Google Find us on Google+

Michael Nuccitelli, Psy.D. | 2014 Cyberbullying Examples



SEXTORTION-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: SEXTORTION

36. Sextortion: Sextortion is a cyberbullying tactic by which children exploit other children for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target child. If the target child does not submit to their sexual directives, they threaten to disclose sensitive information to loved ones, employers, educators, peers or organizations if the victim does not submit to their demands.

TWITTER POOPING-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: TWITTER POOPING

37. Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target child. Given that Tweets are restricted to 140 characters, Twitter Pooping tends to be frequent insults and provocations that often use “net lingo” to fit the harmful message the cyberbully is attempting to convey. Because Tweets can be disseminated in a rapid and hidden manner, cyberbullies are using this method of taunting at greater rates. If the Tweet is creative and skillfully designed, the cyberbully will receive accolades on their skillful use of “net lingo”.

MICRO-VISUAL CYBERBULLYING TACTIC-CYBERBULLYING-IPREDATOR IMAGE

CYBERBULLYING TACTIC: MICRO-VISUAL CYBERBULLYING

38. Micro-Visual Cyberbullying: Micro-Visual Cyberbullying is a communication channel that is a future cyberbullying tactic trend. With the growth and expansion of Mobile Device Technology and Smartphones that are mobile and image/video enabled, children will soon become enveloped by the new boom of what has been termed Viddy. Just as Twitter restricts users to text 140 characters, Viddy users are restricted to 15-second video clip recordings to sharing with peers. Given that cyberbullies have become enamored by the speed and dissemination of Twitter, 15-second visual images and video are likely to become the new trend in traumatizing vulnerable children.

2014 CYBERBULLYING TACTICS-HOW CYBERBULLIES CYBERBULLY-IPREDATOR IMAGE

Note to Reader: Of the 38 cyberbullying tactics listed, #32 Local/National Tragedy Mirroring is the most heinous and least substantiated by this writer. In 2012, the world was traumatized by the events of the Connecticut Elementary School Shooting whereby 20 year old, Adam Lanza, entered Sandy Hook Elementary School and brutally murdered 26 children and adults. In relationship to cyberbullying, this writer was contacted by a mother, shortly after the tragedy. The mother reported that her son was being cyberbullied by another child who was threatening to tell his friends and loved ones that her son was planning to engage in the same event that occurred at Sandy Hook Elementary School.

Given children fail to truly fathom the psychological devastation of mass murder and community violence to society, this writer has included this as a cyberbullying tactic parents and educators need to be prepared for. As it is inevitable there will be future local and national tragedies involving a violent outcome, it is paramount that parents and educators be prepared that cyberbullies will use these events in their attempts to threaten and inspire fear in a target child.

Children of the 21st century are targeted via classic bullying, cyberbullying, or a combination of the two. Although cyberbullying is a rapidly growing societal epidemic, classic bullying (aka physical bullying) will remain part of the bullying arena. Given the evolution of digital technology and growth of the internet, cyberbullying has reached epidemic proportions among the pediatric segments of society and has become a permanent weapon in the bully’s toolbox. At the core of all bullying, cyber and classic, are victimization, disparagement and abuse of a targeted child. Child abuse, whether perpetrated by a child or adult, is detrimental to all aspects of pediatric development, following them into adulthood and throughout their lifespan.

Given humanity is at the beginning of the Information Age, it is vital for all communities to address the use and abuse of Information and Communications Technology (ICT) by children to harm other children. What is not apparent and will not be available for 2-3 decades to follow are the cyberbullies who enter adulthood with the ability to harm others using ICT. Prior to the Information Age, classic bullies grew up, became adults and most lead non-violent and productive lives. The question remains is if today’s cyberbullies will develop into adults the same as classic bullies or will they bring with them the tactics and methods they used as children, but applied to the adult environments of cyberspace.

IPREDATOR CYBERBULLYING TACTICS-CYBERBULLYING PREVENTION-INTERNET SAFETY

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants.

In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies. Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. Their website, www.iPredator.co, offers site visitors an enormous database, at no cost or personal information disclosure, on Information Age Forensics, Internet Safety and iPredator Profiling.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis (iFSA). In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories (IISC & IPI Collections). iPredator Inc. also offers abridged versions (IISC Collection-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. Their website, www.iPredator.co, offers site visitors an enormous database on Cyber Criminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack risk prevention checklists and inventories (IISC & IPI Collections.) iPredator Inc. also offers abridged versions (IISC Collections-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Jimmy Kilpatrick-Education News-Editor And Chief-Information Age Education News-iPredator

CYBERBULLYING EXAMPLES ARTICLE

(click link for full pdf article download)

home-button-education-news-information-age-news-education-views-ipredator-image

1st-page-button-education-news-information-age-news-education-views-ipredator-image

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

Print Friendly, PDF & Email
Advertisements
Tweet about this on TwitterShare on Google+Share on FacebookPin on PinterestShare on LinkedInShare on TumblrShare on StumbleUponPrint this pageEmail this to someone

Pages: 1 2 3 4 5 6 7 8

UA-24036587-1
%d bloggers like this: