social-media-exam-cyber-attack-exposure-assessment-ipredator-inc.-new-york-1200 x 480


Social Media Exam

Cyber Attack Exposure Assessment

$300.00 (USD)

 Cyber Attack Exposure Assessment: The iPredator Social Media Safety Analysis (iSMSA) is an innovative social media safety and internet safety service offered to site visitors by Dr. Nuccitelli and iPredator Inc. For a nominal fee, iPredator Inc. will assess the online consumer or family member’s Facebook profile and/or social networking site profile to assess areas an iPredator may use to target the online user.

iPredator Inc. conducts a full website/social profile safety analysis to assess areas and information that may increase the online user or their family member’s risk of being targeted by an iPredator. Just as designed by Dr. Nuccitelli in the iPredator Inc.’s IPI Assessment Collection & IISC Collection, the iPredator Social Media Safety Analysis (iSMSA) investigates areas of Information and Communications Technology (ICT) and online user behaviors as follows:

social-media-exam-cyber-attack-exposure-assessment-ipredator-inc.-new-york-435 x 107

Assessment Categories

  • Cyber Stalking & Harassment Weaknesses (CS)
  • Digital Reputation & Digital Footprint Signatures (DR)
  • High Risk ICT Factors (HR)
  • ICT Awareness (ICTA)
  • Mobile Device Technology Signatures (MDT)
  • Personal Information Factor Variables (PI)
  • Psychological State Variables (PS)
  • Social Media Variables (SM)
  • iPredator Protection Methods (IP)
  • iPredator Awareness Evidence (iPA)
  • Cyber Bullying Target and Abuser Evidence (CB) *Reserved for Children*


iPredator Social Media Safety Analysis (iSMSA)

The iPredator Social Media Safety Analysis (iSMSA) costs $300.00 (USD) per online user. Upon signing up, Dr. Nuccitelli or an iPredator Inc. consultant contacts you via telephone and/or email within 24 hours. You then give Dr. Nuccitelli or the consultant your password in order for them to access the social profile. The Cyber Attack Exposure Assessment takes 2-3 hours to complete.

Once the analysis is completed, you will be contacted by Dr. Nuccitelli or an iPredator Inc. consultant, given recommendations to increase internet safety and iPredator protection and then directed to change your password upon completion of the contact. Your password is kept confidential and only shared with Dr. Nuccitelli and/or the iPredator Inc. consultant. This service is available to adults, their children and businesses.

The  is particularly helpful to parents with children who have Google Plus, Twitter, Facebook or Social Media profiles. Once recommendations are made, it is up to you to institute those suggestions. Whether you decide to purchase the iSMSA or not, it is important to always be vigilant of those seeking to harm others in cyberspace and when using Information and Communications Technology (ICT). Provided below is a brief description of iPredator and the Cyber Attack Exposure Assessment categories.

social-media-exam-cyber-attack-exposure-assessment-ipredator-inc.-new-york-808 x 580

iPredator Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Cyber Attack Exposure Assessment Categories

social-media-exam-cyber-attack-exposure-assessment-ipredator-inc.-new-york-1000 x 446


1. Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of Cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones via ICT.

Examples of psychological threats involves disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of cyberstalkers. Given the Internet is inexpensive and easy to access, distance between cyber stalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target other ICT users and a psychiatric pathology. When Cyberstalking is a tactic, the assailant does not need to be driven by psychopathology.

Cyber Harassment

2. Cyber Harassment: Cyber harassment is the use of information and communications technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in trying to control, dominate or manipulate their target.

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from Cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more possible, cyber harassment continues to flourish. Cyber harassment is the adult form of cyberbullying to a minor.

Digital Reputation

3. Digital Reputation: Digital Reputation is a term used to describe the reputation of an Information and Communications Technology (ICT) user or business that is disseminated online and available to peers, superiors, loved ones and consumers. This information can be positive or negative and vital to the health, success and reputation of an ICT user or business. Digital Reputation is created and sustained by peers, school or work associates, loved ones, acquaintances, consumers, competitors, adversaries, online strangers and iPredators. Given the widespread growth and expansion of ICT, a positive digital reputation is vital to people, communities and business’s in order to thrive, survive and for attainment of personal endeavors.

Digital Reputation and the growing risks confronting ICT users and businesses have become increasingly endemic due to the escalating use and significance of the Internet as a communication platform. With the ascent of social media, the formation of Digital Reputation is an increasingly common process and the practices of Digital Reputation Management has become crucial for both people and corporate entities. An ICT user or business’s Digital Reputation is directly correlated to their Digital Footprint. Like Digital Footprint, an ICT user’s Digital Reputation is directly correlated to the quantity, quality, accuracy and extent of personal information they post or share online available and used by other ICT users.

social-media-exam-cyber-attack-exposure-assessment-google-plus-350 x 350

Digital Footprint

4. Digital Footprint: Digital Footprint is a term used to describe the trail, traces or “footprints” that children, adults and businesses leave in cyberspace from their online activities using Information and Communications Technology (ICT.) This is information that is obtained, exchanged or disseminated between ICT users. An ICT user’s Digital Footprint is created by social media information, forum registrations, e-mails, attachments, videos, digital images and other forms of communication via ICT that leave traces of personal and/or corporate information about someone and/or a business available to others online. An ICT user or business’s Digital Reputation is directly correlated to their Digital Footprint.

An ICT user or business’s Digital Reputation is created by a culmination of their Digital Footprints over a time. Like Digital Reputation, an ICT user’s Digital Footprint can be positive or negative and vital to the health, success and reputation of an ICT user or business. Personal information disclosed or shared online all give to an online user’s Digital Footprint in the age of social media. Like Digital Footprint, an ICT user’s Digital Reputation is directly correlated to the quantity, quality, accuracy and extent of personal information they post or share online available and used by other ICT users. It is for these reasons that a child, adult or business must be diligent in monitoring their Digital Footprint.

High Risk ICT

5. High Risk ICT: High Risk ICT factors are defined as actions and behaviors an Information and Communications Technology (ICT) user participates in online, which increases their probability of becoming a target of an iPredator. These actions and/or behaviors differ depending on the age, gender, environmental influences and psychological status of the online user interacting with ICT. High Risk ICT factors tend to be rooted in non-compliance, ignorance or oppositional defiance of following proper Internet safety and iPredator protection tactics when engaged in high-risk online behaviors. High Risk ICT factors are highly susceptible to environmental stressors and psychological dysfunction.

High Risk ICT factors tend to be most problematic for children, but adults can be equally susceptible. Of the myriad of high-risk behaviors an ICT user can engage in leading to an increased risk probability of being victimized, the following six behaviors are strong predictors of online victimization for children and correlated to adult online victimization:

  1. Interacting online with unknown ICT users.
  2. Having unknown online users on their “buddy” or “friends” lists.
  3. Interacting online with unknown ICT users engaged in topics on sexuality.
  4. Viewing or downloading pornographic or “dark” content online.
  5. Behaving in a rude, harassing or abusive way towards other ICT users.
  6. Posting or sharing personal and/or contact information available to unknown ICT users.

social-media-exam-cyber-attack-exposure-assessment-facebook-350 x 350

ICT Awareness

6. ICT Awareness: The ICT Awareness factor is the level of awareness an Information and Communications Technology (ICT) user or business has related to their practice of Digital Citizenship and how they are perceived by other ICT users. This factor examines an ICT user or business’s understanding of Digital Citizenship, cyber security and how their ICT practices are translated by other ICT users. ICT Awareness is a conscious state and overture that is part of a strategy, practice and consistent sustained approach to reducing the probability of being misrepresented by others or becoming an online victim.

These strategies involve a concerted effort to understand how they are perceived by other ICT users. The ICT Awareness factor also describes the amount of information a parent, family member, support group, educator, loved one or business has accrued related to Digital Citizenship and Internet safety measures used to insulate a child, adult or business from becoming a target of an iPredator. The ICT Awareness factor includes:

  1. The ICT user or business support system’s understanding of ICT & digital citizenship.
  2. An iPredator’s techniques and tactics used in cyberstealth with ICT.
  3. An ICT user’s conscious efforts to engage in digital citizenship and internet safety habits.
  4. An ICT user or business’s proactive self-monitoring of how they are perceived by other ICT users.

Mobile Device Technology

7. Mobile Device Technology: The Mobile Device Technology factor is a collective term representing the portable genre of Information and Communications Technology (ICT) that describes the various types of mobile devices used by children, adults and businesses. Examples include cellular phones, smart phones and tablets. The Mobile Device Technology factor also relates to a child, adult or business’s knowledge and application of mobile device safety. The term, Mobile Device, is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are.

This includes cell phones, smartphones and various other portable devices. The Mobile Device Technology factor also examines the child, adult or business understands of how they interact with their mobile devices and how iPredators use mobile device technology to target and locate their victims.

However, mobility has far-reaching effects on the enterprise in areas such as security risk, use policies, manageability and governance. Given the rapid growth and inevitable broad expansion of mobile device technology, this area will become increasingly more relevant about all ICT users practicing cautious and proactive mobile device safety. Given the fast pace nature of human civilization, mobile device technology will become mandatory requirements for anyone seeking to connect with their loved ones, colleagues, peers and community resources.

Personal Information

8. Personal Information: The Personal Information factor is a term used to describe the quantity and frequency of personal information an Information and Communications Technology (ICT) user or business shares with other ICT users and available to known and unknown ICT users to view and prospect. Examples of personal information include their home/work/school address, full names, name of school/employer, age, gender, financial information, images, videos and online activities (i.e. passwords, usernames, profiles.) The Personal Information factor relates to the ICT user or business’s knowledge and understanding of the risks created when they post and/or share their contact or personal information about their age, gender, daily routines, sexual predilections and online preferences and/or activities.

With an abundance of popular social networking websites like Facebook, MySpace, Twitter and Linkedin, it has become easy for iPredators to target children and adults to amass their personal information. Images and videos posted publicly online can leave a trail easily traceable by iPredators. The Personal Information factor is the most important aspect of Internet safety cautioned to all ICT users. iPredators heavily rely on access and acquisition of their potential targets personal information. Given their advanced ICT prowess and ability to manipulate vulnerable ICT users, many iPredators do not have to rely on social networking sites to obtain the necessary personal information to locate, identify and target their victims.

social-media-exam-cyber-attack-exposure-assessment-twitter-350 x 350

Psychological State

9. Psychological State: The Psychological State factor is a generic term used to define psychological aspects of an Information and Communications Technology (ICT) user or group of ICT users when they are engaged in online activities and how these psychological factors influence their capacity to practice Internet safety and security. The more isolated, discouraged or angry an ICT user feels, the more apt they are to engage in high-risk ICT activities discouraged by Internet safety guidelines.

The Psychological State factor relates to the ICT user or business’s knowledge and understanding of how cognitive, affective, behavioral and perceptual processing states govern ICT activities. Of the twenty factors designed in the iPredator theoretical construct, the ICT user’s psychological state is primarily influenced by their home, career and/or school environments and highly relevant to their ICT activities and risk potential.

For all ICT users, their offline stressors, conflicts and environmental obstacles have a direct effect upon their ICT demeanor. And responses. When home, school, work, finances or other offline factors are causing significant distress, research has proven ICT users of all ages are more apt to be less vigilant in ICT and Internet safety tactics and more likely to engage in higher risk online behaviors. When an ICT user is in a perceived stable, encouraging, structured and consistent environment, their psychological well-being affords them to be more cautious and conscientious of their ICT activities.

Social Media

10. Social Media: The Social Media factor is used to describe the online technologies and practices an Information and Communications Technology (ICT) user accesses to share their opinions, insights, experiences and perspectives related to their personal, career and/or scholastic activities at social networking websites. Social Media is forms of electronic communication through which users create online communities to share information, ideas, personal messages, and other content. The Social Media factor relates to the ICT user’s knowledge and understanding of their energy, time and importance they place on their social media profiles and networking endeavors, perceived online image and their interactions with other ICT users using social networking websites.

More specifically, Social Media refers to the use of web-based and mobile technologies to turn communication into an interactive dialogue. Within this factor, the areas investigated include the themes and quantity of personal and sensitive information an ICT user allows other ICT users to view related to themselves, their loved ones or their employers or academic institutions. A growing number of ICT users place an incredible amount of time, effort and thought into their social networking site profiles and endeavors. Social Media has become a driving force in many ICT users lives and a frequented arena for cyberbullying, cyber harassment and cyberstalking.

social-media-exam-cyber-attack-exposure-assessment-pinterest-350 x 350

iPredator Protection

11. iPredator Protection: The iPredator Protection factor is the amount of effort, time and education an Information and Communications Technology (ICT) user or business engages in to reduce their probability of becoming a target of an iPredator. Slightly different from the ICT Awareness & iPredator Awareness factors used in the iPredator construct, iPredator Protection emphasizes the protective measures and protection based software, hardware and applications an ICT user monitors, obtains and employs. The iPredator Protection factor relates to the ICT user or business’s knowledge, participation and understanding of the necessary measures and strategies they should or should not engage in related to their ICT activities.

The iPredator Protection factor assesses if the ICT user or business actively practices ICT safety, cyber security, sets appropriate online restrictions and ready to respond accordingly if they are targeted by an iPredator or nefarious corporate entity related to businesses. In relationship to children, the iPredator Protection factor also includes the effort, knowledge and tactics of parents, educators and the child’s support system to insulate and protect them from iPredator. Just like any new environment humanity is presented, it is paramount for all ICT users to always be cautious when engaged in communications in cyberspace. ICT users adept at iPredator Protection are knowledgeable of all to protect themselves, their loved ones or business.

iPredator Awareness

12. iPredator Awareness: The iPredator Awareness factor describes the amount of information, knowledge and conscious preparedness an Information and Communications Technology (ICT) user has related to iPredators and their existence in cyberspace. Vital to iPredator Awareness is and ICT user or business’s capacity to understand the methods and techniques iPredators use to locate, identify, stalk and attack their target they believe as vulnerable and/or deserving of their victimization and stalking. The iPredator Awareness factor relates to the ICT users knowledge and understanding of the tactics and techniques an iPredator uses. iPredators can be any age, either gender and not bound by socio-economic status or racial/national heritage. Within each class of iPredator, a degree of victimization lies upon a continuum of severity ranging from mild to severe regarding their intent, goals and modus operandi.

The key terms examines in the iPredator Awareness factor is awareness or a consistent level of caution practiced by the ICT user that is fueled by the ICT user or business’s knowledge that iPredator’s may launch a cyber attack. The level of iPredator Awareness practiced by an ICT user is defined by their psychological, emotional and environmental stability. The less stable the ICT user is with these human experiences, the less aware they are of the nefarious and malevolent entities that access ICT for vulnerable targets.


13. Cyberbullying: Cyberbullying is threatening or disparaging information directed at a target child delivered through information and communications technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyber bullying includes a phenomenon called Cyberbullying by proxy. Cyberbullying by proxy is when a cyber bully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyber bullying because adults may become accomplices to the cyber bully and may not know they are dealing with a minor or child from their community.

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of cyberbullying can become psychologically devastated and/or cyberbullies themselves.

social-media-exam-cyber-attack-exposure-assessment-workplace-bullying-ipredator-inc.-1008 x 667

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. If you have questions, feel free to call iPredator Inc. anytime in New York at (347) 871-2416 or by sending correspondence using this website’s contact page by clicking here: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

social-media-exam-cyber-attack-exposure-assessment-ipredator-inc.-new-york-616 x 616


Author: Michael Nuccitelli, Psy.D.
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
Phone: 347-871-2416

Pin It on Pinterest

Share This