Examples of Cyberbullying Images – iPredator

examples-of-cyberbullying-images-ipredator

Educational Examples of Cyberbullying Images
by Michael Nuccitelli, Psy.D.

Examples of cyberbullying describe the variety of techniques cyberbullies use to taunt, threaten, humiliate and deprecate their target. The primary goal for the reader is to become familiar with the strategies children use to mistreat other children.

Many of these tactics are also made use of by adult online users engaged in cyber harassment, cyberstalking and predatory trolling. As humanity increasingly becomes dependent upon mobile device technology, virtual reality and artificial intelligence; the range and complexity of cyber-attacks will assuredly grow.

Provided are examples of cyberbullying in image form. As with all the content on this website, they are free to download, share and use for informational and educational purposes. All images are 1080×1080 compressed JPEG files 

Cyberbullying

Using Information and Communication Technology (ICT), cyberbullying is recurrent and sustained threats and taunts by one or more children towards another child who is unable or unwilling to deescalate the engagement. Cyberbullying is harmful, repeated and hostile behavior intended to deprecate a targeted minor.

Cyberbullying describes threatening or disparaging communications delivered through ICT. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyberbullying consists of information exchanged via ICT and may never involve face-to-face encounters.
.

Examples of Cyberbullying Images

Bash Boards: Defamatory content a cyberbully posts in chat rooms, online forums and message boards.

michael-nuccitelli-cyberbullying-bash-boards

BlogoBullying: A cyberbully creates a blog and then makes their target the central character and topic of defamatory posts.

michael-nuccitelli-cyberbullying-blogobullying

Cyberbullying by Proxy: Using deception, encouragement or manipulation; a cyberbully persuades other online users to harass their target.

michael-nuccitelli-cyberbullying-by-proxy

Cyberstalking: When a cyberbully uses intimidation and persistent taunting that frightens their target

michael-nuccitelli-cyberbullying-cyberstalking

Cyber Drama: When a cyberbully posts melodramatic content to alarm or defame their target.

michael-nuccitelli-cyberbullying-cyber-drama

Cyber Harassment: When a cyberbully repeatedly contacts and sends defamatory messages to their target.

michael-nuccitelli-cyberbullying-cyber-harassment

Cyber Threats: When a cyberbully falsely implies their target is in danger from unknown or nefarious assailants, which causes the target distress.

michael-nuccitelli-cyberbullying-cyber-threats

Denigration: When a cyberbully sends or publishes cruel rumors, gossip and false assertions about a target; trying to damage their reputation or friendships.

michael-nuccitelli-cyberbullying-denigration

Digital Piracy Inclusion: When a cyberbully persuades their target to engage in illegal digital piracy and then reports them to the authorities, their parents or educators.

michael-nuccitelli-cyberbullying-digital-piracy

eIntimidation: A colloquial expression that describes when a cyberbully attempts to control their target using emails to manipulate them.

michael-nuccitelli-cyberbullying-eintimidation

Exclusion: When a cyberbully informs their target that they are not invited to a social activity that other peers will be attending.

michael-nuccitelli-cyberbullying-exclusion

Exposure: Using social media, a cyberbully posts private communications, images or video about their target that is private and embarrassing.

michael-nuccitelli-cyberbullying-exposure

Flaming: Using social media, a cyberbully provokes an argument with their target that includes profane and vulgar terminology.

michael-nuccitelli-cyberbullying-flaming

Griefing: When a cyberbully frequents online gaming environments and frustrates their target by intentionally not following the rules.

michael-nuccitelli-cyberbullying-griefing

Happy Slapping: While the target is physically attacked and simultaneously recorded; the images and video are posted online by the cyberbully.

michael-nuccitelli-cyberbullying-happy-slapping

Impersonation: The cyberbully mimics their target and posts defamatory comments on social networking sites and in chat rooms.

michael-nuccitelli-cyberbullying-impersonation

Instant Messaging Attacks: Using an instant messaging account, the cyberbully bombards the target with harassing and threatening text messages.

michael-nuccitelli-cyberbullying-instant-messaging-attacks

Interactive Gaming Harassment: Having the ability to exchange information with online gaming opponents; cyberbullies verbally abuse their targets and lock them out of games.

michael-nuccitelli-cyberbullying-interactive-gaming-harassment

Malicious Code Dissemination: When a cyberbully sends malicious information like viruses, malware, spyware and ransomware to their target.

michael-nuccitelli-cyberbullying-malicious-code-dissemination

Micro-Visual Bullying: When a cyberbully creates and posts short videos to character assassinate their target.

michael-nuccitelli-cyberbullying-micro-visual-bullying

Mobile Device Image Sharing: When a cyberbully sends sexually suggestive or embarrassing images of the target to peer mobile devices.

michael-nuccitelli-cyberbullying-mobile-device-image-sharing

Non-Consensual Multimedia Bullying: The target does not know that embarrassing content is being disseminated by the cyberbully using various media formats.

michael-nuccitelli-cyberbullying-non-consensual-multimedia-bullying

Password Theft & Lockout: After a cyberbully steals & changes their target’s password, they impersonate them online and lock them out of their account.

michael-nuccitelli-cyberbullying-password-theft-and-lockout

Phishing: A cyberbully manipulates their target into revealing financial information and then purchases unauthorized items with their credit cards.

michael-nuccitelli-cyberbullying-phishing

Porn & Marketing List Insertion: Using confidential online sign-up forms, the cyberbully signs their target up to multiple pornography and junk lists.

michael-nuccitelli-cyberbullying-porn-marketing-list-insertion

Pseudonym Stealth: Cyberbullies secretly change their online usernames and begin to taunt, tease and humiliate their target while hiding their identity.

michael-nuccitelli-cyberbullying-pseudonym-stealth

Screen Name Mirroring: Similar to impersonation, the cyberbully uses screen names almost identical to the target and then posts provocative content.

michael-nuccitelli-cyberbullying-screen-name-mirroring

Sexting: The cyberbully text messages sexually themed information about their target that is embarrassing and hurtful.

michael-nuccitelli-cyberbullying-sexting

Sextortion: Using threats of revealing sexually themed content about their target, the cyberbully extorts them in exchange for not revealing the information.

michael-nuccitelli-cyberbullying-sextortion

Slut Shaming: The cyberbully records sexually suggestive images or videos of their target and distributes them throughout their school and online.

michael-nuccitelli-cyberbullying-slut-shaming

Social Media Bullying: The cyberbully persuades the target to include them in their “friends” or “buddy” lists, and then contacts their followers with derisive information.

michael-nuccitelli-cyberbullying-social-media-bullying

Text Wars and Text Attacks: The cyberbully and accomplices engage their target in a series of provocative text messages using a cellular phone service.

michael-nuccitelli-cyberbullying-text-wars-text-attacks

Tragedy News Mirroring: The cyberbully announces that their target is planning to engage in a violent activity soon after a similar regional or national tragedy.

michael-nuccitelli-cyberbullying-tragedy-news-mirroring

Trickery: The target is mistakenly led to believe that the sensitive information they share with the cyberbully will not be used for nefarious reasons.

michael-nuccitelli-cyberbullying-trickery

Trolling: The cyberbully repeatedly taunts their target across multiple online environments ranging from online gaming to chat rooms.

michael-nuccitelli-cyberbullying-trolling

Twitter Pooping: The cyberbully repeatedly tweets harmful and provocative insults about the target using current “net lingo” terms.

michael-nuccitelli-cyberbullying-twitter-pooping

Voting & Polling Booth Bullying: The cyberbully creates web pages that allow others to vote for categories deemed highly embarrassing to their target.

michael-nuccitelli-cyberbullying-voting-and-polling-booth-bullying

Warning Wars: The cyberbully makes frequent false allegations to an ISP seeking their target’s profile or account to be suspended.

Web Page Assassination: The cyberbully designs, and then posts web pages specifically intended to insult the target, their peers or loved ones.

michael-nuccitelli-cyberbullying-web-page-assassination

VLE Bullying: In Virtual Learning Environments (VLE), cyberbullies use VLE message boards, chat rooms and instant messaging functions to ridicule their target.

michael-nuccitelli-cyberbullying-vle-bullying

Virtual World Bullying: Using their avatar in 3D websites and virtual worlds, the cyberbully taunts and teases their target by using their avatar as the assailant or provocateur.

michael-nuccitelli-cyberbullying-vistual-world-bullying

YouTube Channeling: The cyberbully makes their target the principal character in a YouTube channel and publishes denigrating and disinformation-themed videos.

michael-nuccitelli-cyberbullying-youtube-channeling

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychologist and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

ipredator-website-home-button

 

 

 

 

Michael Nuccitelli, Psy.D. Thanks Action Against Stalking

michael-nuccitelli-thanks-action-against-stalking

Michael Nuccitelli, Psy.D.

Thanks

Action Against Stalking

This writer would like to thank Action Against Stalking (AAS) for the opportunity to educate online users about stalking, cyberstalking and his iPredator concept. Pasted below is their YouTube discussion. AAS is the premiere organization for addressing stalking, online stalking and victimization. In addition to education, their help and support to victims is exceptional. Not only should there be a Centre for Action Against Stalking throughout Europe but in every county of the United States. I am honored to be involved with this organization. Provided here is our educational session hosted on YouTube. Also provided are this writer’s iPredator and cyberstalking definitions.

 

I’d like to give a special thanks to the professionals who participated in our educational discussion and work tirelessly to help the victims of stalking and cyberstalking.

  • Ann Moulds, Action Against Stalking Founder and CEO
  • Amanda Morrison, Throughcare Practitioner
  • Gin Lowdean, Throughcare Service Manager
  • Richard Fodor, Community Engagement and Communications Officer

action-against-stalking-michael-nuccitelli-cyberstalking

Cyberstalking Definition

Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyber stalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. These threats cause the target to become frightened.

An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands.

Action Against Stalking Website

michael-nuccitelli-action-against-stalking-stop-cyberstalking

iPredator Definition

iPredator: iPredator is a person, group, or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft, or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power, control, and retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance, or personal and financial gain. They can be any age or gender and are not bound by economic status, race, religion, or national heritage. Their sole requirement to get started in this dark dimension is an internet connection.

Central to the concept is the premise that information age criminals, deviants, and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyberterrorist, internet troll, online child pornography consumer/distributor, or a person engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of cyberstealth used to engage in criminal or deviant activities or to profile, locate, stalk, and engage a target.

Unlike human predators prior to the information age, iPredators rely on the multitude of benefits offered by ICT. The primary differentiators of this very modern kind of predation are also threefold: the unlimited distance over which data can be conveyed, the immediacy with which the data can be conveyed, and the unlimited scope of data that can be conveyed. The importance of these three vectors of capability cannot be overstated. In pre-information age societies, by contrast, a predator’s malicious activity was local, slow-moving, and technologically constrained; the predator was limited to the area he could cover by car, to use an emblematic example, needed careful wooing or “casing” of his victim, and was restricted by the limitations of crude technologies like the telephone.

In the abstract and artificial electronic universe known as cyberspace, none of these restrictive qualifiers obtain. Furthermore, there is a fourth advantage that ICT offers iPredators: anonymity. On the internet it is easy for iPredators to actively design online profiles and diversionary tactics to remain undetected and untraceable.

Free Cyberstalking Assessment Links

Cyberstalking Prevention Checklist [CSPC]

iPredator Probability Inventory – Cyberstalking [IPI-CS]

Cyberstalker Identification Interview [CSII]

ipredator-michael-nuccitelli-action-against-stalking

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

action-against-stalking-domain-michael-nuccitelli-cyberstalking

Donate to Action Against Stalking

Action Against Stalking is a Scottish Charitable Incorporated Organization (SCIO No: SC044905)

ipredator-website-home-button

 

 

Unraveled: The Stalker’s Web by Michael Nuccitelli, Psy.D.

unraveled-the-stalkers-web-michael-nuccitelli-image

 

UNRAVELED

The Stalker’s Web

by Michael Nuccitelli, Psy.D.

For true crime enthusiasts, cyberpsychology students and those fascinated by cybercriminal minds, I strongly recommend listening to the podcast series titled “The Stalker’s Web” In addition to this excellent podcast, interested parties can watch the televised documentary on Discovery+, which premiers August 10, 2021. To listen to the podcasts, links have been provided or simply click on the episode image.

Hosted by Billy Jensen and Alexis Linkletter, “Unraveled: The Stalker’s Web” profiles one of the most notorious Information Age cyberstalkers, Jason Christopher Hughes. The podcast and documentary do an exceptional job profiling Mr. Hughes and his many victims. Given that the cyberstalker is one of the eight types of iPredator, provided here is my cyberstalking and iPredator definitions.

unraveled-the-stalkers-web-michael-nuccitelli-ipredator-symbol

iPredator Defined

 iPredator: A person, group, or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft, or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power, control, and retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance, or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion, or national heritage. Their sole requirement to get started in this dark dimension is an internet connection.

Central to the concept is the premise that information age criminals, deviants, and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyberterrorist, internet troll, online child pornography consumer/distributor, or a person engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of cyberstealth used to engage in criminal or deviant activities or to profile, locate, stalk, and engage a target.

Unlike human predators prior to the information age, iPredators rely on the multitude of benefits offered by ICT. The primary differentiators of this very modern kind of predation are also threefold: the unlimited distance over which data can be conveyed, the immediacy with which the data can be conveyed, and the unlimited scope of data that can be conveyed.

Cyberstalking Defined

Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an online assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, disinformation and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands. Cyberstalking is one category of iPredator that will continue to grow with the expansion of Information and Communications Technology.

Unraveled Podcast Links

(Links Provided or Click on Images for Podcast Episode)

unraveled-the-stalkers-web-antisense-michael-nuccitelli-ipredator

Episode 1: “Antisense” Podcast Link: https://play.acast.com/s/unraveled/s2ep.1-antisense

unraveled-the stalkers web-rachel-michael nuccitelli-ipredator

Episode 2: “Rachel” Podcast Link: https://play.acast.com/s/unraveled/s2ep.2-rachel

unraveled-the stalkers web-the extinct marsupial-michael nuccitelli-ipredator

Episode 3: “The Extinct Marsupial” Podcast Link: https://play.acast.com/s/unraveled/s2ep.3-theextinctmarsupial

unraveled-the stalkers web-mother-michael nuccitelli-ipredator

Episode 4: “Mother” Podcast Link: https://play.acast.com/s/unraveled/s2ep.4-mother 

unraveled-the stalkers web-the devils web-michael nuccitelli-ipredator

Episode 5: “The Devil’s Web” Podcast Link: https://play.acast.com/s/unraveled/s2ep.5-thedevilsweb 

unraveled-the-stalkers-web-podcast-michael-nuccitelli

Episode 6: “Hiding Out” Podcast Link: https://play.acast.com/s/unraveled/s2ep.6-hidingout

 

Educational Cyberstalking Assessment Links

Cyberstalking Prevention Checklist [CSPC]

iPredator Probability Inventory – Cyberstalking [IPI-CS]

Cyberstalker Identification Interview [CSII]

unraveled-ipredator-michael nuccitelli-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

mn-psychological-services-home-button

Internet Addiction Factors, Types & Awareness Images

michael-nuccitelli-internet-addiction-factors

Internet Addiction Factors, Types

&

Awareness Images

This blog post presents a list of factors and types related to Internet Addiction (aka, Internet Use Disorder). Like this entire website, all the images and content are public domain, educational and free to download, share or print. In addition to factors and types, the definition for internet addiction is provided.

It is important to note that internet addiction remains a controversial subject. Some feel it is not a true behavioral addiction like compulsive gambling, pornography and sex addiction. This writer is in the camp that views internet addiction as real, with all the trappings of other behavioral addictions.

Internet Addiction Defined

Internet Addiction: Internet Addiction (aka Internet Abuse, Internet Dependence & Internet Gaming Disorder) is an umbrella concept defining a child or adult’s compulsive and progressive abuse of Information and Communications Technology (ICT). Although the internet is the predominate arena in which the compulsive dependency takes place, electronic devices and communications channels not internet enabled are also included in the definition.

Internet Addiction causes dysfunctional cognitive, affective, behavioral & perceptual intrapersonal consequences accompanied with employment, academic, familial, peer & intimate partner interpersonal consequences. On a continuum of severity, ranging from absent to mild, cessation of internet and/or electronic device usage causes withdrawal symptomatology, psychological and/or physiological, combined with perceptual tolerance. Also, on a continuum of severity, internet abusive online users engage in criminal, deviant and/or deceptive online activities ranging from absent to severe.

The chronic and more debilitating condition, Internet Dependence, is more severe and self-destructive. Internet addiction is segmented into six typologies as follows: Cyber Sex Fixated, Cyber Relationship Fixated, Internet Gaming & Online Commerce Fixated, Information Implosion Fixated, Dark Side Fixated and NOS (Not Otherwise Specified) Fixated. The NOS Fixated typology applies to internet abusing online users who share more than one typology, has a co-existing mental illness or medical condition causing psychiatric dysfunction.

michael-nuccitelli-ipredator-internet-addiction-factors

INTERNET ADDICTION FACTORS

michael-nuccitelli-internet-addiction-factor-anonymity

Anonymity

(internet addiction factor)

Online anonymity allows the internet addicted to obtain, exchange, and disseminate information without their identity being revealed.

michael-nuccitelli-internet-addiction-factor-accessibility

Accessibility  

(internet addiction factor)

Cyberspace provides unrestricted access to the information, materials & social contacts that meet whatever the internet addicted preoccupation may be.

michael-nuccitelli-internet-addiction-factors-isolation

Isolation

(internet addiction factor)

The ability to research, discover and engage online users who share the same fixation in an isolated environment; allowing the internet addict to engage in high-risk online activities.

michael-nuccitelli-internet-addiction-factor-inexpensive

Inexpensive

(internet addiction factor)

Other than the cost of the devices, utility bills and software, the internet addicted can access untold number of websites, social contacts and organizations all specific to their chosen fixate.

michael-nuccitelli-internet-addiction-factor-fantasy

Fantasy 

(internet addiction factor)

Cyberspace for the internet addicted is home to an entire universe; designed by them, and themed with their fixation.

michael-nuccitelli-internet-addiction-factor-disconnection

Disconnection

(internet addiction factor)

Synonymous with detachment, the internet addicted gradually disconnects from their real friends, family and associates.

michael-nuccitelli-ipredator-internet-addiction-factors-types

TYPES OF INTERNET ADDICTION

michael-nuccitelli-internet-addiction-type-cyber-sex-fixated

Cyber Sex Fixated

(internet addiction type)

Obsessed with internet pornography, adult chat rooms, adult fantasy role-play websites, sexually themed social networking sites and texting like-minded online users.

michael-nuccitelli-internet-addiction-type-cyber-relationship-fixated

Cyber Relationship Fixated

(internet addiction type)

Fueled by the compulsive need to be accepted; online dating sites, chat rooms and social networking sites becomes the habitual repertoire for all online activities.

michael-nuccitelli-internet-addiction-gaming-online-commerce-fixated

Gaming & Online Commerce Fixated

(internet addiction type)

Fixated on browsing, purchasing, competing and betting at websites involving shopping, online gaming, casinos and auctions.

michael-nuccitelli-internet-addiction-information-implosion-fixated

Information Implosion Fixated

(internet addiction type)

Terms best describing this internet addicted type include “information addicts,” “dataholics” or suffering from “infobesity.”  

michael-nuccitelli-internet-addiction-dark-side-fixated

Dark Side Fixated 

(internet addiction type)

Fixated on all things macabre, violent, criminal, deviant and bizarre. Gravitates to obscene material and fascinated by all things dark themed. (Similar to Doomscrolling)

iPredator Internet Addiction Page

Internet Addiction Risk Checklist (IARC)

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

internet-addiction-factors-home-button

 
 
 
 
 
 
 
 
 
 
 

CAAS 2021 International Conference & Summit

caas-2021-international-conference-summit-featured-image

 

Thank You

Centre for Action Against Stalking

for the

CAAS 2021 International Conference & Summit

Titled “Dynamics between the Stalker and the Victim”, I am honored to be presenting iPredator, ODDOR and Cyberstalking at the 1st International Online Conference and Summit Tuesday-Thursday April 20th-22nd 2021. Provided here is the registration link and summit itinerary. 

caas-2021-international-conference-summit-text-image

Registration Link: https://www.actionagainststalking.org/conference    
Conference and Summit Program: https://www.actionagainststalking.org/copy-of-conference 

 

I would like to thank Ms. Ann Moulds, Dr. Waiyin Hatton & Action Against Stalking for the opportunity to present my work. To learn a little of what I will be discussing, provided are my iPredator, ODDOR, IVI and Cyberstalking definitions. Also made available to conference participants and all interested parties are my “iPredator” and “iPredator Notes” papers for direct download. Simply click on the PDF download buttons at the base of this post.

iPredator Definition

iPredator is a person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace.

caas-2021-international-conference-summit-image-2

Cyberstalking

Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands.

caas-2021-international-conference-summit-text-image-2

Offline Distress Dictates Online Response

(ODDOR)

Offline Distress Dictates Online Response (ODDOR) is a sub-tenet of iPredator, which posits that offline psychological functioning directly influences one’s online interactions. Whether someone is an online assailant, cyber-attack target or both, ODDOR does not discriminate. ODDOR postulates that temporary and long-standing psychological states can significantly taint an online user’s behaviors and interpretations. Perceptually isolated, ignorance of the existence of ODDOR and experiencing atypical affective and cognitive states increases the probability of being targeted by an online assailant.

In addition to being at a greater risk of being cyber attacked, ODDOR influences an online user to partake in destructive and self-destructive online activities. If a person is self-aware and reasonably healthy, their levels of ODDOR are less likely to become problematic. Just as self-awareness acts as a buffer between mental health and dysfunction, the same holds true for ODDOR.

caas-2021-international-conference-summit-image-3

iPredator Victim Intuition (IVI)

iPredator Victim Intuition (IVI) is an iPredator construct sub-tenet reserved for seasoned online assailants. IVI is an iPredator’s aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their cyber-attack success with minimal ramifications. Some iPredators develop an intuition for knowing what online user will be a successful target through practice, learning and observation of other iPredators.

Practice, trial and error, understanding of human behavior and knowledge of internet safety and information security practices is where an iPredator’s IVI acumen thrives. An iPredator’s IVI falls on a continuum of dexterity whereby there are iPredators who are IVI skilled and iPredators who are novices. Whether the iPredator is advanced or a novice in their IVI acumen, the fact that they engage in developing an IVI makes them a potentially dangerous ICT user.

 

iPredator Concept Page & PDF Paper Download
iPredator Notes Page & PDF Paper Download

 

caas-2021-international-conference-summit-ipredator-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

home-button-michael-nuccitelli-ipredator

caas-2021-international-conference-summit-text-image-3

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Pin It on Pinterest

Share This