iPredator Cyberstalking Prevention Checklist (CSPC)

Aug 20, 2018 by

ipredator-cyberstalking-prevention-checklist 3

iPredator Cyberstalking Prevention Checklist [CSPC]


The Cyberstalking Prevention Checklist [CSPC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Cyberstalking Prevention Checklist [CSPC] assesses an online users online risk activities, cyberstalking vulnerabilities and internet safety prowess. Designed to be multi-functional, the Cyberstalking Prevention Checklist [CSPC] is a structured checklist for diagnostics, education, investigation and data collection.

The CSPC can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user is suspected of being cyberstalked by an online assailant[s]. Developed by Dr. Nuccitelli, the structured checklist is used for cyberstalking prevention, education, investigation and risk potential.

Cyberstalking is the use of Information and Communications Technology [ICT] to monitor, harass and taunt others themed with implied or actual physical threats. Cyberstalking is a criminal act in many states and continues to grow as a national problem. To help online users prevent cyberstalking victimization, Dr. Nuccitelli designed the Cyberstalking Prevention Checklist [CSPC]. In addition to developing the CSPC, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology, age of online user and organization.

ipredator-cyberstalking-prevention-checklist 4

Cyberstalking Prevention Checklist


Cyberstalking Prevention Checklist [CSPC]: The Cyberstalking Prevention Checklist is a 100-item data collection, diagnostic and educational tool designed to confirm and confirm the preparedness of an Information and Communications Technology user, business or organization of being cyber stalked and/or cyber harassed. The CSPC investigates personal and/or corporate vulnerability of being targeted, disparaged, harassed, monitored or infiltrated by cyber criminals, cyber terrorist, cyberstalkers, disgruntled ex-partners, disgruntled past employees/customers or nefarious corporate competitors.

Areas examined in the CSPC include online risk behaviors, identity theft potential, personal and financial information protection, ICT safety, cyber security and cyberstalking preparedness. An adult, business, public figure or associate of a public figure age 18+ completes the CSPC. For purposes of the cyberstalking preparedness the CSPC has been designed to investigate, this checklist combines aspects of cyberstalking, cyber harassment and cyberbullying if the subject being queried is a minor.

The CSPC can also be used, as a data collection instrument to present to authorities if an Information and Communications Technology user is actively being cyberstalked or cyber harassed. The CSPC has been designed with the knowledge that cyberstalking is both a method used by assailants and a typology of offender who engages in the behavior of cyberstalking. The CSPC also addresses the growth of mobile device technology and attempts by cyberstalkers to infiltrate their target’s mobile devices.

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to work as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Source: iPredator Cyberstalking Prevention Checklist (CSPC)

Print Friendly, PDF & Email

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.