NATIONAL BULLYING PREVENTION MONTH: DAY 17

Oct 17, 2013 by

VOTING & POLLING BOOTH DEGRADATION

 

CYBERBULLYING TACTIC: VOTING & POLLING BOOTH DEGRADATION

17. Voting & Polling Booth Degradation: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post. Cyberbullies use these websites to create web pages that allow others to vote online for categories that are deemed highly embarrassing by the target child. Examples of voting and polling include the ugliest, fattest, dumbest, most sexually promiscuous and a plethora of other deprecating attributes. The primary purpose of this cyberbullying tactic is to encourage group consensus by encouraging peers to engage in disparaging the target child.

CYBERBULLYING TRIAD

http://www.ipredator.co/ipredator/cyber-bullying/cyberbully-triad/

The Cyberbullying Triad is a term used to describe the three typologies of children that engage in harming other children using Information and Communications Technology (ICT). This writer’s terms used to categorize cyber bullies include the Ignorant Cyberbully, Righteous Cyberbully and Narcissistic Cyberbully. Of the three profiles, the Narcissistic Cyberbully is the most problematic having the highest probability of engaging in malevolent and nefarious online activities as an adult.

2014 Cyberbullying Tactics Images on Tumblr

http://ipredator.tumblr.com/

iPredator Inc. Cyberbullying Webpages

Cyberbullying Definition Overview

2014 Cyberbullying Tactics: How Cyberbullies Cyberbully

Cyberbullies: An Educator of Educators Approach

iPredator: Information Age Forensics Construct Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbullycyberstalker, cyber harasser, cyber criminalonline sexual predatorcyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target. 

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberbullying Risk Assessments

CBTC-ABR

Cyber Bully | Cyberbullying Target Checklist Abridged | iPredator
www.ipredator.co/product/
cyberbully-target-checklist-abridged/

The CBTC-ABR is a 75-item cyber bully education and data collection tool for parents & educators regarding a child’s risk of being cyberbullied.

CBAC-ABR

Cyberbullying | Cyber Bully Abuser Checklist-Abridged | iPredator
www.ipredator.co/product/
cyberbully-abuser-checklist-abridged/

The CBAC-ABR is a 75-item cyber bully education and data collection tool for parents and educators regarding a child’s risk potential of being a cyberbully.

CBTC

Cyberbully Risk Tool | Cyber Bully Target Checklist | iPredator
www.ipredator.co/product/
cyberbullytarget-checklist/

The Cyber Bully Target Checklist is a 75-item education & data collection tool for parents and educators regarding a child’s risk of being cyberbullied.

CBAC

Cyberbullying Risk Tool | Cyber Bully Abuser Checklist | iPredator
www.ipredator.co/product/
cyberbullyabuser-checklist/

The Cyber Bully Abuser Checklist is a 75-item internet safety tool designed for parents and educators regarding a child’s risk of being a cyberbully.

IPI-CB

Cyberbully Target Tool | Cyber Bully Probability Inventory | iPredator
www.ipredator.co/product/
cyberbully-probability-inventory/

The IPI-CB is a 110 question cyberbully probability inventory designed to examine a child’s risks of being cyberbullied and cyber attacked. iPredator

IPI-CBA

Cyber Bully Risk Tool | Cyberbully Abuser Inventory | iPredator
www.ipredator.co/product/
cyberbullyabuser-inventory/

The IPI-CBA is a 110 question diagnostic and education tool designed to examine a child’s risks of being a cyberbully abuser or bystander. iPredator Inc.

Connect the Disconnected, Educate the Ignorant and Conquer the Corrupt.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants. 

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. Their website, www.iPredator.co, offers site visitors an enormous database on Cyber Attack Prevention, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack risk prevention checklists and inventories (IISC & IPI Collections.) iPredator Inc. offers abridged versions (IISC Collections-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education. 

Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. (2013)

 

 

Print Friendly, PDF & Email

Related Posts

Tags

Share This

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.