers and community resources.
11. Personal Information: The Personal Information factor is a term used to describe the quantity and frequency of personal information an Information and Communications Technology (ICT) user or business shares with other ICT users and available to known and unknown ICT users to view and prospect. Examples of personal information include their home/work/school address, full names, name of school/employer, age, gender, financial information, images, videos and online activities (i.e. passwords, usernames, profiles.)
The Personal Information factor relates to the ICT user or business’s knowledge and understanding of the risks created when they post and/or share their contact or personal information about their age, gender, daily routines, sexual predilections and online preferences and/or activities.
With an abundance of popularlike Facebook, Snapchat, Twitter and LinkedIn, it has become easy for iPredators to target children and adults to amass their personal information. Images and videos posted publicly online can leave a trail easily traceable by iPredators.
The Personal Information factor is the most important aspect ofcautioned to all ICT users. iPredators heavily rely on access and acquisition of their potential target’s personal information. Given their advanced ICT prowess and ability to manipulate vulnerable ICT users, many iPredators do not have to rely on social networking sites to obtain the necessary personal information to locate, identify and target their victims.
12. Psychological State: The Psychological State factor is a generic term used to define psychological aspects of an Information and Communications Technology (ICT) user or group of ICT users at the time they are engaged in online activities and how these psychological factors influence their capacity to practice Internet safety and security. The more isolated, discouraged or angry an ICT user feels, the more apt they are to engage in high-risk ICT activities discouraged by Internet safety guidelines.
The Psychological State factor relates to the ICT user or business’s knowledge and understanding of how cognitive, affective, behavioral and perceptual processing states govern ICT activities. Of the twenty factors designed in the iPredator theoretical construct, the ICT user’s psychological state is primarily influenced by their home, career and/or school environments and highly relevant to their ICT activities and risk potential.
For all ICT users, their offline stressors, conflicts and environmental obstacles have a direct effect upon their ICT demeanor. And responses. When home, school, work, finances or other offline factors are causing significant distress, research has proven ICT users of all ages are more apt to be less vigilant in ICT and Internet safety tactics and more likely to engage in higher risk online behaviors. When an ICT user is in a perceived stable, encouraging, structured and consistent environment, their psychological well-being affords them to be more cautious and conscientious of their ICT activities.
13. Social Media: The Social Media factor is used to describe the online technologies and practices an Information and Communications Technology (ICT) user accesses to share their opinions, insights, experiences and perspectives related to their personal, career and/or scholastic activities at social networking websites. is defined as forms of electronic communication through which users create online communities to share information, ideas, private messages, and other content.
The Social Media factor relates to the ICT user’s knowledge and understanding of their energy, time and importance they place on their social media profiles and networking endeavors, perceived online image and their interactions with other ICT users using social networking websites.
More specifically, Social Media refers to the use of web-based and cyberstalking.to turn communication into an interactive dialogue. Within this factor, the areas investigated include the themes and quantity of personal and sensitive information an ICT user allows other ICT users to view related to themselves, their loved ones or their employers or academic institutions. A growing number of ICT users place an incredible amount of time, effort and thought into their social networking site profiles and endeavors. Social media has become a driving force in many ICT users lives and a frequented arena for cyberbullying, cyber harassment and
14. iPredator Protection: The iPredator Protection factor is defined as the amount of effort, time and education an Information and Communications Technology (ICT) user or business engages in to reduce their probability of becoming a target of an iPredator. Slightly different from the ICT Awareness & iPredator Awareness factors used in the iPredator construct, iPredator Protection emphasizes the protective measures and protection-based software, hardware and applications an ICT user monitors, obtains and employs.
The iPredator Protection factor relates to the ICT user or business’s knowledge, participation and understanding of the necessary measures and strategies they should or should not engage in related to their ICT activities.
The iPredator Protection factor assesses if the ICT user or business actively practices ICT safety, cyber security, sets appropriate online restrictions and prepared to respond accordingly if they are targeted by an iPredator or nefarious corporate entity related to businesses. In relationship to children, the iPredator Protection factor also includes the effort, knowledge and tactics of parents, educators and the child’s support system to insulate and protect them from iPredator.
Just like any unfamiliar environment humanity is presented, it is paramount for all ICT users to always be cautious when engaged in communications in cyberspace. ICT users adept at iPredator Protection are knowledgeable of all there is to protect themselves, their loved ones or business.
15. iPredator Awareness: The iPredator Awareness factor describes the amount of information, knowledge and conscious preparedness an Information and Communications Technology (ICT) user has related to iPredators and their existence in cyberspace. Vital to iPredator Awareness is and ICT user or business’s capacity to understand the methods and techniques iPredators use to locate, identify, stalk and attack their target they deem as vulnerable and/or deserving of their victimization and .
The iPredator Awareness factor relates to the ICT users knowledge and understanding of the tactics and techniques an iPredator uses. iPredators can be any age, either gender and not bound by socio-economic status or racial/national heritage. Within each category of iPredator, a degree of victimization lies upon a continuum of severity ranging from mild to severe regarding their intent, goals and modus operandi.
The key terms examines in the iPredator Awareness factor is awareness or a consistent level of caution practiced by the ICT user that is fueled ny the ICT user or business’s knowledge that iPredator’s may launch a cyber-attack. The level of iPredator Awareness practiced by an ICT user is defined by their psychological, emotional and environmental stability. The less stable the ICT user is with these human experiences, the less aware they are of the nefarious and malevolent entities that access ICT for vulnerable targets.
16. Cyberbullying: Cyberbullying is defined as threatening or disparaging information directed at a target child delivered through Information and Communications Technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyberbullying includes a phenomenon called Cyberbullying by proxy.
Cyberbullying by proxy is when a cyberbully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyberbullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community.
Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of cyberbullying can become psychologically devastated and/or cyberbullies themselves.
ICT Forensic Psychology
17. ICT Forensic Psychology: Information and Communications Technology (ICT) is a sub field of ICT Psychology and defined as the study of cognitive, affective, behavioral and perceptual states in humans related to their malevolent, nefarious, deviant or criminal interactions with ICT, cyberspace and their targets or victims. ICT is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. Cyberspace is an abstract concept used to describe the non-physical terrain created by ICT. Within this terrain, people obtain, exchange and disseminate information relevant to their needs, goals, developmental requirements and responsibilities.
ICT Forensic Psychology explores the individual and group manifestations of behavioral, perceptual & psychological patterns within cyberspace in the areas of investigation and prevention of criminal violations, deviant behaviors and online victimization. ICT Forensic Psychology analyzes the psychological mechanisms by which antisocial views and habits arise and take root in a person or groups perceptual world, the process by which their criminal goals and motives are formed and how these criminal/deviant goals implemented involve ICT and cyberspace. ICT Forensic Psychology works to investigate and understand the psychological, behavioral and perceptual mechanisms of individuals and groups who utilize ICT to victimize, harm, cloak or steal from other ICT users, groups or businesses.
18. Digital Citizenship: Digital Citizenship is defined as the appropriate norms of behavior regarding Information and Communications Technology (ICT) usage. addresses the multiple levels of responsibility encouraged for all ICT users when interacting with the devices & applications of ICT and cyberspace. The rules of Digital Citizenship include online etiquette, confidential information protection, online safety measures, dealing with cyberbullying and harassment, digital rights & responsibilities and cyber security.
Digital Citizenship endeavors to advocate, model and teach others safe, legal, and ethical use of ICT including respect for copyright, intellectual property and the appropriate documentation of sources. Educators of Digital Citizenship understand regional and global societal responsibilities in an evolving and rapidly expanding digital culture
Although Digital Citizenship involves multiple facets, a primary goal is the practice of ICT etiquette and responsible social interactions. ICT etiquette are the electronic standards of conduct and behaviors when interacting with others and respect for the information one posts and disseminates regarding other ICT users. It is assumed the more adept an ICT user is practicing Digital Citizenship, the less likely he/she is at being targeted by an iPredator. As described in the iPredator Protection factor used to create the theory of iPredator,is recognized as an iPredator Protection approach.
19. Dark Psychology: Dark Psychology is a theoretical construct designed by New York State licensed psychologist and forensic psychology consultant. is defined as the study of the human condition as it relates to the instinctual, sociological and psychological nature of people to prey upon others that falls along a continuum ranging from purposive and/or instinctual to purposeless and anti-evolutionary or evil. All of humanity has this potential to victimize other humans & living creatures. While many restrain or sublimate this tendency, some act upon these impulses.
Dark Psychology assumes that this production is purposive and has some rational, goal-oriented motivation 99% of the time. The remaining 1%, under Dark Psychology, is the brutal victimization of others without purposive intent or defined by evolutionary science or religious dogma.seeks to understand the cognitive, affective, behavioral and perceptual states that lead to predatory behavior.
Within the next century, the growth of Information and Communications Technology (ICT,) iPredators and their acts of theft, violence and abuse will become a global phenomenon and societal epidemic if not squashed. Segments of iPredators include cyberstalkers, cyberbullies, cyber terrorists, cyber criminals, online sexual predators and political/religious fanatics engaged in . Just as views all criminal/deviant behavior on a continuum of severity and purposive intent, the theory of iPredator follows the same framework, but involves abuse, theft, assault and victimization in cyberspace.
20. Cyberstealth: Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT), if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Therefore, as the Internet naturally offers all ICT users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovativeor researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is IVI or iPredator Victim Intuition. By using Cyberstealth, an iPredator’s IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications.
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, Cyberpsychology researcher and online safety educator. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli published his dark side of cyberspace concept called “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving online assailants, cyber-attack targets, dark psychology and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.
In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to start a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at or via email at email@example.com.