Cyberbullying and Academic Impact

Nov 4, 2013 by


Cyberbullying uses Information and Communications Technology (ICT) to deliver intimidating or demeaning messages at any time and through a variety of avenues. Today’s children with online access and equipped with mobile digital week and 365 days a year. A child with a mobile phone or social network account can receive cyberbully messages anywhere and at any time. Many cell phone and digital messages can also be anonymous, increasing the amount of uncertainty and fear experienced by the target child. This intense psychological stress, particularly for the more vulnerable children who are most often the victims of bullying, adversely affects a child’s ability to concentrate on schoolwork, school lessons or activities.

Just as classic bullying, cyberbullying adversely affects the academic performance of cyberbullied children. Children who experience classic bullying are likely to avoid locations and activities they associate with negative experiences; cyberbullying victims attempt to avoid the technological spaces. In cyberspace, technological spaces range from social media networking sites to online websites and other internet arenas relevant to their academic success. These significant digital channels include social networks, chat programs and school computer rooms.

All are vital elements in the educational development and social lives of students. Students who feel excluded from these venues are less likely to participate in social activities that take place or planned online and face greater difficulty learning basic computer skills. As technology and technological skills become more important in modern academics and professional training, cyber bullied students face a number of academic and career disadvantages caused by fear and avoidance as opposed to incompetence. Network communications and social utilities like Facebook, MySpace or Twitter can generate public attacks. Social media networks link students with different groups of friends and acquaintances.

If a cyberbullying classmate publishes humiliating content about a victim, that message is distributed to mutual school friends and the victim’s wider social circle, including family and groups of friends from other activities. These public attacks increase the sense of humiliation experienced and eliminate safe social spaces for the victim, resulting in a lower self-esteem. Poor self-esteem makes a student less likely to participate in class, try new academic activities and thrive in an academic environment.


Classic bullying can result in a decrease in academic performance and cyberbullying has the potential to multiply these effects by the infinite number of places in which students experience technology. While cyberbullying lacks the potential for physical violence present in classic bullying, the significant psychological dangers of bullying are still present and arguably even enhanced by cyberbullying.

Cyberbullying can be clear-cut, such as leaving overtly cruel cell phone text messages or mean notes posted to web sites. Other acts are less obvious, such as impersonating a victim online or posting personal information or videos designed to hurt or embarrass another child. Cyberbullying can also happen accidentally. The impersonal nature of text messages, IMs and emails make it very hard to detect the sender’s tone. One teen’s joke or sense of humor could be another’s devastating insult. Nevertheless, a repeated pattern of emails, text messages and online posts are rarely accidental.

Cyberbullying tactics will continue to grow in delivery mechanisms as technology advances. At present, the modes of digital communication include: e-mail, cell phone, text messaging, instant messaging, web sites, online personal polling web sites, interactive/digital technologies (digital videos and photos), PDAs, sending posts on social media sites and text or multi-messages from cell phones. In essence, the cyberbullied child can be taunted and harassed 24 hours a day, 7 days a week and 365 days a week.

Unfortunately, cyberbullying is far worse than classic bullying. Perpetrators are not bound by time or space, and the audience can be much, much bigger. One quarter of young people who have cyberbullied others have also bullied children offline. With the power of technology, the offenses can be much crueler as they can incorporate a rich array of media (sounds, altered graphics, text, video, slide shows and photos) to deliver their attacks.

The truth is often a terrible weapon of aggression. It is possible to lie, and even to murder, with the truth.” Alfred Adler (1870-1937)

national bullying prevention month-cyberbullying prevention-education news-ipredator image





The Cyberbullying Triad is a term used to describe the 3 typologies of children that harm other children using Information Technology. This writer’s terms to categorize cyberbullies include the Ignorant Cyberbully, Righteous Cyberbully & Narcissistic Cyberbully. Of the three profiles, the Narcissistic Cyberbully is the most problematic having the highest probability of engaging in malevolent and nefarious online activities as an adult.


Cyberbullying is defined as the use of Information and Communication Technology (ICT) in the commission of verbal and/or physical attacks, by one or more children towards another child, who is unable or unwilling to deescalate the engagement. Given that the vast majority of this abuse occurs in cyberspace, the factors, drives and motivations for cyberbullying are extremely complex. Provided is a brief introduction to the psychodynamics of cyberbullying and the cyberbully mind.


Cyberbullying continues to grow devastating both pre-pubescent and adolescent children. Unlike pre-Information Age bullying, cyberbullies and their tactics are primarily designed and instituted in the hidden realm of cyberspace. No one knows the depths Information Age children will venture in their practices to harm other children. NYS Licensed Psychologist, Dr. Michael Nuccitelli has published his 2014 Cyberbullying Tactics for review and free download.


Cyberbullying facts, prevention education tips & resources are presented for download, at no cost, for parents, educators & pediatric professionals. Author of the Information Age Forensics construct, iPredator, Dr. Nuccitelli has compiled helpful information regarding both the cyberbully and cyberbully victim. Given that a significant segment of cyberbullies fit criteria for iPredator, he also presents his formal definitions for Dark Psychology, Cyberstealth, iPredator Bridge & Cyberstealth.



Cyberbullying Target Checklist Abridged: The CBTC-ABR is a 75 item cyber bully education and data collection tool for parents & educators regarding a child’s risk of being cyberbullied.


Cyber Bully Abuser Checklist-Abridged: The CBAC-ABR is a 75-item cyber bully education and data collection tool for parents and educators regarding a child’s risk potential of being a cyberbully.


Cyber Bully Target Checklist: The Cyber Bully Target Checklist is a 75-item education & data collection tool for parents and educators regarding a child’s risk of being cyberbullied.


Cyber Bully Abuser Checklist: The Cyber Bully Abuser Checklist is a 75-item internet safety tool designed for parents and educators regarding a child’s risk of being a cyberbully.


Cyber Bully Probability Inventory: The IPI-CB is a 110 question cyberbully probability inventory designed to examine a child’s risks of being cyberbullied and cyber attacked. iPredator Inc.


Cyberbully Abuser Inventory: The IPI-CBA is a 110 question diagnostic and education tool designed to examine a child’s risks of being a cyberbully abuser or bystander. iPredator Inc. /


iPredator: A person, group, or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft, or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion, or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant, or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The use of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

ipredator-cyberbullying-cyberbullying prevention-ipredator image


iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft, and disparagement from online assailants.

In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state, and federal agencies. Dr. Nuccitelli can be reached at Their website,, offers site visitors an enormous database, at no cost or personal information disclosure, on Information Age Forensics, Internet Safety and iPredator Profiling.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment social media safety assessment service called the iPredator Facebook Safety Analysis (iFSA). In addition to offering advice, education, and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories (IISC & IPI Collections). iPredator Inc. also offers abridged versions (IISC Collection-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education, and prevention education.

Although iPredator Inc. are members of a multitude of social networking sites, public and hidden, feel free to visit the social networking sites they use as their major information and announcement vehicles.

twitter bullying-cyberbullying-cyber abuse abridged-ipredator (1)

Author: Michael Nuccitelli, Psy.D.


by iPredator Inc.

Find us on Google+


Print Friendly, PDF & Email

1 Comment

  1. This was a good article

    shoo shooo