Examples of Cyberbullying Images – iPredator

examples-of-cyberbullying-images-ipredator

Educational Examples of Cyberbullying Images
by Michael Nuccitelli, Psy.D.

Examples of cyberbullying describe the variety of techniques cyberbullies use to taunt, threaten, humiliate and deprecate their target. The primary goal for the reader is to become familiar with the strategies children use to mistreat other children.

Many of these tactics are also made use of by adult online users engaged in cyber harassment, cyberstalking and predatory trolling. As humanity increasingly becomes dependent upon mobile device technology, virtual reality and artificial intelligence; the range and complexity of cyber-attacks will assuredly grow.

Provided are examples of cyberbullying in image form. As with all the content on this website, they are free to download, share and use for informational and educational purposes. All images are 1080×1080 compressed JPEG files 

Cyberbullying

Using Information and Communication Technology (ICT), cyberbullying is recurrent and sustained threats and taunts by one or more children towards another child who is unable or unwilling to deescalate the engagement. Cyberbullying is harmful, repeated and hostile behavior intended to deprecate a targeted minor.

Cyberbullying describes threatening or disparaging communications delivered through ICT. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyberbullying consists of information exchanged via ICT and may never involve face-to-face encounters.
.

Examples of Cyberbullying Images

Bash Boards: Defamatory content a cyberbully posts in chat rooms, online forums and message boards.

michael-nuccitelli-cyberbullying-bash-boards

BlogoBullying: A cyberbully creates a blog and then makes their target the central character and topic of defamatory posts.

michael-nuccitelli-cyberbullying-blogobullying

Cyberbullying by Proxy: Using deception, encouragement or manipulation; a cyberbully persuades other online users to harass their target.

michael-nuccitelli-cyberbullying-by-proxy

Cyberstalking: When a cyberbully uses intimidation and persistent taunting that frightens their target

michael-nuccitelli-cyberbullying-cyberstalking

Cyber Drama: When a cyberbully posts melodramatic content to alarm or defame their target.

michael-nuccitelli-cyberbullying-cyber-drama

Cyber Harassment: When a cyberbully repeatedly contacts and sends defamatory messages to their target.

michael-nuccitelli-cyberbullying-cyber-harassment

Cyber Threats: When a cyberbully falsely implies their target is in danger from unknown or nefarious assailants, which causes the target distress.

michael-nuccitelli-cyberbullying-cyber-threats

Denigration: When a cyberbully sends or publishes cruel rumors, gossip and false assertions about a target; trying to damage their reputation or friendships.

michael-nuccitelli-cyberbullying-denigration

Digital Piracy Inclusion: When a cyberbully persuades their target to engage in illegal digital piracy and then reports them to the authorities, their parents or educators.

michael-nuccitelli-cyberbullying-digital-piracy

eIntimidation: A colloquial expression that describes when a cyberbully attempts to control their target using emails to manipulate them.

michael-nuccitelli-cyberbullying-eintimidation

Exclusion: When a cyberbully informs their target that they are not invited to a social activity that other peers will be attending.

michael-nuccitelli-cyberbullying-exclusion

Exposure: Using social media, a cyberbully posts private communications, images or video about their target that is private and embarrassing.

michael-nuccitelli-cyberbullying-exposure

Flaming: Using social media, a cyberbully provokes an argument with their target that includes profane and vulgar terminology.

michael-nuccitelli-cyberbullying-flaming

Griefing: When a cyberbully frequents online gaming environments and frustrates their target by intentionally not following the rules.

michael-nuccitelli-cyberbullying-griefing

Happy Slapping: While the target is physically attacked and simultaneously recorded; the images and video are posted online by the cyberbully.

michael-nuccitelli-cyberbullying-happy-slapping

Impersonation: The cyberbully mimics their target and posts defamatory comments on social networking sites and in chat rooms.

michael-nuccitelli-cyberbullying-impersonation

Instant Messaging Attacks: Using an instant messaging account, the cyberbully bombards the target with harassing and threatening text messages.

michael-nuccitelli-cyberbullying-instant-messaging-attacks

Interactive Gaming Harassment: Having the ability to exchange information with online gaming opponents; cyberbullies verbally abuse their targets and lock them out of games.

michael-nuccitelli-cyberbullying-interactive-gaming-harassment

Malicious Code Dissemination: When a cyberbully sends malicious information like viruses, malware, spyware and ransomware to their target.

michael-nuccitelli-cyberbullying-malicious-code-dissemination

Micro-Visual Bullying: When a cyberbully creates and posts short videos to character assassinate their target.

michael-nuccitelli-cyberbullying-micro-visual-bullying

Mobile Device Image Sharing: When a cyberbully sends sexually suggestive or embarrassing images of the target to peer mobile devices.

michael-nuccitelli-cyberbullying-mobile-device-image-sharing

Non-Consensual Multimedia Bullying: The target does not know that embarrassing content is being disseminated by the cyberbully using various media formats.

michael-nuccitelli-cyberbullying-non-consensual-multimedia-bullying

Password Theft & Lockout: After a cyberbully steals & changes their target’s password, they impersonate them online and lock them out of their account.

michael-nuccitelli-cyberbullying-password-theft-and-lockout

Phishing: A cyberbully manipulates their target into revealing financial information and then purchases unauthorized items with their credit cards.

michael-nuccitelli-cyberbullying-phishing

Porn & Marketing List Insertion: Using confidential online sign-up forms, the cyberbully signs their target up to multiple pornography and junk lists.

michael-nuccitelli-cyberbullying-porn-marketing-list-insertion

Pseudonym Stealth: Cyberbullies secretly change their online usernames and begin to taunt, tease and humiliate their target while hiding their identity.

michael-nuccitelli-cyberbullying-pseudonym-stealth

Screen Name Mirroring: Similar to impersonation, the cyberbully uses screen names almost identical to the target and then posts provocative content.

michael-nuccitelli-cyberbullying-screen-name-mirroring

Sexting: The cyberbully text messages sexually themed information about their target that is embarrassing and hurtful.

michael-nuccitelli-cyberbullying-sexting

Sextortion: Using threats of revealing sexually themed content about their target, the cyberbully extorts them in exchange for not revealing the information.

michael-nuccitelli-cyberbullying-sextortion

Slut Shaming: The cyberbully records sexually suggestive images or videos of their target and distributes them throughout their school and online.

michael-nuccitelli-cyberbullying-slut-shaming

Social Media Bullying: The cyberbully persuades the target to include them in their “friends” or “buddy” lists, and then contacts their followers with derisive information.

michael-nuccitelli-cyberbullying-social-media-bullying

Text Wars and Text Attacks: The cyberbully and accomplices engage their target in a series of provocative text messages using a cellular phone service.

michael-nuccitelli-cyberbullying-text-wars-text-attacks

Tragedy News Mirroring: The cyberbully announces that their target is planning to engage in a violent activity soon after a similar regional or national tragedy.

michael-nuccitelli-cyberbullying-tragedy-news-mirroring

Trickery: The target is mistakenly led to believe that the sensitive information they share with the cyberbully will not be used for nefarious reasons.

michael-nuccitelli-cyberbullying-trickery

Trolling: The cyberbully repeatedly taunts their target across multiple online environments ranging from online gaming to chat rooms.

michael-nuccitelli-cyberbullying-trolling

Twitter Pooping: The cyberbully repeatedly tweets harmful and provocative insults about the target using current “net lingo” terms.

michael-nuccitelli-cyberbullying-twitter-pooping

Voting & Polling Booth Bullying: The cyberbully creates web pages that allow others to vote for categories deemed highly embarrassing to their target.

michael-nuccitelli-cyberbullying-voting-and-polling-booth-bullying

Warning Wars: The cyberbully makes frequent false allegations to an ISP seeking their target’s profile or account to be suspended.

Web Page Assassination: The cyberbully designs, and then posts web pages specifically intended to insult the target, their peers or loved ones.

michael-nuccitelli-cyberbullying-web-page-assassination

VLE Bullying: In Virtual Learning Environments (VLE), cyberbullies use VLE message boards, chat rooms and instant messaging functions to ridicule their target.

michael-nuccitelli-cyberbullying-vle-bullying

Virtual World Bullying: Using their avatar in 3D websites and virtual worlds, the cyberbully taunts and teases their target by using their avatar as the assailant or provocateur.

michael-nuccitelli-cyberbullying-vistual-world-bullying

YouTube Channeling: The cyberbully makes their target the principal character in a YouTube channel and publishes denigrating and disinformation-themed videos.

michael-nuccitelli-cyberbullying-youtube-channeling

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychologist and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

ipredator-website-home-button

 

 

 

 

40 Free Cyberstealth Images by Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyberstealth-online-deception-#bebest

40 Free Cyberstealth & Online Deception Images

by

Michael Nuccitelli Psy.D.

Provided below are 40 free Cyberstealth and Online Deception themed images created by this writer Michael Nuccitelli Psy.D. They are JPEG files and 1080×1080, 1080×1350 or 1080×608 pixels. These images are optimized for Instagram but can be edited to varied sizes. Dr. Nuccitelli’s images are available for direct download, free and public domain. Edit them as you wish, and no attribution is required.

Cyberstealth

Cyberstealth is a concept used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT), if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age deception or also called online deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to extraordinarily complex and multi-faceted.

The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed. Cyberstealth is engaged in to reduce an iPredator’s probability of identified, apprehended and punished.

The primary difference between online deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to their targets. Online deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, depravity or harm against others.

Online Deception

Online Deception (aka, Digital Deception, Internet Deception, Cyber Deception) is the use of Information and Communications Technology to deceive other online users usually rooted in malevolent, nefarious or covert online activities. Although primarily used for anti-social purposes, online deception tactics are occasionally designed for benevolent purposes, such as, when law enforcement design felonious profiles of children used to locate, identify and arrest online sexual predators.

The art & science of online deception is used by all iPredator typologies including cyberbullies, cyberstalkers, cyber criminals, cyber terrorist, cyber harassers, internet trolls and online sexual predators.

michael-nuccitelli-cyberstealth (39)

michael-nuccitelli-cyberstealth (36)

michael-nuccitelli-cyberstealth (1)

michael-nuccitelli-cyberstealth (1)

michael-nuccitelli-cyberstealth (2)

michael-nuccitelli-cyberstealth (3)

michael-nuccitelli-cyberstealth (4)

michael-nuccitelli-cyberstealth (5)

michael-nuccitelli-cyberstealth (6)

michael-nuccitelli-cyberstealth (7)

michael-nuccitelli-cyberstealth (8)

michael-nuccitelli-cyberstealth (9)

michael-nuccitelli-cyberstealth (10)

michael-nuccitelli-cyberstealth (11)

michael-nuccitelli-cyberstealth (12)

michael-nuccitelli-cyberstealth (13)

michael-nuccitelli-cyberstealth (14)

michael-nuccitelli-cyberstealth (15)

michael-nuccitelli-cyberstealth (16)

michael-nuccitelli-cyberstealth (17)

michael-nuccitelli-cyberstealth (18)

michael-nuccitelli-cybersteal

michael-nuccitelli-cyberstealth (20)

michael-nuccitelli-cyberstealth (21)

michael-nuccitelli-cyberstealth (22)

michael-nuccitelli-cyberstealth (23)

michael-nuccitelli-cyberstealth (24)

michael-nuccitelli-cyberstealth (25)

michael-nuccitelli-cyberstealth (26)

michael-nuccitelli-cyberstealth (27)

michael-nuccitelli-cyberstealth (28)

michael-nuccitelli-cyberstealth (29)

michael-nuccitelli-cyberstealth (30)

michael-nuccitelli-cyberstealth (31)

michael-nuccitelli-cyberstealth (32)

michael-nuccitelli-cyberstealth (38)

michael-nuccitelli-cyberstealth (40)

michael-nuccitelli-cyberstealth (34)

michael-nuccitelli-cyberstealth (33)

michael-nuccitelli-cyberstealth (37)

All Terms of Nonsense: cyberstealth, catfishing, online deception, fake news, yellow journalism, disinformation, veil of anonymity, online camouflage, impersonation, character assassination, impersonation

cyberstealth-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

cyberstealth-ipredator-text-logo-michael-nuccitelli

ipredator-website-home-button

Public Domain Troll Triad Images by Michael Nuccitelli, Psy.D. (2)

25 Public Domain Troll Triad Images

by

Michael Nuccitelli Psy.D.

(Part 2)

troll-triad-images-2-michael-nuccitelli-ipredator

Provided below are another 25 free “Troll Triad” awareness images created by this writer Michael Nuccitelli Psy.D. They are JPEG files and 1080×1080, 1080×1350 or 1080×608 pixels. These images are optimized for Instagram and can be edited to different sizes. Dr. Nuccitelli’s images are available for direct download, free and public domain. Edit them as you wish and no attribution is required.

Internet Troll Definition

Internet Troll is a colloquial expression describing any person(s) who uses Information and Communications Technology (ICT) to instigate, tease, provoke or incite to anger other online users or groups of online users. Their primary goal is to illicit and instigate a negative response from their provocations. For most Online Trolls, they have a perceptually distorted sense of personal gain rooted in feeling pride, power, control and self-worth by causing others distress and frustration.

Motivated by what this writer calls being successful Online Provocateurs & Cyber Hecklers, an Internet Troll’s sense of power and control is directly correlated to the volume and depth of distress and anger they cause others. Given that their feelings of power and control are linked to the amount of negativity they cause others, the Internet Troll is driven by the adage “The More Online Pain, The More Troll Gain”.

Internet Trolls are online user response dependent seeking feelings of power when there is confirmation of the anguish, they cause others. So entrenched in this cyber illusion of distorted power, the Internet Troll experiences a sense of accomplishment when their targets attempt to disparage and humiliate them.

Troll Triad Defined

Troll Triad is a cyber psychopathology-profiling concept that introduces a three-pronged archetypal model describing groups of online users who engage in defamation of character, slander & libel. Troll Triad is not just a facetious term describing three small minded online users who used social media and internet radio and information and communications technology to defame, manipulate, curry favor and seek support from other like-minded online users.

Troll Triad is also a conceptual framework and template describing how groups of online trolls (aka, iPredators) will be partitioned into three archetypal segments. This troika includes the Cerebral, Provocateur and the Crier. When these three elements mix correctly, the Troll Triad becomes a masterpiece of human predation alchemy.

michael-nuccitelli-troll-triad-text-image-#bebest-2

Troll Triad Archetypes (3)

Cerebral: The Cerebral is the online user who serves as either the architect of the defamation and disinformation campaign, a front of legitimacy justifying the denigration and fraudulent crusade or a combination of the two. The Cerebral does not need to be adept at using Information and Communications Technology as their success is measured by how quickly others validate the group’s nefarious online activities from a cognitive standpoint. The Cerebral does not have to be formally educated with advanced academic degrees, so if they are charismatic and intriguing in online or offline public forums. The Cerebral is best described as the “brains of the online operation”.

Provocateur: The Provocateur is the online user who serves as the agitator mobilizing other like-minded online users to engage in the Troll Triad’s denigration and fraudulent defamation campaigns. Using partial truths and unsubstantiated claims about their target, the Provocateur attempts to champion a sense of “us vs. them” to instill their perceptual distortion in the online users they are trying to motivate. The Provocateur serves four primary functions.

  • Motivate and mobilize as many like-minded online users as possible to become active participants in the defamation campaigns.
  • Create, disseminate and motivate like-minded online users by using details about their target to justify their campaigns.
  • Actively and persistently, exonerate and espouse accolades about the Cerebral to create a pseudo-moral justification for attacking their target(s).
  • Provoke and incite as many like-minded online users as possible by using partial truths, total fabrications and unsubstantiated claims ranging from mildly embellished to completely

Crier: The Crier is the online user who serves as messenger, event planner and the cloaked skeptic when communicating the Troll Triad’s rationale for launching and managing their denigration and fraudulent defamation campaigns. The Crier habitually disseminates felonious information, partial truths and “us vs. them” implanted morsels of disinformation to rationalize the Troll Triad’s malevolent online activities.

Within the Troll Triad, the Crier is least likely to be intelligent, provocative or charismatic as the Cerebral and Provocateur. The Crier is more adept and skilled in their ability to spread the Triad’s message. Not only is the Crier the most effective messenger of the three typologies, but they also serve as the group’s cloaked skeptic. Although their objectives to disparage and defame a target are the same as the Cerebral and Provocateur, the Crier works to validate the Cerebral’s intellect and the Provocateur’s passion by presented alternative views and insights.

Troll Triad Images

michael-nuccitelli-troll-triad-image (12)

michael-nuccitelli-troll-triad-image (14)

michael-nuccitelli-troll-triad-image (32)

michael-nuccitelli-troll-triad-image (29)

michael-nuccitelli-troll-triad-image (17)

michael-nuccitelli-troll-triad-image (33)

michael-nuccitelli-troll-triad-image (13)

michael-nuccitelli-troll-triad-image (37)

michael-nuccitelli-troll-triad-image (27)

michael-nuccitelli-troll-triad-image (15)

michael-nuccitelli-troll-triad-image (18)

michael-nuccitelli-troll-triad-image (34)

michael-nuccitelli-troll-triad-image (28)

michael-nuccitelli-troll-triad-image (25)

michael-nuccitelli-troll-triad-image (35)

michael-nuccitelli-troll-triad-image (16)

michael-nuccitelli-troll-triad-image (30)

michael-nuccitelli-troll-triad-image (38)

michael-nuccitelli-troll-triad-image (26)

michael-nuccitelli-troll-triad-image (31)

michael-nuccitelli-troll-triad-image (40)

michael-nuccitelli-troll-triad-image (39)

michael-nuccitelli-troll-triad-image (41)

michael-nuccitelli-troll-triad-image (36)

michael-nuccitelli-troll-triad-image (51)

iPredator Predatory Troll Checklist (IPTC)

troll-triad-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.


ipredator-website-home-button

Free Troll Triad Awareness Images by Michael Nuccitelli, Psy.D.

25 Educational Troll Triad Images

by

Michael Nuccitelli Psy.D.

troll-triad-images-michael-nuccitelli

Provided below are 25 free “Troll Triad” awareness images created by this writer Michael Nuccitelli Psy.D. They are JPEG files and 1080×1080, 1080×1350 or 1080×608 pixels. These images are optimized for Instagram and can be edited to different sizes. Dr. Nuccitelli’s images are available for direct download, free and public domain. Edit them as you wish and no attribution to is required.

Troll Triad Definition

Troll Triad is a cyber psychopathology-profiling concept that introduces a three-pronged archetypal model describing groups of online users who engage in defamation of character, slander & libel. Troll Triad is not just a facetious term describing three small minded online users who used social media and internet radio and information and communications technology to defame, manipulate, curry favor and seek support from other like-minded online users.

Troll Triad is also a conceptual framework and template describing how groups of online trolls (aka, iPredators) will be partitioned into three archetypal segments. This troika includes the Cerebral, Provocateur and the Crier. When these three elements mix correctly, the Troll Triad becomes a masterpiece of human predation alchemy.

michael-nuccitelli-troll-triad-text-image-#bebest

Three Troll Triad Archetypes

Cerebral: The Cerebral is the online user who serves as either the architect of the defamation and disinformation campaign, a front of legitimacy justifying the denigration and fraudulent crusade or a combination of the two. The Cerebral does not need to be adept at using Information and Communications Technology as their success is measured by how quickly others validate the group’s nefarious online activities from a cognitive standpoint. The Cerebral does not have to be formally educated with advanced academic degrees, so if they are charismatic and intriguing in online or offline public forums. The Cerebral is best described as the “brains of the online operation”.

Provocateur: The Provocateur is the online user who serves as the agitator mobilizing other like-minded online users to engage in the Troll Triad’s denigration and fraudulent defamation campaigns. Using partial truths and unsubstantiated claims about their target, the Provocateur attempts to champion a sense of “us vs. them” to instill their perceptual distortion in the online users they are trying to motivate. The Provocateur serves four primary functions.

  • Motivate and mobilize as many like-minded online users as possible to become active participants in the defamation campaigns.
  • Create, disseminate and motivate like-minded online users by using details about their target to justify their campaigns.
  • Actively and persistently, exonerate and espouse accolades about the Cerebral to create a pseudo-moral justification for attacking their target(s).
  • Provoke and incite as many like-minded online users as possible by using partial truths, total fabrications and unsubstantiated claims ranging from mildly embellished to completely

Crier: The Crier is the online user who serves as messenger, event planner and the cloaked skeptic when communicating the Troll Triad’s rationale for launching and managing their denigration and fraudulent defamation campaigns. The Crier habitually disseminates felonious information, partial truths and “us vs. them” implanted morsels of disinformation to rationalize the Troll Triad’s malevolent online activities.

Within the Troll Triad, the Crier is least likely to be intelligent, provocative or charismatic as the Cerebral and Provocateur. The Crier is more adept and skilled in their ability to spread the Triad’s message. Not only is the Crier the most effective messenger of the three typologies, but they also serve as the group’s cloaked skeptic. Although their objectives to disparage and defame a target are the same as the Cerebral and Provocateur, the Crier works to validate the Cerebral’s intellect and the Provocateur’s passion by presented alternative views and insights.

Internet Troll Definition

Internet Troll is a colloquial expression describing any person(s) who uses Information and Communications Technology (ICT) to instigate, tease, provoke or incite to anger other online users or groups of online users. Their primary goal is to illicit and instigate a negative response from their provocations. For most Online Trolls, they have a perceptually distorted sense of  personal gain rooted in feeling pride, power, control and self-worth by causing others distress and frustration.

Motivated by what this writer calls being successful Online Provocateurs & Cyber Hecklers, an Internet Troll’s sense of power and control is directly correlated to the volume and depth of distress and anger they cause others. Given that their feelings of power and control are linked to the amount of negativity they cause others, the Internet Troll is driven by the adage “The More Online Pain, The More Troll Gain”.

Internet Trolls are online user response dependent seeking feelings of power when there is confirmation of the anguish, they cause others. So entrenched in this cyber illusion of distorted power, the Internet Troll actually experiences a sense of accomplishment when their targets attempt to disparage and humiliate them.

Troll Triad Images

michael-nuccitelli-troll-triad-image (19)

michael-nuccitelli-troll-triad-image (20)

michael-nuccitelli-troll-triad-image (22)

michael-nuccitelli-troll-triad-image (21)

michael-nuccitelli-troll-triad-image (1)

michael-nuccitelli-troll-triad-image (24)

michael-nuccitelli-troll-triad-image (2)

michael-nuccitelli-troll-triad-image (23)

michael-nuccitelli-troll-triad-image (43)

michael-nuccitelli-troll-triad-image (10)

michael-nuccitelli-troll-triad-image (44)

michael-nuccitelli-troll-triad-image (5)

michael-nuccitelli-troll-triad-image (45)

michael-nuccitelli-troll-triad-image (3)

michael-nuccitelli-troll-triad-image (50)

michael-nuccitelli-troll-triad-image (47)

michael-nuccitelli-troll-triad-image (46)

michael-nuccitelli-troll-triad-image (4)

michael-nuccitelli-troll-triad-image (49)

michael-nuccitelli-troll-triad-image (9)

michael-nuccitelli-troll-triad-image (48)

michael-nuccitelli-troll-triad-image (6)

michael-nuccitelli-troll-triad-image (11)

michael-nuccitelli-troll-triad-image (8)

michael-nuccitelli-troll-triad-image (7)

iPredator Predatory Troll Checklist (IPTC)

Michael Nuccitelli, Psy.D.

troll-triad-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

ipredator-website-home-button

 

 

30 Dark Side of Cyberspace Images by Michael Nuccitelli, Psy.D.

michael-nuccitelli-dark-side-of-cyberspace-images

30 Dark Side of Cyberspace Images

by

Michael Nuccitelli, Psy.D.

Provided below are 30 free “Dark Side of Cyberspace” awareness images created by this writer, Michael Nuccitelli, Psy.D. They are JPEG files and either 1080×1080, 1080×1350 or 1080×608 pixels. These images are optimized for Instagram or can be edited to varied sizes. Dr. Nuccitelli’s images are available for direct download, free and public domain. Edit them as you wish and no attribution is required.

To save and download, simply right click the image and “save as” or from your context menu. Over the next 3-4 months, Dr. Nuccitelli will be publishing many more blog posts making all his iPredator themed images available to download. Lastly, pasted below are links to his 26 free online safety themed checklists and inventories.

michael-nuccitelli-dark-side-of-cyberspace-text-image

“Dark Side of Cyberspace is a  metaphor and conceptual framework defining a virtual environmental realm that includes all criminal, deviant, deceptive, harmful and malevolent activities in the abstract universe of cyberspace. Whereas iPredator is a criminal, deviant and disturbed typology construct, Dark Side of Cyberspace also includes legal and illegal online activities, as well as destructive and self-destructive online behaviors.”

Michael Nuccitelli, Psy.D., (2013)

ipredator-michael-nuccitelli-logo-250px

iPredator Definition

iPredator: a person, group, or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft, or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power, control, and retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance, or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion, or national heritage. Their sole requirement to get started in this dark dimension is an internet connection.

Central to the concept is the premise that information age criminals, deviants, and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyber terrorist, internet troll, online child pornography consumer/distributor, or a person engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT;
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information;
  • A general understanding of cyberstealth used to engage in criminal or deviant activities or to profile, locate, stalk, and engage a target.

Unlike human predators prior to the information age, iPredators rely on the multitude of benefits offered by ICT. The primary differentiators of this very modern kind of predation are also threefold: the unlimited distance over which data can be conveyed, the immediacy with which the data can be conveyed, and the unlimited scope of data that can be conveyed. The importance of these three vectors of capability cannot be overstated. In pre-information age societies, by contrast, a predator’s malicious activity was local, slow-moving, and technologically constrained; the predator was limited to the area he could cover by car, to use an emblematic example, needed careful wooing or “casing” of his victim, and was restricted by the limitations of crude technologies like the telephone.

In the abstract and artificial electronic universe known as cyberspace, none of these restrictive qualifiers obtain. Furthermore, there is a fourth advantage that ICT offers iPredators: anonymity. On the internet it is easy for iPredators to actively design online profiles and diversionary tactics to remain undetected and untraceable.

Dark Side of Cyberspace Images

michael-nuccitelli-dark-side-of-cyberspace-ipredator-21

michael-nuccitelli-dark-side-of-cyberspace-ipredator-22

michael-nuccitelli-dark-side-of-cyberspace-ipredator-20

michael-nuccitelli-dark-side-of-cyberspace-ipredator-30

michael-nuccitelli-dark-side-of-cyberspace-ipredator-1

michael-nuccitelli-dark-side-of-cyberspace-ipredator-18

michael-nuccitelli-dark-side-of-cyberspace-ipredator-27

michael-nuccitelli-dark-side-of-cyberspace-ipredator-23

michael-nuccitelli-dark-side-of-cyberspace-ipredator-28

michael-nuccitelli-dark-side-of-cyberspace-ipredator-29

michael-nuccitelli-dark-side-of-cyberspace-ipredator-26

michael-nuccitelli-dark-side-of-cyberspace-ipredator-24

michael-nuccitelli-dark-side-of-cyberspace-ipredator-25

michael-nuccitelli-dark-side-of-cyberspace-ipredator-32

michael-nuccitelli-dark-side-of-cyberspace-ipredator-31

michael-nuccitelli-dark-side-of-cyberspace-ipredator-2

michael-nuccitelli-dark-side-of-cyberspace-ipredator-6

michael-nuccitelli-dark-side-of-cyberspace-ipredator-12

michael-nuccitelli-dark-side-of-cyberspace-ipredator-10

michael-nuccitelli-dark-side-of-cyberspace-ipredator-5

michael-nuccitelli-dark-side-of-cyberspace-ipredator-8

michael-nuccitelli-dark-side-of-cyberspace-ipredator-15

michael-nuccitelli-dark-side-of-cyberspace-ipredator-11

michael-nuccitelli-dark-side-of-cyberspace-ipredator-14

michael-nuccitelli-dark-side-of-cyberspace-ipredator-13

michael-nuccitelli-dark-side-of-cyberspace-ipredator-7

michael-nuccitelli-dark-side-of-cyberspace-ipredator-17

michael-nuccitelli-dark-side-of-cyberspace-ipredator-16

michael-nuccitelli-dark-side-of-cyberspace-ipredator-image-100

michael-nuccitelli-dark-side-of-cyberspace-ipredator-19

 

michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

ipredator-website-home-button

Pin It on Pinterest