internet-safety-online-safety-ipredator

20 iPredator Internet Safety

Tips and Dynamics

Internet Safety Dynamics: iPredator is a global online assailant concept that was formulated by New York State licensed psychologist and cyberpsychologist, Michael Nuccitelli, Psy.D. iPredator is a term used to describe online users who engage in criminal, deviant or abusive behaviors using Information and Communications Technology (ICT.) Whether the offender is a cyberbully, cyberstalker, cybercriminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator.

In the article that follows, this writer presents a brief overview of the 20 factors that were used in the design of the iPredator concept. Although ICT will continue to advance in both technology and applications, the 20 factors listed will be relevant for decades. In order to effectively educate, evaluate, investigate or advise any online user on internet safety, it is paramount to grasp the basic concepts and terms vital to all internet users.

The importance of ICT and the internet is different to everyone and as unique as a fingerprint. For some, ICT and the internet are nothing more than tools of convenience for conducting mundane tasks. For others, their social, scholastic, business and/or financial affairs disclosed online are crucial to their self-esteem and livelihood. 

As ICT, social media, virtual reality and the Information Age rapidly expands becoming more integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. At present, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, that all online users and their loved ones must be vigilant about.

This writer is also firmly aware he has only scratched the surface of a new dimension a mere 40+ years old called the internet and a new cultural paradigm shift in the ways humans compile, exchange and disseminate information. Even after this extensive research project led to the creation of iPredator, this writer was confronted with a plethora of ever-growing questions and quandaries on the present and future importance and of ICT and cyberspace. This being said, it is clear that the Information Age is creating changes in all forms of communication.

Regarding the theory of iPredator, the terms and concepts listed below were used in it’s creation. This writer strongly believes these 20 facets of ICT’s interface with criminal, deviant, and abusive behaviors will be central themes for many years to come. Although ICT will continue to advance in both applications and purposes, the terms and themes presented below will be integral to online safety and security practices. They are as follows:

ICT

1. ICT: Information and Communications Technology (ICT) is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. ICT stresses the role of unified communications and the integration of telecommunications, which enable users to create, access, store, transmit, and manipulate information.

ICT consists of all forms of telecommunication, information technology, broadcast media, audio and video processing, transmission and network based control and monitoring functions. Information and communications technology today usually means computer-based management of data or ideas, but will continue to grow with technological advancements. ICT has rapidly become one of the basic building blocks of society becoming increasingly integral as the Information Age matures.

Many countries now regard understanding ICT and mastering the basic skills and concepts of ICT as part of the core of education, alongside reading, writing and mathematics. The importance of ICT to humanity lies upon a continuum of relevance ranging from minimal impact to vital requirement regarding an online user’s day-to-day activities . For some, ICT and the internet are nothing more than tools of convenience for conducting their responsibilities. For others, their social, scholastic, business and financial affairs are crucial to their self-esteem, self-worth, success and perceptual world.

iPredator

2. iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, abuse, victimization, stalking, theft or disparagement of others using Information and Communications Technology (ICT.). iPredators are driven by deviant sexual fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by socio-economic status or racial/national heritage. Whether the offender is a cyberbully, cyberstalker, cyber criminal, online sexual predator, Internet troll or cyber terrorist, they fall within the scope of iPredator. The three measures used to define an iPredator include:

I. A self-awareness of causing harm to others using ICT.
II. An intermittent to frequent usage of ICT to obtain, exchange and disseminate harmful information.
III. A general understanding of Cyberstealth used to locate, stalk and engage a target using ICT.

Unlike traditional human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in an abstract electronic universe.

Cyberpsychology

3. Cyberpsychology: Cyberpsychology is the study of cognitive, affective, behavioral and perceptual states in humans related to their interactions with ICT and cyberspace. ICT is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. Cyberspace is an abstract concept used to describe the non-physical terrain created by ICT.

Within this terrain, people compile, exchange and disseminate information relevant to their needs, goals, developmental requirements and responsibilities. Although ICT defines the devices and applications used to obtain, exchange and disseminate information, Cyberpsychology examines ICT in relationship to the human interactions that occur using ICT to interface with cyberspace.

Cyberpsychology investigates the cognitive, affective, behavioral and perceptual motivations and drives directly employed using ICT to communicate with an abstract digital environment. Cyberpsychology requires a person to interact with ICT as part of their pursuits and responsibilities and assumes these interactions act as a virtual extension of the human mind and social interactions. Just as the field of Psychology has sub-fields of specialty, Cyberpsychology also has variations in scope. 

Cyber Harassment

4. Cyber Harassment: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an iPredator that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an online user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, cyber harassment continues to flourish. Cyber harassment is the adult form of cyberbullying to a minor.

Cyberstalking

5. Cyberstalking: Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an iPredator and typology of pathological internet user. Cyberstalking tactics include: false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones via ICT.

Examples of psychological threats involves disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of cyberstalkers. Given the internet is inexpensive and easy to access, distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target other online users and a psychiatric pathology. When Cyberstalking is a tactic, the assailant does not need to be motivated by psychopathology.

Digital Reputation

6. Digital Reputation: Digital reputation is a term used to describe the reputation of an Information and Communications Technology (ICT) user or business that is disseminated online and available to peers, superiors, loved ones and consumers. This information can be positive or negative and vital to the health, success and reputation of an ICT user or business.

Digital reputation is created and sustained by peers, school or work associates, loved ones, acquaintances, consumers, competitors, adversaries, online strangers and iPredators. Given the widespread growth and expansion of ICT, a positive digital reputation is vital to people, communities and businesses in order to thrive, survive and for attainment of personal endeavors.

Digital reputation and the growing risks confronting online users and businesses have become increasingly endemic due to the escalating use and significance of the internet as a communication platform. With the ascent of social media, the formation of digital reputation is an increasingly common process and the practices of digital reputation management has become crucial for both individuals and corporate entities. An onlineuser or business’s digital reputation is directly correlated to their digital footprint. Like digital footprint, an online user’s digital reputation is directly correlated to the quantity, quality, accuracy and extent of personal information they post or share online available and used by other online users.

Digital Footprint

7. Digital Footprint: Digital footprint is a term used to describe the trail, traces or “footprints” that children, adults and businesses leave in cyberspace from their online activities using Information and Communications Technology (ICT.) This is information that is obtained, exchanged or disseminated between online users. An online user’s digital footprint is created by social media information, forum registrations, e-mails, attachments, videos, digital images and other forms of communication via ICT that leave traces of personal and/or corporate information about someone and/or a business available to others online. An online user or business’s digital reputation is directly correlated with their digital footprint.

An online user or business’s digital reputation is created by a culmination of their digital footprints over a period of time. Like digital reputation, an online user’s digital footprint can be positive or negative and vital to the health, success and reputation of an online user or business. Personal information disclosed or shared online all contribute to an online user’s digital footprint in the age of social media. Like digital footprint, an online user’s digital reputation is directly correlated to the quantity, quality, accuracy and extent of personal information they post or share online available and used by other online users. It is for these reasons that a child, adult or business must be diligent in monitoring their digital footprint.

High Risk ICT

8. High Risk ICT: High risk ICT factors are defined as actions and behaviors an online user participates in online, which increases their probability of becoming a target of an iPredator. These actions and/or behaviors differ depending on the age, gender, environmental influences and psychological status of the online user interacting with ICT. High risk ICT factors tend to be rooted in non-compliance, ignorance or oppositional defiance of following proper internet safety and iPredator protection tactics when engaged in high risk online behaviors.

High risk ICT factors are highly susceptible to environmental stressors and psychological dysfunction. High risk ICT factors tend to be most problematic for children, but adults can be equally susceptible. Of the myriad of high risk behaviors an online user can engage in leading to an increased risk probability of being victimized, the following six behaviors are strong predictors of online victimization for children and correlated to adult online victimization:

I. Interacting online with unknown online users.
II. Having unknown online users on their “buddy” or “friends” lists.
III. Interacting online with unknown online users engaged in topics on sexuality.
IV. Viewing or downloading pornographic or “dark” content online.
V. Behaving in a rude, harassing or abusive manner towards other online users.
VI. Posting or sharing personal and/or contact information available to unknown online users.

ICT Awareness

9. ICT Awareness: The ICT awareness factor is defined as the level of awareness an online user or business has related to their practice of digital citizenship and how they are perceived by other internet users. This factor examines an online user or business’s understanding of digital citizenship, cyber security and how their ICT practices are translated by other online users. ICT Awareness is a conscious state and overture that is part of a strategy, practice and consistent sustained approach to reducing the probability of being misrepresented by others or becoming an online victim.

These strategies involve a concerted effort to understand how they are perceived by other online users. The ICT awareness factor also describes the amount of information a parent, family member, support group, educator, loved one or business has accrued related to digital citizenship and internet safety measures used to insulate a child, adult or business from becoming a target of an iPredator. The ICT awareness factor includes:

I. The online user or business support system’s understanding of ICT & digital citizenship
II. An iPredator’s techniques and tactics used in Cyberstealth with ICT
III. An online user’s conscious efforts to engage in digital citizenship and internet safety habits.
IV. An online user or business’s proactive self monitoring of how they are perceived by other online users.

Mobile Device Technology

10. Mobile Device Technology: The mobile device technology factor is defined as a collective term representing the portable genre of Information and Communications Technology (ICT) that describes the various types of mobile devices used by children, adults and businesses. Examples include cellular phones, smart phones and tablets. The mobile device technology factor also relates to a child, adult or business’s knowledge and application of mobile device safety.

The term, Mobile Device, is a generic term used to refer to a variety of devices that allow people to access data and information from wherever they are. This includes cell phones, smartphones and various other portable devices. The mobile device technology factor also examines the child, adult or business’s understanding of how they interact with their mobile devices and how iPredators use mobile device technology to target and locate their victims.

However, mobility has far-reaching effects on the enterprise in areas such as security risk, use policies, manageability and governance. Given the rapid growth and inevitable broad expansion of mobile device technology, this area will become increasingly more relevant in regard to all online users practicing cautious and proactive mobile device safety. Given the fast pace nature of human civilization, mobile device technology will become mandatory requirements for anyone seeking to connect with their loved ones, colleagues, peers and community resources.

Personal Information

11. Personal Information: The personal information factor is a term used to describe the quantity and frequency of personal information an onlinr user or business shares with other online users and available to known and unknown online users to view and prospect. Examples of personal information include their home/work/school address, full names, name of school/employer, age, gender, financial information, images, videos and online activities (i.e. passwords, usernames, profiles.)

The personal information factor relates to the online user or business’s knowledge and understanding of the risks created when they post and/or share their contact or personal information about their age, gender, daily routines, sexual predilections and online preferences and/or activities.

With an abundance of popular social networking websites like X, Facebook, Instagram and LinkedIn, it has become easy for iPredators to target children and adults to amass their personal information. Images and videos posted publicly online can leave a trail easily traceable by iPredators.

The personal information factor is the most important aspect of internet safety cautioned to all online users. iPredators heavily rely on access and acquisition of their potential targets personal information. Given their advanced ICT prowess and ability to manipulate vulnerable internet users, many iPredators do not have to rely on social networking sites to obtain the necessary personal information to locate, identify and target their victims.

Psychological State

12. Psychological State (aka, ODDOR): The psychological state factor is a generic term used to define psychological aspects of an online user or group of online users at the time they are engaged in online activities and how these psychological factors influence their capacity to practice Internet safety and security. The more isolated, discouraged or angry an online user feels, the more apt they are to engage in high-risk ICT activities discouraged by internet safety guidelines.

The psychological state factor relates to the online user or business’s knowledge and understanding of how cognitive, affective, behavioral and perceptual processing states govern online activities. Of the twenty factors designed in the iPredator theoretical concept, the online user’s psychological state is primarily influenced by their home, career and/or school environments and highly relevant to their online activities and risk potential.

For all online users, their offline stressors, conflicts and environmental obstacles have a direct effect upon their online demeanor and responses. When home, school, work, finances or other offline factors are causing significant distress, research has proven online users of all ages are more apt to be less vigilant in ICT and internet safety tactics and more likely to engage in higher risk online behaviors. When an internet user is in a perceived stable, encouraging, structured and consistent environment, their psychological well-being affords them to be more cautious and conscientious of their online activities.

Social Media

13. Social Media: The social media factor is used to describe the online technologies and practices an online user accesses to share their opinions, insights, experiences and perspectives related to their personal, career and/or scholastic activities on social networking websites. Social media is defined as forms of electronic communication through which users create online communities to share information, ideas, personal messages, and other content.

The social media factor relates to the online user’s knowledge and understanding of their energy, time and importance they place on their social media profiles and networking endeavors, perceived online image and their interactions with other online users using social networking websites.

More specifically, social media refers to the use of web-based and mobile technologies to turn communication into an interactive dialogue. Within this factor, the areas investigated include the themes and quantity of personal and sensitive information an online user allows other online users to view related to themselves, their loved ones or their employers or academic institutions. A growing number of online users place an incredible amount of time, effort and thought into their social networking site profiles and endeavors. Social media has become a driving force in many online users lives and a frequented arena for cyberbullying, cyber harassment and cyberstalking.

iPredator Protection

14. iPredator Protection: The iPredator protection factor is defined as the amount of effort, time and education an online user or business engages in to reduce their probability of becoming a target of an iPredator. Slightly different from the ICT awareness & iPredator awareness factors used in the iPredator concept, iPredator protection emphasizes the protective measures and protection based software, hardware and applications an online user monitors, obtains and employs.

The iPredator protection factor relates to the online user or business’s knowledge, participation and understanding of the necessary measures and strategies they should or should not engage in related to their ICT activities.

The iPredator protection factor assesses if the online user or business actively practices internet safety, cyber security, sets appropriate online restrictions and prepared to respond accordingly if they are targeted by an iPredator or nefarious corporate entity related to businesses. In relationship to children, the iPredator protection factor also includes the effort, knowledge and tactics of parents, educators and the child’s support system to insulate and protect them from iPredator.

Just like any new environment humanity is presented, it is paramount for all online users to always be cautious when engaged in communications in cyberspace. Internet users adept at iPredator protection are knowledgeable of all there is to protect themselves, their loved ones or business.

iPredator Awareness

15. iPredator Awareness: The iPredator awareness factor describes the amount of information, knowledge and conscious preparedness an online user has related to iPredators and their existence in cyberspace. Vital to iPredator awareness is an online user or business’s capacity to understand the methods and techniques iPredators use to locate, identify, stalk and attack their target they deem as vulnerable and/or deserving of their victimization and stalking.

The iPredator awareness factor relates to the online user’s knowledge and understanding of the tactics and techniques an iPredator uses. iPredators can be any age, either gender and not bound by socio-economic status or racial/national heritage. Within each category of iPredator, a degree of victimization lies upon a continuum of severity ranging from mild to severe regarding their intent, goals and modus operandi.

The key area examined in the iPredator awareness factor a consistent level of caution practiced by the online user that is fueled by the online user or business’s knowledge that iPredator’s may launch a cyber-attack. The level of iPredator awareness practiced by an online user is defined by their psychological, emotional and environmental stability. The less stable the online user is with these human experiences, the less aware they are of the nefarious and malevolent entities that access ICT for vulnerable targets.

Cyberbullying

16. Cyberbullying: Cyberbullying is defined as threatening or disparaging information directed at a target child delivered through Information and Communications Technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyberbullying includes a phenomenon called Cyberbullying by proxy.

Cyberbullying by proxy is when a cyberbully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyberbullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community.

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of cyberbullying can become psychologically devastated and/or cyberbullies themselves.

Forensic Cyberpsychology

17. Forensic Cyberpsychology: Forensic Cyberpsychology is a sub field of Cybersychology and defined as the study of cognitive, affective, behavioral and perceptual states in humans related to their malevolent, nefarious, deviant or criminal interactions with ICT, cyberspace and their targets or victims. ICT is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. Cyberspace is an abstract concept used to describe the non-physical terrain created by ICT. Within this terrain, people obtain, exchange and disseminate information relevant to their needs, goals, developmental requirements and responsibilities.

Forensic Cyberpsychology explores the individual and group manifestations of behavioral, perceptual & psychological patterns within cyberspace in the areas of investigation and prevention of criminal violations, deviant behaviors and online victimization. Forensic Cyberpsychology analyzes the psychological mechanisms by which antisocial views and habits arise and take root in a person or groups perceptual world, the process by which their criminal goals and motives are formed and how these criminal/deviant goals implemented involve ICT and cyberspace. Forensic Cyberpsychology works to investigate and understand the psychological, behavioral and perceptual mechanisms of individuals and groups who utilize ICT to victimize, harm, cloak or steal from online users, groups or businesses.

Digital Citizenship

18. Digital Citizenship: Digital citizenship is defined as the appropriate norms of behavior with regard to a person’s online activities. Digital citizenship addresses the multiple levels of responsibility encouraged for all online users when interacting with the devices & applications of ICT and cyberspace. The rules of digital citizenship includes netiquette, private information protection, online safety measures, dealing with cyberbullying and harassment, digital rights & responsibilities and cyber security.

Digital citizenship endeavors to advocate, model and teach others safe, legal, and ethical use of ICT including: respect for copyright, intellectual property and the appropriate documentation of sources. Educators of digital citizenship understand regional and global societal responsibilities in an evolving and rapidly expanding digital culture

Although digital citizenship involves multiple facets, a primary goal is the practice of netiquette and responsible social interactions. Netiquette practices are the electronic standards of conduct and behaviors when interacting with others and respect for the information one posts and disseminates regarding other online users. It is assumed that the more adept an online user is practicing digital citizenship, the less likely he/she is at being targeted by an iPredator. As described in the iPredator protection factor used to create the theory of iPredator, digital citizenship is recognized as an iPredator protection approach.

Dark Psychology

19. Dark Psychology: Dark Psychology is a theoretical construct designed by New York State licensed psychologist and cyberpsychologist Michael Nuccitelli, Psy.D. in 2006. Dark psychology is defined as the study of the human condition as it relates to the instinctual, sociological and psychological nature of people to prey upon others that falls along a continuum ranging from purposive and/or instinctual to purposeless and anti-evolutionary or evil. All of humanity has this potential to victimize other humans & living creatures. While many restrain or sublimate this tendency, some act upon these impulses.

Dark psychology seeks to understand the cognitive, affective, behavioral and perceptual states that lead to predatory behavior. Dark psychology assumes that this production is purposive and has some rational, goal-oriented motivation 99% of the time. The remaining 1%, under dark psychology, is the brutal victimization of others without purposive intent or reasonably defined by evolutionary science or religious dogma.

Within the next century, the growth of Information and Communications Technology (ICT), iPredators and their acts of theft, violence and abuse will become a global phenomenon and societal epidemic if not squashed. Segments of iPredators include cyberstalkers, cyberbullies, cyber terrorists, cyber criminals, online sexual predators and political/religious fanatics engaged in cyber warfare. Just as Dark Psychology views all criminal/deviant behavior on a continuum of severity and purposive intent, the theory of iPredator follows the same framework, but involves abuse, theft, assault and victimization in cyberspace.

Cyberstealth

20. Cyberstealth: Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT), if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Given the internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind online users the primary intent fueling iPredators. This intent is to hide or blur their identity and motivations by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Therefore, as the internet naturally offers all online users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in online activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is IVI or iPredator Victim Intuition. By using Cyberstealth, an iPredator’s IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications.

Free Educational iPredator Inventory Links

  1. iPredator Probability Inventory – 330 (IPI-330)
  2. iPredator Probability Inventory – Adult (IPI-A)
  3. iPredator Probability Inventory – Business (IPI-B)
  4. iPredator Probability Inventory – Cyberbully (IPI-CB)
  5. iPredator Probability Inventory – Cyberbully Abuser (IPI-CBA)
  6. iPredator Probability Inventory – Cybercrime (IPI-C)
  7. iPredator Probability Inventory – Cyberstalking (IPI-CS)
  8. iPredator Probability Inventory – Educator (IPI-E)
  9. iPredator Probability Inventory – Internet Predator (IPI-IP)
  10. iPredator Probability Inventory – Pediatric (IPI-P)
  11. iPredator Probability Inventory – Psychologist (IPI-PSY)
  12. iPredator Probability Inventory – Teen (IPI-T)

Free Educational iPredator Checklist Links

  1. Adult Internet Safety Checklist (AISC)
  2. Business Internet Safety Checklist (BISC)
  3. Cyberbully Abuser Checklist (CBAC)
  4. Cyberbullying Target Checklist (CBTC)
  5. Cybercrime Protection Checklist (CCPC)
  6. Cyberstalker Identification Interview (CSII)
  7. Cyberstalking Prevention Checklist (CSPC)
  8. Digital Reputation Protection Checklist (DRPC)
  9. Educator Internet Safety Checklist (EISC)
  10. Internet Safety Checklist Psychologist (ISCP)
  11. Online Predator Prevention Checklist (OPPC)
  12. Parent Cyber Safety Checklist (PCSC)
  13. Pediatric Internet Safety Checklist (PISC)
  14. Teen Internet Safety Checklist (TISC)

 

ipredator-cyber-attack-risk-assessments-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychologist and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

HOME-BUTTON-IPREDATOR-INTERNET-SAFETY-IMAGE

 

Pin It on Pinterest

Share This