iPredator Adult Internet Safety Checklist (AISC)

Aug 14, 2018 by

ipredator-adult-internet-safety-checklist 2

iPredator

Adult Internet Safety Checklist

(AISC)

ipredator-internet-safety-assessment-download-button

Adult Cyber Attack Test [AISC]: The Adult Internet Safety Checklist [AISC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Adult Internet Safety Checklist [AISC] assesses an adult’s high-risk online activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the Adult Internet Safety Checklist [AISC] is a structured checklist for diagnostics, education, investigation and data collection.

The AISC can also be used for compiling evidentiary information  for authorities, Internet Service Providers and the legal system if the online user is being cyber attacked by an online assailant[s]. Internet safety and cyber security are issues vital to all Americans living in the Information Age. To help adult online users, Dr. Nuccitelli has designed the Adult Internet Safety Checklist [AISC.] In addition to developing the AISC, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology and age of the online user.

ipredator-adult-internet-safety-checklist 3

Adult Internet Safety Checklist [AISC]: The Adult Internet Safety Checklist is a 100-item checklist designed for an adult Information and Communications Technology [ICT] user to verify, confirm and examine their ICT safety and security practices, online vulnerability, risk potential and cyber attack awareness. The AISC is also designed to investigate an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by iPredators based on their online activities and level of cautious approach. As a data collection tool, the AISC can be used to investigate an online user’s efforts to reduce their probability of being targeted, disparaged, stolen from or infiltrated by cyber criminals, cyberstalkers, online sexual predators or those engaged in digital reputation disparagement.

The AISC enables the respondent to examine their online and ICT interactions in relationship to iPredators and the weaknesses they can focus upon to reduce the potential of successfully being cyber attacked. With the rapid growth and expansion of information technology, all Information and Communications Technology users are required to allocate time and effort employing cyber security and digital reputation tactics. The AISC also addresses the growth of mobile device technology and attempts by cyber criminals to infiltrate their target mobile devices.

Please note that all iPredator Inc. cyber attack risk assessments have been formatted and designed to act as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

ipredator-adult-internet-safety-checklist 6

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”  Michael Nuccitelli, Psy.D. [2012]

Source: iPredator Adult Internet Safety Checklist (AISC)

Print Friendly, PDF & Email

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.