Cyberbullying – 20 National Bullying Prevention Month Images

Cyberbullying – 20 National Bullying Prevention Month Images

national bullying prevention month-stop cyberbullying

Cyberbullying

20 National Bullying Prevention Month Images

national-bullying-prevention-month-14

October is National Bullying Prevention Month in the United States. It is during this time of the year that America focuses on bullying and cyberbullying prevention. Bullying and cyberbullying are social problems that can cause serious physical and psychological harm to children and their loved ones. As of 2017, bullying and cyberbullying are still defined as pediatric problems involving minors.

Adult bullying, cyber harassment, internet trolling and workplace bullying are all similar terms used when adults are involved as either aggressor or target. Although this writer views bullying and cyberbullying applying to all ages, they will be presented as a pediatric phenomenon until consensus accepts them as being non-age related.

Stop Cyberbullying

With the advent of the Information Age, cyberbullying has become the predominant issue facing all facets of society. So, to help educate citizens of the Information Age, provided below are 20 free cyberbullying tactic images to download, share and edit.

To download and save, simply right-click on any image and then click “save as” to download to your computer or mobile device. All images are ranging from 940-960px wide. They were designed for awareness and educational purposes only. Editing these images to harm other online users is not permitted.

Cyberbullying Defined

Cyberbullying is defined as recurrent and sustained verbal and/or physical attacks by one or more children towards another child using Information and Communication Technology (ICT). Like classic bullying, cyber bullying is harmful, repeated and hostile behavior intended to deprecate another child for reasons other than self-defense.

Cyberbullying involves threatening or disparaging communications delivered through ICT that can occur anonymously, publicly or by using felonious identities. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, online bullying consists of data exchanged via ICT and may never involve face-to-face meetings.

Cyberbullying is an abuse centered interpersonal dynamic that includes aggressors, targets and bystanders. The main developmental issues fueling cyber bullying are peer acceptance, recognition and occasionally retribution. Not all cyberbullying is fueled by dark developmental needs or perceptual distortions. There are instances when children cyberbully other children due to their ignorance or belief that they are joking.

20 Cyberbullying Tactic Awareness Images

national-bullying-prevention-month-ipredator

PORNOGRAPHY & MARKETING LIST INSERTION

national-bullying-prevention-month-12

PSUEDONYM STEALTH

national-bullying-prevention-month-13

GRIEFING

national-bullying-prevention-month-19

MOBILE DEVICE IMAGE DISSEMINATION

national-bullying-prevention-month-8

SEXTORTION

national-bullying-prevention-month-21

WEB PAGE ASSASSINATION

national-bullying-prevention-month-11

IM ATTACKS

national-bullying-prevention-month-2

MALICIOUS CODE DISSEMINATION

national-bullying-prevention-month-7

DENIGRATION

national-bullying-prevention-month-17

SCREEN NAME MIRRORING

national-bullying-prevention-month-1

WARNING WARS

national-bullying-prevention-month-20

INTERACTIVE GAMING HARASSMENT

national-bullying-prevention-month-5

TEXT WARS & TEXT ATTACKS

national-bullying-prevention-month-9

PASSWORD THEFT & LOCKOUT

national-bullying-prevention-month-6

NON-CONSENSUAL MULTIMEDIA DISSEMINATION

national-bullying-prevention-month-3

TRAGEDY NEWS MIRRORING

national-bullying-prevention-month-4

EXCLUSION

national-bullying-prevention-month-22

VOTING & POLLING BOOTH DEGRADATION

national-bullying-prevention-month-10

TRICKERY

national-bullying-prevention-month-18

DIGITAL PIRACY INCLUSION

national-bullying-prevention-month-16

“Not to say that pre-Information Age bullied children were not traumatized, but cyberbullied children are relentlessly tormented 24 hours a day, 7 days a week and 365 days a year.”  Michael Nuccitelli, Psy.D. (2014)

iPredator Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain.

iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Cyberbullies Equal One iPredator Typology

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available.

Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic psychology consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the dark side of cyberspace.

Soon after, Dr. Nuccitelli launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. In 2017, he launched his personal internet safety content blog, Michael Nuccitelli, Psy.D.

These sites offer online users an incredible amount of free information, education, and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.

national-bullying-prevention-month-15

Support National Bullying Prevention Month

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites, listed below, they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media. To invite Dr. Nuccitelli to conduct training, educational services or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

national-bullying-prevention-month-home-button

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and author of the dark side of cyberspace construct called iPredator. This website offers free educational internet safety and online assailant awareness themed content.
New York
US
Phone: 347-871-2416

Michael Nuccitelli, Psy.D. Internet Safety Notes & Quotes

Michael Nuccitelli, Psy.D. Internet Safety Notes & Quotes

michael-nuccitelli-internet-safety-online-assailant

Michael Nuccitelli, Psy.D.

Internet Safety Notes & Quotes

Internet safety notes & quotes is a blog post of concepts, terms, defintions and quotes related to the research conducted by Michael Nuccitelli, Psy.D. The content is free to download and share for educational purposes. At the base of this post, interested parties can download the PDF paper by clicking on the red PDF Download button. No personal information is required for the direct download.

Dark Psychology (2006)

Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon others. All of humanity has this potential to victimize other humans & living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings and perceptions that lead to human predatory behavior. Dark Psychology assumes that this production is purposive and has some rational, goal-oriented motivation 99.99% of the time. The remaining .01% is the brutal victimization of others without purposive intent or reasonably defined by evolutionary science or religious dogma.

Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

iPredator (2010)

iPredator is a person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace.

michael-nuccitelli-stop-cyberbullying-internet-safety

Cyberbullying

Cyberbullying is threatening or disparaging information directed at a target child delivered through Information and Communications Technology (ICT). Like traditional bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to traditional bullying is cyberbullying includes a phenomenon called “Cyberbullying by proxy”. Cyberbullying by proxy is when a cyberbully encourages or persuades other ICT users to engage in deprecating and harassing a target child.

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, the Narcissistic Cyberbully, feels minimal remorse for the harm they inflict upon their victim. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum.

Cyberstalking

Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands.

Cybercrime

Cybercrime is criminal activity using Information and Communications Technology (ICT) as the tools to target victims or businesses. All forms of cybercrime involve both ICT and a targeted victim(s). Cybercrime is segmented into two distinct categories involving the focus of the cybercriminal activities. These activities are focalized on the technology of Information and Communications Technology (ICT) to achieve the cybercriminal’s aims for personal and financial gain or targeted at others or businesses.

When the individual is the main target of cybercrime, ICT is the tool rather than the target. These are the crimes, which have existed for centuries in offline societies. Cybercriminals utilize technological tools to increase their potential pool of victims and make them difficult to identify and apprehend. Presently, the most common types of cybercrime are identity theft, hacking, online scams, fraud, computer system attacks, illegal online content, prohibited online content and digital piracy.

Cyber Harassment

Cyber Harassment is the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a direct or implied threat of physical harm. Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT and is verbal, sexual, emotional or social abuse of a person, group or organization. The cyber harasser’s primary goal is to exert power and control over the targeted victim(s).

When minors are involved, cyberbullying is the term describing cyber harassment and when direct or implied physical harm to the targeted victim(s) is involved, cyber harassment becomes cyberstalking. Another similar term often used to define cyber harassment, but slightly different in assailant modus operandi is Internet Troll.

michael-nuccitelli-internet-safety-cyber-terrorism

Cyber Terrorism

Cyber terrorism has multiple definitions and applies to a variety of cyber attack intricacies that may involve one online assailant or many. As a typology of iPredator, Cyber terrorism is defined as the cognitive, affective, behavioral and motivational factors of terrorist groups or their agents who use Information and Communications Technology (ICT) to impair, harm or destroy non-combatant targets. Cyber terrorism is different from activism, hacktivism and cybercrime in that the primary purpose of a cyber terrorist attack is to cause physical violence or extreme financial harm.

Per the U.S. Commission of Critical Infrastructure Protection, cyber terrorist targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. More specifically, cyber terrorism attempts to interrupt, destroy or exploit another group or nation’s ICT vulnerabilities to adversely affect their critical infrastructure.

Online Predators & Online Child Pornography

Online Predators: Online Predators has a variety of different terms used to describe the same patterns and motivations for their abuse. Historically, those who are not familiar with the profiles of sexual predators, pedophiles and child molesters tend to view them as being easily identified and incompetent. Not only are most sexual predators their victim’s neighbor, relative or mentor, but the “veil of anonymity” in cyberspace makes accurate assailant identification a daunting task.

Online Predators are defined as adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes. Online Predators are sexual predators who use Information and Communications Technology and social media to locate, target and victimize minors. Although online sexual predation occurs between adult online users, the underage minor child is the primary target.

Online child pornography is the production, consumption and distribution of sexual content involving minors. Although becoming the 8th iPredator typology, it falls within the online child predator genre. To be more specific, online child pornography includes online users who are sexually aroused by, or financially motivated by online sexual content involving minors. Consumers and distributors of online child pornography are not all sexually aroused by the content, but by the financial rewards to be gained.

michael-nuccitelli-internet-safety-troll

Internet Trolls

An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to provoke, defame, anger, tease, flame, or incite other online users. Often, the internet troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions.

The motivations for an internet troll’s provocative behaviors are numerous. Despite the variations in modus operandi, most trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the internet troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors.

Troll Triad

Troll Triad is a cyber psychopathology and profiling construct that introduces a three-pronged archetypal model defining groups of online users who engage in defamation of character, slander & libel. Troll Triad is not just a facetious term describing groups of malevolent online users who use Information and Communications Technology to defame, manipulate, curry favor and seek support from other like-minded online users.

Troll Triad is also a conceptual framework and template describing how groups of successful iPredators are partitioned into three archetypal segments. This troika includes the Cerebral, Provocateur and the Crier. When these three elements mix correctly, the Troll Triad becomes a masterpiece of human predation alchemy. Being a disciple of Carl Jung and Alfred Adler, I strongly subscribe to Carl Jung’s theory of Archetypes and Alfred Adler’s theory of Social Interest. Using their constructs as guidelines, Troll Triad is a concept relevant to the Information Age.

Predatory Trolls

Predatory Trolls are a new breed of internet troll that evolved from the classic troll. They are online users who both choose online users randomly and intentionally. Just as classic trolls, predatory trolls can be ex-work associates, ex-partners and loved ones. They may also be unknown online users. Predatory trolls may target others alone, but increasingly work in groups (aka, Troll Triad). Like all trolls, Predatory trolls are driven by needs for power, recognition, peer acceptance and control.

Different from classic trolls is that their primary goal is to destroy an online user’s reputation, online presence and trustworthiness. With the advancement of Information and Communications Technology (ICT), predatory trolls may be employed by groups and governments in covert operations to destroy a target’s reputation. Predatory Trolls seek to destroy their target’s reputation and the reputation of their family members, children, careers and loved ones.

5PV Model

The 5PV Model is a cybercriminal five factor theoretical model used to define all interactions between people who use Information and Communications Technology (ICT) for personal and/or benevolent reasons and those who use ICT for selfish, nefarious and/or malevolent reasons. The five terms of 5PV are iPredator, iPrey, iPrevention, iPreservation and iVictim. The 5PV model is a representation of the five elements involved in criminal, deviant and abusive human interactions as they relate to the internet and Information and Communications Technology.

The primary difference between this model and all other criminal, deviant and abuse areas is the environment. The artificial environment is cyberspace and benefits the iPredator. Unlike any other territory, humanity has explored since the beginning of human civilization, cyberspace is a frontier where the potential iVictim has little grasp to evaluate social exchanges in a realistic way.

iPredator Bridge

iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies.

Like the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal and/or deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.

michael-nuccitelli-internet-safety-cyber-online-deception

Cyberstealth

Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in online deception. Given the internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted.

The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment. Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users.

Offline Distress Dictates Online Response (ODDOR)

Offline Distress Dictates Online Response (ODDOR) is a sub-tenet of iPredator, which posits that offline psychological functioning directly influences one’s online interactions. Whether someone is an online assailant, cyber attack target or both, ODDOR does not discriminate. ODDOR postulates that temporary and long-standing psychological states can significantly taint an online user’s behaviors and interpretations. Perceptually isolated, ignorance of the existence of ODDOR and experiencing atypical affective and cognitive states increases the probability of being targeted by an online assailant.

In addition to being at a greater risk of being cyber attacked, ODDOR influences an online user to partake in destructive and self-destructive online activities. If a person is self-aware and reasonably healthy, their levels of ODDOR are less likely to become problematic. Just as self-awareness acts as a buffer between mental health and dysfunction, the same holds true for ODDOR.

michael-nuccitelli-internet-safety-online-psychopaths

Online Psychopathy (aka, iPredopathy)

Online Psychopathy (aka, iPredopathy) is an Information Age criminology and human consciousness construct replacing the pre-Information Age profiles of sociopathy and psychopathy. iPredopathy is an advanced stage characterological disorder describing any adolescent to adult male or female who skillfully uses Information and Communications Technology [ICT] to troll, identify, control and manipulate their human targets. Driven by grandiosity, sexual perversion or perceptual distortion, iPredopaths experience no remorse or shame for the harm they cause others.

Just as iPredators, many iPredopaths do not break the law and live unscathed by law enforcement, fraternal organizations, religious institutions and the legal system.

Using cyberspace [aka, Internet, Darknet, Usenet] and electronic devices, Online Psychopaths [aka, iPredopaths] design and implement their criminal, deviant, violent, deceptive and cyberstalking tactics. Their human quarries are unsuspecting, vulnerable, submissive and internet safety ignorant children, older adults, unprepared businesses and psychologically distressed adults.

Phantasist

A Phantasist is an online user who obsessively prioritizes & protects their profile, avatar or persona to engage in malevolent or nefarious activities. In most cases, they use the online persona to hide their identity and exploit or intimidate others. The Phantasist has difficulty differentiating their true self from their online identity (aka, Reality-Virtuality Continuum), which is driven by their need to control, subjugate or seek attention from others.

Although probable, a Phantasist does not have to suffer from a mental illness, personality disorder or medical condition. For unknown reasons, the Phantasist increasingly becomes absorbed by their online identity. Enveloped by their online identity, they enter what has been termed the Aspect. The Aspect is the psychological and perceptual realm whereby their offline life becomes indistinguishable from their online life. Age of onset, frequency of Aspect states and time spent online determine the severity of the Phantasist.

Information Age Education (IAE)

Information Age Education (IAE) is a cyber attack prevention paradigm offering a resolution to reducing the negative consequences of living in the Information Age. Information and Communications Technology presents positive and negative influences upon humanity, in which the negative aspects grow at a feverish pace. Cyberbullying, cyberstalking and online sexual predation are just a few of these destructive forces. IAE prioritizes prevention education, non-denominational family values, and humility as solutions to connecting the disconnected, educating the ignorant, and conquering the corrupt.

IAE assumes that, along with the plethora of gifts and benefits information technology offers society, the dark side of cyberspace has ensnared an ever-growing number of the online citizenry. IAE suggests that people of all ages are migrating towards a state of disconnectedness, shying away from tangible interpersonal relationships, family values, the practice of humility and just basic kindness. IAE asserts that the only way to thwart the disintegration of disconnectedness is by awareness and cyber attack prevention education.

michael-nuccitelli-internet-safety-oppedohunt

Information Age Wellness (IAW)

Information Age Wellness is the practice and study of how Information and Communications Technology (ICT) influences people’s physical, psychological, perceptual and spiritual well-being. By incorporating safe and productive knowledge and practices, citizens and their loved ones of the Information Age are both safer from cyber attacks and able to focus on mind, body & spiritual optimization endeavors. IAW incorporates mind, body, spirit and technology for those seeking a healthy lifestyle.

It is a combination of Internet Safety, Spirituality, Integrative Medicine & Health Psychology while recognizing the growth and dependency of information technology upon people. IAW should not be confused with online healthcare, telemedicine, e-health or any other medically themed field that interfaces with Information and Communications Technology. Information Age Wellness is more of a conceptual framework, which includes physical health, adaptive psychological functioning, spiritual health & well-being in relationship to technology.

Information Age Forensics (IAF)

Information Age Forensics (IAF) is the science and technology of investigating the typologies, motivations, tactics and psychopathology of iPredators who use Information and Communications Technology (ICT) for maladaptive, deviant or criminal objectives. IAF examines the iPredator typologies of cyberbullying, cyberstalking, cyber harassment, internet trolling, cybercrime, online sexual predation, cyber terrorism and habitual online deception. Vital to full comprehension of IAF is considering valid the premise of iPredators being variants of the classical criminal, deviant and aggressor.

Information and Communications Technology, cyberspace and the Information Age have created an entirely new population segment thriving off information technology for maladaptive and anti-social goals. Information technology and cyberspace are not tools used by Information Age aggressors (iPredators). They are a fundamental part of this new generation seeking to harm, victimize, control or dominate their chosen victim(s). Information Age Forensics (IAF) integrates the fields of Criminal, Cybercriminal, Abnormal and Developmental Psychology with iPredator and Digital Forensics Investigation.

michael-nuccitelli-internet-safety-internet-addiction

Internet Addiction

Internet Addiction (aka, Internet Abuse, Internet Dependence & Internet Use Gaming Disorder) is an umbrella concept defining a child or adult’s compulsive and progressive abuse of the internet and electronic devices designed to obtain, exchange or disseminate information. Although the internet is the predominate arena in which Internet Abuse takes place, electronic devices and communications channels not internet enabled are also included in the definition. Internet Abuse causes dysfunctional cognitive, affective, behavioral & perceptual intrapersonal consequences accompanied with employment, academic, familial, peer & intimate partner interpersonal consequences.

On a continuum of severity, ranging from absent to mild, cessation of Internet and/or electronic device usage causes withdrawal symptomology, psychological and/or physiological, combined with perceptual tolerance. Also on a continuum of severity, Internet Abusive online users engage in criminal, deviant and/or deceptive online activities ranging from absent to severe. The chronic and more debilitating condition, Internet Dependence, is more chronic, severe and self-destructive.

iPredator Victim Intuition (IVI)

iPredator Victim Intuition (IVI) is an iPredator construct sub-tenet reserved for seasoned online assailants. IVI is an iPredator’s aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their cyber attack success with minimal ramifications. Some iPredators develop an intuition for knowing what Information and Communications Technology (ICT) user will be a successful target through practice, learning and observation of other iPredators.

Practice, trial and error, understanding of human behavior and knowledge of internet safety and information security practices is where an iPredator’s IVI acumen thrives. An iPredator’s IVI falls on a continuum of dexterity whereby there are iPredators who are IVI skilled and iPredators who are novices. Whether the iPredator is advanced or a novice in their IVI acumen, the fact that they engage in developing an IVI makes them a potentially dangerous ICT user.

Cyberspace is an Extension of Human Consciousness

(CEHC)

CEHC is a theoretical concept positing that Information and Communications Technology (ICT) is gradually becoming, or already is in a rudimentary form, an extension of human consciousness and subjective processing. It is postulated that the digital universe is an abstract and artificial realm, which is evolving into an exact replica of the human brain. Neuronal connections and digital networks appear incredibly similar. Place an image of the internet and an image of the brain’s neuronal connections side-by-side and they look exactly the same.

It is easy to accurately conclude that technology has been created by a vast number of thinking human beings. Under this premise, it is not a leap of faith to assume that the legion of brains, working on technological advancements, are creating a replica of itself. An inorganic facsimile of the most complex organic machine called the brain. The closer our collective brains get to creating a Xerox copy of itself, the more human consciousness will view cyberspace as an attractive option.

The brain and unconscious are designed to have self-preservation as the primary goal. Since the physical body is finite, a day will come when human consciousness will be capable of transferring to the vast ocean of cyberspace. Once this occurs, the physical shell called the body is no longer needed. CEHC is not artificial intelligence, but the future home of human consciousness within a digital framework. Although there is no research yet to confirm the existance of CEHC, the anocdotal and personal experience evidence is immense.

Internet Safety & iPredator Quotes

michael-nuccitelli-internet-safety-online-safety

“Comfort the Victims, Educate the Ignorant & Conquer the Corrupt.”

Michael Nuccitelli, Psy.D. (2011)

Information and Communications Technology (ICT), social media and cyberspace itself has the uncanny ability to tap into our perceptual world and distort our interpretations of oneself and others. For those who experience gratitude, it benefits the human condition and community. For those who suffer wrath, anguish or ingratitude? Condemnation of self and society becomes the weapon. Offline Distress Dictates Online Response (ODDOR) is a phenomenon new to Information Age human consciousness“.

Michael Nuccitelli, Psy.D. (2011)

“Cyberspace does not forgive, forget or explain. What we publish online is permanently imprinted like memories of the mind.”

Michael Nuccitelli, Psy.D. (2012)

“Society is being lulled into a false sense of trust and reliance on technology, taking information and “connection” to others in cyberspace at face value. Like the child in the fairy tale, Little Red Riding Hood, innocently wandering through the forest, we erroneously believe that the “Wolf” is whoever he appears or claims to be. Just as Little Red Riding Hood, we’re in danger of falling prey to iPredator.”

Michael Nuccitelli Psy.D. (2012)

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” 

Michael Nuccitelli, Psy.D. (2012)

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” 

Michael Nuccitelli Psy.D. (2013)

“The Dark Side of Cyberspace is a metaphor and conceptual framework defining a virtual environmental realm that includes all criminal, deviant, deceptive, harmful and malevolent activities in the abstract universe of cyberspace. Whereas iPredator is a criminal, deviant and disturbed typology construct, Darkside of Cyberspace also includes legal and illegal online activities, as well as, destructive and self-destructive online behaviors.”

Michael Nuccitelli, Psy.D., (2013)

michael-nuccitelli-internet-safety-mobile-device-safety

“At first perception, it seems as new Information Age technological advancements appear seemingly “heaven sent”, but all too often presents the human experience with an increasingly primitive and maladaptive response suffocating the realms of common decency, respect and humility.”

Michael Nuccitelli Psy.D. (2013)

Although the benefits of Information and Communications Technology far outweigh the detriments for society, humanity has been seduced by the illusory notion that more technology translates into a better quality of life.

Michael Nuccitelli, Psy.D. (2014)

The Information Age technocentric concept of being “connected” has become a paradoxical disconnection causing humanity to lose their instinctual drives for social cohesion, allegiance and selflessness. As dependency upon Information and Communications Technology [ICT] spreads throughout the collective human consciousness, the care for neighbors’ withers and online connections are deemed more valuable than reality based relationships.”

Michael Nuccitelli, Psy.D. (2014)

“Information and Communications Technology (ICT) is a metaphorical needle for injecting ignorance into an online predator’s target so the child thinks their sexually themed conversations are innocent banter.”

Michael Nuccitelli, Psy.D. (2015)

“The more psychologically isolated we become, the more cyberspace perceptually distorts our reality.”

Michael Nuccitelli, Psy.D. (2015)

“Unlike classic internet trolls who intermittently serve a pro-social function, predatory trolls are useless digital miscreants that cyber attack others for profit or personal gain.”

Michael Nuccitelli, Psy.D. (2016)

“The idiom, “out of context”, must be begrudgingly accepted by citizens of the Information Age. Online assailants use partial truths and ambiguous information, “out of context”, to character assassinate, defame and slander their targets.”

Michael Nuccitelli, Psy.D. (2016)

“Cyberspace can be a classroom, insane asylum, dance floor or lethal weapon. It’s your choice.”

Michael Nuccitelli, Psy.D. (2016)

michael-nuccitelli-internet-safety-cybercriminal

“As the Information Age evolves, trust has become a rare commodity and betrayal flows like water. It is never too late to inject mutual respect and common decency into the ass of cyberspace.”

Michael Nuccitelli, Psy.D. (2016)

“The Phantasist is a psychopathic, psychopathological or ideologically driven online user who uses their online identity to attack others. All iPredators are Phantasists to a certain degree, but not all Phantasists are iPredators until they attack.”

Michael Nuccitelli, Psy.D. (2016)

“A child’s brain has hundreds of millions more neurons and neuronal connections than an adult. What they do not have are adult memories enabling them to accurately interpret what it means to be abused, exploited and traumatized online.”

Michael Nuccitelli, Psy.D. (2016)

“If you spend too much time in cyberspace without calm, you are bound to project your insecurities and skewed perceptions upon others.”

Michael Nuccitelli, Psy.D. (2016)

“If an online user is quick to judge, shameless and defines him or herself as an expert before being honored as one; they are quite possibly a psychopath.”

Michael Nuccitelli, Psy.D. (2016)

“The dark side of cyberspace is the manifestation of, and theater for, the dark side of human consciousness using information technology as the stage.”

Michael Nuccitelli, Psy.D. (2016)

“Cyberspace allows our darkest fantasies to be fueled by the likeminded. Once validated, they are one step closer to becoming reality.”

Michael Nuccitelli, Psy.D. (2016)

“Given the veil of anonymity is easily worn in cyberspace, accountability evaporates for the online assailant (aka, iPredator).”

Michael Nuccitelli, Psy.D. (2016)

“Soon, information will become the most lethal & feared weapon. More valuable than diamonds and intoxicating like morphine.”

Michael Nuccitelli, Psy.D. (2016)

“Online harassment is peppered with victim blaming for the target and self-satisfaction for the assailant.”

Michael Nuccitelli, Psy.D. (2016)

michael-nuccitelli-internet-safety-dr.-internet-safety

“Although I thought my Dark Psychology construct involved criminal, deviant and cybercriminal minds, I must now accept that cyberspace has become an extension of human consciousness and a realm for all dark fantasies.”

Michael Nuccitelli, Psy.D. (2016)

Troll Triad was originally written to protect myself from character assassination by three adult online users. The Cerebral, Provocateur and Crier archetypes may in fact apply to task functions in all gang stalking and internet troll groups.”

Michael Nuccitelli, Psy.D. (2016)

“Cyberbullies believe that power is born by humiliating others using information technology. To them, it is their distorted perceived destiny to reign supreme.”

Michael Nuccitelli, Psy.D. (2016)

“Online predators love all your child’s social site comments, posts, online gaming pursuits, music and images. All they ask from your child is to keep their relationship secret.”

Michael Nuccitelli, Psy.D. (2016)

When eighty billion neurons, with one trillion plus neuronal connections, in the brain connect to the trillions of digital connections in ICT, the dance between organic and inorganic networks begins.

Michael Nuccitelli, Psy.D. (2016)

michael-nuccitelli-internet-safety-cyber-safety

Internet Safety Notes & Quotes Author

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from Adler University in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, he established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the dark side of cyberspace.

In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 30+ years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and the new field being pioneered called Cybercriminal Psychology. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, their mission is to initiate a national sustained educational & awareness campaign with the help of private, state and federal agencies.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below that they use as their primary information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. To invite Dr. Nuccitelli to conduct training, educational services or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

“Comfort the Victims, Educate the Ignorant, Conquer the Corrupt.”

michael-nuccitelli-internet-safety-pdf-button

michael-nuccitelli-internet-safety-home-button

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

Internet Safety Blog Launched by Michael Nuccitelli, Psy.D.

Internet Safety Blog Launched by Michael Nuccitelli, Psy.D.

michael-nuccitelli-internet-safety-carl-jung

Internet Safety Blog Launched

by

Michael Nuccitelli, Psy.D.

michael-nuccitelli-internet-safety-cyberbullying-blog

Over a three-day period and 30+ hours, I created and launched an internet safety blog in late January, 2017. The primary purpose is to offer online users a resource to access free internet safety and online assailant content. Interested parties can print, share, edit and rename everything published here. This writer, Michael Nuccitelli, Psy.D., authored and created everything within this blog. No attribution is required to use however you deem fit. Click the text image here to visit MichaelNuccitelli.Org.

michael-nuccitelli-internet-safety-blog-text-image

(click image to visit)

The only restriction is that the content is not to be used for nefarious or malevolent online activities. This rule applies to all online users, including our internet safety volunteers (aka, CAIN) and yours truly, Michael Nuccitelli, Psy.D. Essentially, all content is free and public domain, so as long as, the content is not used in a harmful manner. If any of this writer’s content is used in a harmful manner, a DMCA complaint will be filed promptly with the perpetrators host provider and social media platforms. It is important to note that this writer has four websites and blogs that offer free educational content. They are as follows:

michael-nuccitelli-internet-safety-blog-ipredator

Make Internet Safety Awesome!

Within these four sites, an online user can find hundreds of internet safety themed images and information to download. All four sites have a print button and social share icons on the left-hand side of your screen. To save images, simply right click on the image you would like to download and then click “save as” to download. For all content, you are never required to give personal information or an email address.

Cyberbullying, cybercrime, online child predation and predatory trolling continue to plague law abiding online users. There is no doubt that the dark side of cyberspace is here to stay. It is for this reason why this writer’s internet safety content is public domain. Attributions and donations would be nice, but saving a child from trauma and abuse is invaluable. Bookmark and check back often as this blog will become a huge resource for internet safety themed information.

michael-nuccitelli-stop-cyberbullying-ipredator-internet

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from Adler University in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, he established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the dark side of cyberspace.

In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 30+ years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

Although iPredator Inc. and this writer has joined a multitude of social networking sites, feel free to visit the social sites listed below that they use as their primary information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. To invite Dr. Nuccitelli to conduct training, educational services or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

michael-nuccitelli-internet-safety-internet-trolls-blog

internet-safety-michael-nuccitelli-home-button

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and author of the dark side of cyberspace construct called iPredator. This blog offers free educational internet safety and online assailant awareness themed content.
New York
US
Phone: 347-871-2416

Michael Nuccitelli, Psy.D. | Predatory Troll or Fake News?

Michael Nuccitelli, Psy.D. | Predatory Troll or Fake News?

todd-m-knisely-troll-michael-nuccitelli-safety

Michael Nuccitelli, Psy.D.

Todd Knisely, Predatory Troll or Fake News?

michael-nuccitelli-todd-m.-knisely-psychopath

Todd M. Knisely and his character assassination themed website, MichaelNuccitelli.Net, was best defined as a mixture of defamation, fake news, disinformation and sheer nonsense. As of January 31, 2017, his website had been down for three weeks. After contacting GoDaddy, the site was parked due to non-payment and not because it was being updated as he espoused. I can safely say that his bizarre obsession, with my work, will drive him to launch his felonious content again.

The only difference is that he can no longer use MichaelNuccitelli.Net. Effective February 9, 2017, MichaelNuccitelli.Net is now owned by yours truly. On this day, the domain was won for $12 dollars in a GoDaddy auction. When he did own it, the website alleged that I supported pedophilia, was a federal agent, neo-nazi, scammer, wife beater, pathological liar, plagiarist, attempted murderer, Anonymous wannabee and criminal. I don’t know how it’s possible, but he also purported I’m Jewish and a Neo-Nazi at the same time. The MichaelNuccitelli.Net URL is now forwarded to my new educational internet safety blog, MichaelNuccitelli.Org.

todd-m-knisely-decptive-comment-january-2017-michael-nuccitelli

Everything he’s published is utter bullshit. Todd Knisely meets criteria for an iPredator and Predatory Troll. After verifying his criminal history, felony conviction and recent arrest? It’s highly probable that he is either a psychopath or suffers from an Axis II Anti-Social Personality Disorder. I cannot validate my assumptions because I did not perform a forensic evaluation to assess his psychological functioning.

Todd Knisely Publishes Disinformation Nonsense

I’m but one online user he has attacked. He’s targeted men, women, children and businesses. Mr. Knisely does not typically divulge his identity and uses the online moniker called Shadow. He is not a hacker, information security expert or cyber security professional. He is not part of the activist entity called Anonymous nor does he volunteer his time helping those who have been targeted by iPredators.

He is skilled at basic programming, resides in Somerset, PA and does not own or work for a computer company. Todd M. Knisely (aka, Shadow) primarily spends his life in G+, Facebook and Twitter. It is from these social platforms that he targets online users. One of his most laughable defamatory attempts is his Google+ community titled “Michael Nuccitelli, Psy.D. Scammer”.

michael-nuccitelli-todd-m.-knisely-internet-troll

michael-nuccitelli-todd-m-knisely-court-docket-number

Exhibit I: One of Many Felonious, Fake News & Defamatory Bits of Content Todd M. Knisely Posted on His Previously Owned MichaelNuccitelli.net Website

todd-m-knisely-defamation-example-michael-nuccitelli

The purpose of this blog post is not to defend my reputation, constructs or work, but to alert online users about Todd M. Knisely and how online assailants use the internet to troll, slander and defame others. Mr. Knisely is but one of thousands who use cyberspace to knowingly author disinformation and fake news. It is for this reason that I presented his profile before the Colorado Psychological Association (CPA) in November. 2016 and will be doing the same before the Vermont Psychological Association (VPA) in March, 2017. It is vital for citizens of the Information Age to learn about these egregious online activities.

“In cyberspace, we try to perceive each other by repetitive methods and actions. What we end up getting is a pre-constructed fictitious doppelganger conceived in our minds.” Brian Williams (2016)

todd-m-knisely-michael nuccitelli-fake-news-image

Todd M. Knisely (aka, Shadow) The Predatory Troll

Predatory Trolls: Predatory Trolls are a new breed of Internet Troll that evolved from the Classic Troll. Just as Classic Trolls, Predatory Trolls can be ex-work associates, ex-partners and loved ones. They may also be unknown online assailants. Predatory Trolls may target others alone, but increasingly work in groups (aka, Troll Triad). Like all trolls, Predatory Trolls are driven by needs for power, recognition, peer acceptance and control.

Different from Classic Trolls is that their primary goal is to destroy an online user’s reputation, online presence and trustworthiness. With the advancement of Information and Communications Technology (ICT), Predatory Trolls may be employed by groups and governments in covert operations to destroy a target’s reputation.

Like all Predatory Trolls, Todd M. Knisely is proficient at cyberstealth, disinformation campaigns and online deception. He takes partial truths and adulterates them into grand felonious stories. I could spend the next 5000 words defending myself, but a simple google search of “Michael Nuccitelli, Psy.D.” or “iPredator” will allow you to make your own determination. If interested, one of our internet safety volunteers, Ms. Vic Urben, authored a blog post defending my reputation titled “The Real Michael Nuccitelli, Psy.D.”.

michael nuccitelli-todd-m-knisely-fake-news-image

Thank You Todd M. Knisely (aka, Shadow)

The silver lining to Todd Knisely’s ridiculous accusations is that he validates my work and constructs. With each victim I help and with each professional organization and agency I train, his nonsense is included as an illustration. He validates iPredator. I say to Mr. Knisely? Thank You. Unfortunately, there are thousands of people who lose their jobs, families and reputations because of disinformation and fake news. It is for those people who are victimized by the Todd Knisely’s of the world that I write this web article.

“For 4+ years, Todd M. Knisely (aka, Shadow) has exploited, defamed and cyber attacked countless numbers of online users throughout G+ and other social platforms. Using his moniker called Shadow, he trolls men, women and children without remorse. Todd M. Knisely is not an information security expert, skilled hacker, Anonymous activist or iPredator profiler. He is not incorporated nor is he part of a group of concerned citizen hackers called “Shadows”. Todd M. Knisely is none of these.” Michael Nuccitelli, Psy.D. (2016)

michael-nuccitelli-todd-m.-knisely-troll

todd-m-knisely-fake-news-michael-nuccitelli

Todd Knisely’s 2 Minutes of Fake News Fame

In conclusion, I leave you with one last example illustrating how skilled Todd Knisely is in the art of deception. After his arrest in August 2016, a local news station interviewed him without first verifying his preposterous story. Not only is the news clip a prime example of fake news, but the reporter actually fell for his nonsense by stating that “he runs an online conglomerate of computer hackers from all over the world called “Shadows”. I wonder why the other news outlets did not report his account of how and why he was arrested. Provided here is the link to watch his two minutes of fake news fame.

Mr. Knisely’s 2 Minutes of Fame

michael-nuccitelli-symbol-todd-knisely-troll

Most Used Knisely Social Platforms & Website

(alt. accounts not listed)

Todd Knisely – Shadow – Facebook Account

https://www.facebook.com/shadowsgovernment/  

Todd Knisely – Shadow – G+ Accounts

https://plus.google.com/101934809397256600203

https://plus.google.com/103587653827648559118

https://plus.google.com/112368697066970047784

https://plus.google.com/110570186850949220947

https://plus.google.com/112530403109076732697

https://plus.google.com/115791801859454893522

Todd Knisely – Shadow – Twitter Account

https://twitter.com/00_SHADOW_00

Todd Knisely – Shadow – Website

http://shadowsgovernment.com/

todd-m-knisely-ipredatory-inc.-michael-nuccitelli

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from Adler University in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 30+ years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

Although iPredator Inc. and Michael Nuccitelli, Psy.D. have joined a multitude of social networking sites, feel free to visit the social sites listed below that they use as their primary information and announcement vehicles. Dr. Nuccitelli is always available, at no cost, to interact with online users and media. To invite Dr. Nuccitelli to conduct training, educational services or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

todd-knisely-troll-michael-nuccitelli-image

todd-m-knisely-michael-nuccitelli-home-button

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+

iPredator Inc. is a NYS based Internet Safety Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism and online sexual predation. Created by a NYS licensed psychologist and forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York, New York
US
Phone: 347-871-2416

 

todd-m.-knisely-troll-michael-nuccitelli
An Online Letter Thanking Mrs. Trump About Cyberbullying

An Online Letter Thanking Mrs. Trump About Cyberbullying

mrs-melania-trump-cyberbully-prevention

An Online Letter Thanking Mrs. Trump

About Cyberbullying

Dear Mrs. Trump,

First, I would like to congratulate you on becoming the First Lady to the 45th President of the United States, Donald J. Trump. Thanks to you, the 2016 Presidential Election will go down in history as being the first to include protecting children of the Information Age. I smiled from ear-to-ear when I watched you announce that cyberbullying and online abuse must be addressed. I am grateful that you are making these issues a priority.

First Lady Addresses Nation

(click text link to watch her speech)

mrs-melania-trump-cyberbullying-symbol

My name is Michael Nuccitelli, Psy.D. and I am a NYS licensed psychologist and author of the dark side of cyberspace construct called iPredator (2010). iPredator is a global concept that includes eight types of online assailant. Cyberbullying is one of them and the typology I’m most passionate about addressing. On November 3 2016, I was honored to present iPredator and cyberbullying to the Colorado Psychological Association (CPA). I could not believe that you, Mrs. Trump, announced your focus on cyberbullying in front of the nation.

Although the United States has National Bullying Prevention Month every October, the awareness of how cyberbullying impacts children is still not viewed as a serious issue. I have volunteered my time, for six years, helping those who have been cyberbullied, harassed and defamed online. With each passing year, the number of help requests increase dramatically. As I emphasized to the CPA, we are the first society to be introduced to the concept of cyberbullicide. America still does not recognize that cyberbullying is reaching epidemic proportions with no end in sight.

Mrs. Trump Vows #StopCyberbullying

I cannot tell you how many times online users have said that the cyberbullied need to “toughen up” or don’t pay attention to being cyber attacked. What America fails to realize is that cyberbullying targets a child’s self-confidence and psychological health. It’s also important to note that many of them are being bullied by the same children offline. Unlike the old days, children of the Information Age are attacked 24/7/365. They simply have no escape or sanctuary.

It is my staunch belief that American school systems need to make cyberbullying prevention, internet safety and how to conduct oneself online a part of their educational curriculum. Starting as young as possible, children of the Information Age need to be taught the benefits and detriments of living in a technologically dependent world. Cyberbullying, cybercrime, cyberstalking and online child predation are areas today’s children must learn about to stay safe.

mrs-melania-trump-stop-cyberbullying

Thank You Mrs. Trump

As stated above, thank you Mrs. Trump for making cyberbullying and online abuse topics a national priority. I also apologize for those who have accused your husband of being a cyberbully. Their nonsense proves how little America knows about bullying. What they fail to realize is that cyberbullying occurs among children and not adults. From all our internet safety volunteers and I, thank you for helping. If I can ever be of assistance, feel free to call anytime here in New York at 347-871-2416 or via email at drnucc@ipredatorinc.com. It is time to make cyberbullying and online abuse a priority in the United States. God Bless America!

Respectfully,

mrs-melania-trump-cyberbullying-michael-nuccitelli

thank-you-mrs-melania-trump-addressing-cyberbullying

“A child’s brain has many more neurons than a grown adult. What they don’t have are adult memories enabling them to accurately interpret what it means to be cyberbullied, exploited and traumatized online.”

Michael Nuccitelli, Psy.D. (2016)

michael-nuccitelli-cpa-olga-vera-home

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc.
Founder
Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. Dr. Nuccitelli is the author of the dark side of cyberspace construct called iPredator (2010). In November 2011, he established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cyberbullying, cybercrime & internet safety. In June 2013, Dr. Nuccitelli launched his internet safety website, iPredator and two blogs, Dark Psychology & Dr. Internet Safety. Over the last 30+ years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.
Hopewell Junction,New York
12533
US
Phone: 347-871-2416

Michael Nuccitelli, Psy.D. Thanks Olga Vera, Ph.D. & CPA

Michael Nuccitelli, Psy.D. Thanks Olga Vera, Ph.D. & CPA

michael-nuccitelli-cpa-olga-vera

 Michael Nuccitelli, Psy.D.

Thanks

Olga Vera, Ph.D. & CPA

Thank you Olga Vera, Ph.D., Maggie McCormick, Colorado Psychological Association (CPA) and the participants who attended my training held on November 3, 2016. I’m honored to have been given the opportunity to present iPredator and its related concepts. CPA is the first state association to be introduced to my Information Age constructs. Those who participated offered valuable insights that I will soon investigate.

Dr. Olga Vera is the new President of the Colorado Psychological Association (CPA) and was an incredible host. I cannot thank her enough for supporting my work. During our full-day training, the participants were introduced to the eight typologies of iPredator including cyberbullying, cyberstalking, internet trolls and online child exploitation. Of the many topics covered, cyberbullying was emphasized most.

michael-nuccitelli-cpa-olga-vera-cyberbullying

Dr. Vera and the training participants were highly receptive to my staunch belief that cyberbullying prevention and internet safety training needs to be compulsory education in schools throughout the United States. It was confirmed by the participants that parents, primary caregivers and the educational system need to be active participants in the fight against cyberbullying.

In addition to cyberbullying prevention, I also introduced some of my iPredator sub-constructs including Predatory Trolls, Online Psychopathy, ODDOR and Phantasist. I was truly impressed to see that many of the participants offered insights and observations that will further advance my understanding of the psychodynamics involved with iPredator. Outside of iPredator, ODDOR and Phantasist were the two sub-constructs that involved psychological interpretations. A brief definition of each is as follows:

michael-nuccitelli-thanks-cpa-olga-vera

Offline Distress Dictates Online Response

(ODDOR)

Offline Distress Dictates Online Response (ODDOR) is a sub-tenet of iPredator, which posits that offline psychological functioning directly influences one’s online interactions. Whether someone is an online assailant, cyber attack target or both, ODDOR does not discriminate. ODDOR postulates that temporary and long-standing psychological states can significantly taint an online user’s behaviors and interpretations. Perceptually isolated, ignorance of the existence of ODDOR and experiencing atypical affective and cognitive states increases the probability of being targeted by an online assailant. In addition to being at a greater risk of cybercrime, ODDOR influences an online user to partake in destructive and self-destructive online activities.

michael-nuccitelli-cpa-olga-vera-ipredator

Phantasist

A Phantasist is an online user who obsessively prioritizes & protects their profile, avatar or persona to engage in malevolent or nefarious activities. In most cases, they use the online persona to hide their identity and exploit or intimidate others. The Phantasist has difficulty differentiating their true self from their online identity (aka, Reality-Virtuality Continuum), which is driven by their need to control, subjugate or seek attention from others. For unknown reasons, the Phantasist increasingly becomes absorbed by their online identity.

Dr. Vera and the training participants shed new light on the psychology of both online assailants and their targets. In addition to thanking Dr. Vera, I’d also like to thank Richard Kapolka senior and junior. This father and son team flew in from the East Coast to attend my training. Not only did they contribute to the discussions, but they took the photographs published in this post. I am grateful for their help.

michael-nuccitelli-thanks-cpa-olga-vera-1

CPA President, Dr. Vera and Me, Doc Nuccitelli 

Thank You Olga Vera, Ph.D. and CPA

iPredator and its related concepts have now been presented to a state psychological association. With a little luck, they will be introduced to other state associations, professional organizations and school systems. Thank you, Olga Vera, Ph.D. and the Colorado Psychological Association for your support. The time spent with you has confirmed my belief that it is time for America to begin prioritizing cyberbullying prevention and internet safety. For interested parties and the training participants who did not receive my cyberbullying slide show and iPredator Notes PDF, both are available for direct download by clicking on the blue links here.

iPredator Notes

Cyberbullying Slideshow    

 michael-nuccitelli-cpa-olga-vera-home

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

michael-nuccitelli-thanks-olga-vera-cpa

iPredator Inc. is a NYS based Internet Safety Company founded to provide educational and advisory services to online users regarding cyberbullying, cyberstalking, cybercrime and online child predation. Created by a NYS licensed psychologist, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational campaign with the help of private, state and federal agencies.
New York, NY
US
Phone: 347-871-2416

Pin It on Pinterest

Share This