cyber-harassers-cyber-harassment-aficionados-ipredator-image

Cyber Harassers: Cyber Harassment Aficionados

Cyber Harassment Defined: Cyber harassment refers to the use of Information and Communications Technology (ICT) to provoke, harass, manipulate, or routinely demean a child, adult, business, or group, without making any explicit or implicit threats of physical harm. Unlike physical harassment, which involves direct contact, cyber harassment depends on ICT and can take the form of verbal, sexual, emotional, or social abuse targeting an individual, group, or organization. The main aim of a cyber harasser is to incite reactions and exert control over their chosen victim.

When minors are involved, cyberbullying is the term describing cyber harassment and when direct or implied physical harm to the targeted victim(s) is involved, cyber harassment becomes cyberstalking. Another similar term often used to define cyber harassment, but slightly different in assailant profile, is Internet Troll. For clarification, a brief definition of the five related concepts and internet defamation is as follows:

Cyberbullying Definition

Cyberbullying: Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as tools for information dissemination.

Cyberstalking Definition

Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, frighten, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both an online assailant tactic and typology of psychopathological ICT user. Cyberstalking includes direct or implied threats of physical harm, habitual surveillance and gathering information to manipulate and control a target. Cyberstalking requires a direct or implied threat of physical harm by the assailant.

Internet Troll Definition

Internet Troll: An internet troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. Often, the internet troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the internet troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorized as cyber harassment.

If the troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking. The motivations for an internet troll’s provocative, and often, bizarre behaviors are numerous. Despite the variations in modus operandi, most trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the internet troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors.

Of the four typologies presented, the internet troll is least likely to know the identity of their targeted victim(s) and least likely to be persistent and repetitive in their online assaults with the same online user(s). Although cyberbullying, cyber harassment and cyberstalking can be initiated by unknown assailants, internet trolls are most likely to view their maladaptive online exchanges as being part of an illusionary game.

michael-nuccitelli-predatory-troll-checklist-button

cyber-harassment-michael-nuccitelli

Cyber Harassment: Adult Form of Cyberbullying

As stated above, cyber harassment is an assailant’s use of ICT to harass, control, manipulate or habitually disparage another online user without a direct or implied threat of physical harm. Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT and is verbal, sexual, emotional or social abuse of a person, group or organization. The cyber harasser’s primary goal is to exert power and control over the targeted victim(s). When both the assailant and target are minors, cyberbullying is the appropriate term.

Cyber harassment is one typology included in the global technological predator construct, iPredator, authored by this writer. Cyber harassment, cyberbullying, internet trolling and cyberstalking are often used synonymously to describe online activities that include an assailant(s) targeting a victim(s) using aggressive information technology tactics. Given the list of online forums in which cyber harassment may occur, it is fair to assume “all” online forums and “all” electronic devices, internet enabled or not, are potential venues for this Information Age abuse. For any person, business or group who suspects they are being cyber harassed, it is vital to check their state statutes defining these laws.

Internet Defamation Quick Definition

Internet defamation (aka, online defamation) is a felonious statement of fact using Information and Communications Technology (ICT) that is published or disseminated to a third party in a careless or intentional manner and causes injury or damage to the subject of the statement. internet libel and slander are diverse types of defamation. Libel is a written defamatory statement, and slander is an oral defamatory statement.

Criteria for Internet Defamation

  • The statement(s) in question is a false statement, but intentionally or negligently presented and disseminated as a statement of fact.
  • The statement(s) in question is a false statement of fact that causes harm or is designed to cause harm to the subject or the subject’s reputation.
  • The statement(s) in question is a false statement of fact causing harm to the subject or the subject’s reputation and was made without research to verify the truthfulness of the statement.
  • The statement(s) in question is a false statement of fact causing harm to the subject or the subject’s reputation, who is a public figure or celebrity, and the false statement of fact is maliciously published online to do harm or acted in a reckless manner.

Given the citizens of the United States are granted the constitutional right to freedom of speech, successfully making an online assailant criminally or civilly liable remains extraordinarily difficult at present. Prior to the Information Age, harassment, bullying and stalking were apparent, but confined by time, geographic location, victim access and frequency.

With the advent of the internet, social media and mobile device technology, these forms of abuse have become around the clock activities leaving minimal respite for the victim. Having access to a multitude of digital devices combined with online forums to carry out harassment, the victim has no sanctuary or avenues for escape.

cyber-harassment-ipredator-new-york-internet-safety-michael-nuccitelli-psy.d.-cyberstalking-cyberbullying

Welcome to the Information Age Revolution!

Although contemporary humanity is at the beginning of the Information Revolution, information technology, social networking and cyberspace are rapidly becoming part of the human experience on all fronts. To suggest to a Cyber Harassment victim to merely “turn off the computer” or “delete all social profiles” as the solution to ending their attacks is ridiculous to say the least. Information and Communications Technology, the internet and daily human functioning, in industrialized nations, is rapidly becoming inseparable. Just as mechanization of the Industrial Age changed the human experience, the Information Age has followed suit.

The Information Age offers humanity incredible opportunities and benefits evidenced by each passing year bringing new types of technologies and online forums enhancing societies’ quality of life. As with all societal advancements, since the beginning of human civilization, all positive advancements have negative attributes hidden within their proverbial equation. For the Information Age, the negatives occur within the abstract and artificial universe, called cyberspace, where the “veil of anonymity” has turned some segments of society into seemingly demonic entities.

Whether it is defined as the disinhibition effect, deindividuation, internet addiction or a plethora of other psychological and sociological constructs attempting to define how cyberspace influences human behavior, defining why cyberspace encourages people to become malevolent is elusive at present.

Cyber harassment is but one of an entire cornucopia of negative interpersonal online activities whereby one user is the assailant and the other online user is the targeted victim. Without attempting to be reductionist, cyber harassment, cyberbullying, cyberstalking and internet trolling all involve an assailant(s) motivated by the need for power, control and domination over their chosen target. The details of nefarious online activities may vary, but the intrapsychic drives are the same.

Cyber harassment is the art and science of one or more online users attempting to psychologically devastate another online user(s). The drives fueling assailants fall upon a broad cognitive, affective and perceptual spectrum ranging from love to hatred, from sane to insane and from criminal to charitable. Lying upon a vast spectrum of motivation to harass other human beings is as age old as civilization itself.

Unfortunately, what is not as old as humanity is the emotional and psychological toll the victim experiences from habitual and unpredictable cyber-attacks. Never has an assailant had the opportunity to carry out their malevolent desires upon a victim 24 hours a day, 7 days a week and 365 days a year if they so decide. It is only since the birth of the Information Age that the dark realm of the human mind has flourished into what this writer calls, the Dark Side of Cyberspace.

Cyber Harassment Triad

From exhaustive research and professional experiences, interacting with both victims and assailants of online victimization has led this writer to conclude there are three primary arenas, which differentiate common online human neurotic states from criminal, deviant and psychopathological manifestations of cyber harassment, cyberstalking, cyberbullying and internet trolling.

These three areas are Persistence, Repetition & Perceptual Distortions. This triad could be the three arenas, which law enforcement and the judicial system defines when the constitutional right of all Americans to practice freedom of speech is no longer honored or a protected right, but a criminal and highly destructive behavior requiring admonishment and swift punishment.

Related to the concept of “information”, online users can only manipulate information in three ways. Information can be compiled; Information can be disseminated and Information can be exchanged. It is within these three channels that all data is manipulated. The iPredator uses these three channels to locate, identify, target and attack a known or unknown victim.

cyber-harassment-#bebest-michael-nuccitelli-ipredator

Cyber Harassment: An iPredator Typology

There are three main factors that distinguish typical online neurotic behaviors from criminal or deviant acts like cyber harassment, cyberstalking, cyberbullying, and internet trolling. These are Persistence, Repetition, and Perceptual Distortions. Law enforcement and the legal system use this triad to determine when free speech crosses a line, becoming not just unprotected but also criminal and highly damaging requiring intervention and penalties.

For activities such as cyber harassment, a summary of these three factors is:

I. Persistence: This covers how long attacks go on and the aggressor’s unwillingness to stop contacting the victim. If someone repeatedly spreads negative or threatening information about the victim at least three times within a month, or continues attacking even after being told to stop, they qualify for criminal or civil action.

II. Repetition: This measures how often harmful messages are sent. The key factor is how often the victim receives these negative communications. If any message implies direct or indirect physical harm to the victim or their loved ones, more than once, it’s grounds for litigation. For non-threatening negative content, three or more instances can lead to legal consequences.

III. Perceptual Distortion: Both the attacker’s and the victim’s perceptions are assessed. When the assailant’s identity is unknown, patterns of behavior and message themes help build a probable psychological profile. In contrast, a trusted person (not the victim themselves) evaluates the victim’s own perceptual distortions, which can clarify the attacker’s intent. Importantly, responsibility always remains with the aggressor.

cyber-harassment-michael-nuccitelli-ipredator

Help Combat Cyber Harassment & Internet Defamation!

By considering Persistence, Repetition, and Perceptual Distortions, victims and those supporting them can better evaluate the seriousness of online abuse. As digital technology advances, the urgent challenge is addressing the rise in people misusing cyberspace for malicious or anti-social purposes.

cyber-harassment-ipredator--michael-nuccitelli

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

HOME-BUTTON-IPREDATOR-INTERNET-SAFETY-IMAGE

Pin It on Pinterest

Share This