Oct 16, 2013 by



16. Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target child. The cyberbully creates, designs, and posts web pages specifically designed to insult the target child, their peers or groups of people who share similar characteristics as the target child such as their race, religion or sexual orientation. Although website creation has become an easy task with contemporary information technology software, many cyberbullies have acquired skills enabling them to create websites that are both appealing to viewers, but presenting the target child in a negative light.


15. Password Theft & Lockout: A cyberbully steals the target child’s password and begins to chat with other people, pretending to be the target child (a.k.a. Impersonation.) Confident that others think he/she is the target child, they begin to communicate provocative and adversarial messages that are offensive and anger the target child’s friends or strangers. In addition to impersonating the target child, the cyberbully locks out the target child from his/her accounts by changing his/her password. Without having access to his/her username or email account, the

target child is unable to close or prove he/she is not the culprit spreading the vitriolic information.


The Cyberbullying Triad is a term used to describe the three typologies of children that engage in harming other children using Information and Communications Technology (ICT). This writer’s terms used to categorize cyber bullies include the Ignorant Cyberbully, Righteous Cyberbully and Narcissistic Cyberbully. Of the three profiles, the Narcissistic Cyberbully is the most problematic having the highest probability of engaging in malevolent and nefarious online activities as an adult.


2014 Cyberbullying Tactics Images on Tumblr

iPredator Inc. Cyberbullying Webpages

Cyberbullying Definition Overview

2014 Cyberbullying Tactics: How Cyberbullies Cyberbully

Cyberbullies: An Educator of Educators Approach

iPredator: Information Age Forensics Construct Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbullycyberstalker, cyber harasser, cyber criminalonline sexual predatorcyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target. 

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberbullying Risk Assessments


Cyber Bully | Cyberbullying Target Checklist Abridged | iPredator

The CBTC-ABR is a 75-item cyber bully education and data collection tool for parents & educators regarding a child’s risk of being cyberbullied.


Cyberbullying | Cyber Bully Abuser Checklist-Abridged | iPredator

The CBAC-ABR is a 75-item cyber bully education and data collection tool for parents and educators regarding a child’s risk potential of being a cyberbully.


Cyberbully Risk Tool | Cyber Bully Target Checklist | iPredator

The Cyber Bully Target Checklist is a 75-item education & data collection tool for parents and educators regarding a child’s risk of being cyberbullied.


Cyberbullying Risk Tool | Cyber Bully Abuser Checklist | iPredator

The Cyber Bully Abuser Checklist is a 75-item internet safety tool designed for parents and educators regarding a child’s risk of being a cyberbully.


Cyberbully Target Tool | Cyber Bully Probability Inventory | iPredator

The IPI-CB is a 110 question cyberbully probability inventory designed to examine a child’s risks of being cyberbullied and cyber attacked. iPredator


Cyber Bully Risk Tool | Cyberbully Abuser Inventory | iPredator

The IPI-CBA is a 110 question diagnostic and education tool designed to examine a child’s risks of being a cyberbully abuser or bystander. iPredator Inc.

Connect the Disconnected, Educate the Ignorant and Conquer the Corrupt.


iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants. 

Dr. Nuccitelli can be reached at Their website,, offers site visitors an enormous database on Cyber Attack Prevention, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack risk prevention checklists and inventories (IISC & IPI Collections.) iPredator Inc. offers abridged versions (IISC Collections-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education. 

Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. (2013)

Print Friendly, PDF & Email

Related Posts


Share This

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.